January 31, 2007
News : Korean programmers arrested for sending 1.6 billion spam emails
The men, aged 20 and 26 years old, are alleged to have broken the law by sending out 1.6 billion spam emails between September and December 2006. South Korean authorities in Seoul claim that the duo, both computer programmers, obtained personal and financial information from 12,000 victims which they then sold to other firms.
"South Korea was revealed in Sophos's recent security threat report as the third-worst nation in the world for relaying spam, so it's critical that the authorities are cracking down on spammers based in the country," said Graham Cluley, senior technology consultant, Sophos. "Spammers are battering inboxes in their attempts to make fast money, sell fake goods, and - in the worst cases - steal identities."
In May 2006, South Korean authorities arrested a man suspected of running a network of zombie computers alleged to have sent 18 million spam messages a day.
"South Korea is admired around the world for its impressive internet infrastructure, but with the widespread adoption of broadband net connections comes the danger of spam, spyware and malware," continued Cluley. "The courts in South Korea need to send a strong message to abusers of the internet that their criminal antics will not be tolerated."
News : 7 Ways to Be Mistaken for a Spammer
News : Microsoft Tops Corporate-Reputation Survey
Formerly chief executive officer and now chairman of Microsoft, he contributed to a marked improvement in the company's emotional appeal. Jeanie Cummins, a survey respondent and homemaker in Olive Hill, Ky., says Mr. Gates's philanthropy made her a much bigger fan of Microsoft. "He showed he cared more for people than all the money he made building Microsoft from the ground up," she says. "I wish all the other big shots could do something like this." To be sure, some respondents still complain that Microsoft bullies its competitors and unfairly monopolizes the software business. But such criticism is less biting and less pervasive than it was just a few years ago.'"
January 30, 2007
News : Hacker finds chink in Microsoft’s anti-piracy armor
A security researcher in India has discovered "easy to exploit" ways to cheat Microsoft's OGA (Office Genuine Advantage) anti-piracy checks.
Debasis Mohanty, a hacker with a history of circumventing Redmond's software validation tools, says there are numerous ways to bypass the checks, which generate a hash out of information from the installed Microsoft Office software and passes it to a server for verification.
According to a proof-of-concept released by Mohanty, a simple Google query for Office updates or add-ins will return direct download links to the file on Microsoft's server "without any validation check."
Mohanty also hinted that the OGACheckControl.dll can be patched to sidestep validation. "However just to keep myself away from those scary legal notices, I do not want to release any patch at this point of time," he said in a note posted to the Full Disclosure mailing list.
News : Apple Offers $1.99 802.11n Upgrade
The Cupertino company claims that it had to offer the capabilities in this manner due to finance laws, commonly referred to as GAAP, which they say require a charge for significant feature enhancements. But many Wall Street analysts have said that is not the case.
"GAAP doesn't require you to charge squat," former Securities and Exchange Commission chief accountant Lynn Turner said. "GAAP doesn't even remotely address whether or not you charge for a significant functionality change."
Apple has not responded to such criticisms, and has instead chosen to push onward with the offering - albeit at a lower cost than the initially rumored $4.99 USD price. Those who purchase the new Airport Extreme Base station would not have to purchase the software update, as it is included with the product.
Compatible machines include all Intel Core 2 Duo models and the Mac Pro with the AirPort Extreme Option. The 17-inch inch 1.83GHz iMac does not include 802.11n functionality.
802.11n is said to have a typical data rate of 200 megabits per second and a max throughput of 540 mbits/sec, about 50 times faster than 802.11b, and 10 times faster than 802.11a and g.
News : Apple to Pay Bloggers' Legal Fees
The case involved Apple rumor sites AppleInsider and PowerPage.org. At issue was the disclosure on both sides of a confidential product code named "Asteroid." The device was never released, but the Cupertino company sued anyway.
In the initial case, a lower court ruled in favor of Apple, saying that the two sites had no right to disclose the information, and an "interested public" was not the same as "public interest," which would be protected speech under the law.
However, a state appeals court disagreed with that ruling in May of last year, saying that bloggers should be afforded the same protections under the Constitution and state law as traditional journalists. Apple later dropped the case.
A total of $700,000 in fees is owed to the defendants, of which $425,000 would go to the EFF, which primarily represented the two sites. The remaining funds would be split between co-counsels Richard Wiebe and Tom Moore, who also provided assistance to the defense.
The EFF says it would use the money received to continue defending the rights of bloggers and online journalists.
The figure is the actual legal cost to defend the case, plus a 2.2 times multiplier as ordered by the court. The order comes after Apple declined its right to appeal and dismissed the case, although "without prejudice," meaning it would have the opportunity to re-file if it chooses to.
One of the sites, AppleInsider, told MacNN that it was satisfied with the ruling. "Hopefully, Apple will think twice the next time it considers a campaign to bully the little guy into submission," editor Kasper Jade told the site.
News: Verizon Adds Wireless to Service Bundles
The nation's largest telecommunications company had already been offering packages that allowed consumers to save money by bundling DirecTV satellite service, Verizon DSL, and a landline number for substantial savings.
However, missing from the mix was wireless calling, which is offered by Verizon Wireless, a joint venture of Verizon and British wireless provider Vodafone. Starting Tuesday, consumers would be able to add wireless to their plans.
Called Verizon Double Freedom, Triple Freedom, and Ultimate Freedom, the offerings would give consumers six different options in bundles. The new options would be made available in most of the company's service area.
The plans would not be available in Vermont, Nevada, Arizona, and Washington, although the company hopes to expand the program to Washington soon.
"Our new plans crack the code on simplicity and value," said Bob Ingalls, executive vice president and chief marketing officer for Verizon's Telecom Group. "With these new packages, we lead the market on choice, value and quality."
Double Freedom would offer three different options: the Verizon Freedom Essentials landline calling plan with the option of adding DirecTV service, Verizon DSL, or Verizon Wireless service. Total cost would be $64.99 to $74.99 USD per month, with savings of $7.99 to $14.99 USD, all market dependent.
Triple Freedom would include Verizon Freedom Essentials and Verizon DSL, with the option to either add a Verizon Wireless plan or DirecTV service. Fees would range from $94.99 to $104.99 USD, with savings of $17.98 to $27.98 USD, based on the market where ordered.
Finally, Ultimate Freedom would combine all services for a total cost of $134.99 USD, with total savings of up to $27.97, Verizon said. All plan costs are calculated with the $39.99 USD Verizon Wireless calling plan.
"Our new packages are the most complete offers in the market," Ingalls said.
January 29, 2007
News : Verizon iPhone could have been a reality
USAToday's Leslie Cauley reports that as long as two years ago, Apple and Steve Jobs held initial discussions with Verizon about the carrier becoming exclusive distributor for the then-envisioned iPhone.
If so, we would have seen Verizon's logo all over the ad at the top, not Cingular's.
Didn't happen.
Verizon reportedly balked, because they wanted a degree of distribution control over the device that Apple was not willing to cede. And Apple's stance left Verizon very concerned about how such control would effect the carrier's stance with multi-device retail distribution partners such as Wal-Mart and Best Buy.
The result of the failure to agree is that Cingular/AT&T, Verizon's largest rival, will be the iPhone's exclusive distributor when the much-anticipated device is released in June.
The was this is playing out doesn't surprise me. The mobile carriers are used to controlling distribution and tech support for manufacturers. It is a part of mobile carrier culture.
But Apple's corporate culture is reluctant to give up any degree of control to carriers,distributors, developers, etc. Jobs is a control freak (well, duh).
Apple sounds like the ultimate "high maintenance" technology partner- demanding, secretive, touchy, always wanting the option of control.
And it is not only technology partners where we see these traits.
News : Intel Reinvents the Transistor
It is what both wide-eyed engineers and anxious executives have described as the "Holy Grail of semiconductor technology," and Friday morning Intel revealed it has developed working 45-nm processor samples running Microsoft Windows Vista, Mac OS X, Linux and other operating systems, where this material - a compound based on the element hafnium, atomic number 72, a frequently occurring impurity in zirconium typically found in fake diamonds - serves as the dielectric gate between the current source and the current drain.
With the hafnium material serving as the gate, Intel will then replace the polysilicon electrode layer with a metal electrode, the exact alloy used here also being kept secret. As a result, transistors for 45 nm semiconductors starting with Intel's Penryn family will be fabricated at half the size of those used in today's 65 nm Core 2 processors. At the same time, transistor switching power can be reduced by as much as 30%, while still obtaining a performance improvement of as much as 20%. And current leakage at the gate will be reduced by a factor of 10.
How big of a page has been turned here, really? Since Intel announces advancements several times a year any more, what makes this one substantive beyond the typical hyperboles reserved for press releases?
Intel's current processor roadmap leaps between processor technology families every two years. We saw the latest leap just last summer, from the last of the Pentium D dual-core processors at 90-nm, to the Conroe/Merom/Woodcrest series at 65-nm. But while this "high-k + metal gate" (HK+MG) development does play into Intel's planned leap to the Penryn architecture, Friday's revelation literally marks only the start of a second era in metal oxide semiconductor production.
News : Symantec Discovers New Word Attack
The issue is known to affect Office XP, 2000 and Office 2003 on Windows 95, NT, 98, Me, 2000, Server 2003 and XP. It is known that the exploit involves the execution of arbitrary code, but specifics of the actual issue are not yet known.
When an attack is launched against either Word 2003 or XP, CPU resources are completely consumed and a denial-of-service results. The issue was discovered after one of Symantec's researchers spotted the exploit during a live attack.
In that attack, a specially crafted Word document arrives via e-mail, attempting to trick the user into opening it. When launched, the exploit installs a Trojan that opens a backdoor on the infected computer.
From there, the Trojan connects to a remote server and sends sensitive documents and logged keystrokes, Symantec warned.
"To protect yourself against these threats, do not trust unsolicited files or documents about 'interesting' topics," the company said in a security alert. "Do not open attachments unless they are expected and come from a known and trusted source."
Currently, no patch or workaround for the issue exists, Symantec said. If Microsoft confirms the vulnerability, it would likely issue an advisory and suggest workarounds to avoid the issue.
News : Google Disarms 'Googlebombs'
Notable Googlebombs, or linkbombs, include the word "failure" resulting in a link to U.S. President George W. Bush's Web site, as well as associating the word "talentless hack" with Adam Mathes. In turn, Google says it has improved the way it analyzes the link structure of the Web.
"Now we will typically return commentary, discussions, and articles about the Googlebombs instead," explained Google engineer Matt Cuts in a blog post. "Over time, we've seen more people assume that they are Google's opinion, or that Google has hand-coded the results for these Googlebombed queries. That's not true, and it seemed like it was worth trying to correct that misperception."
Instead of correcting the results by hand, which was possible as Cuts said there are under 100 well-known Googlebombs, Google developed an algorithm to address the problem. "Algorithms are great because they scale well: computers can process lots of data very fast, and robust algorithms often work well in many different languages."
Searching for the word "failure" on Google no longer links first to the White House, although "utter failure" still displays an editorial on President Bush as the top result.
January 26, 2007
News : Fox Looks to Identify YouTube Leaker
Details of a subpoena granted by a U.S. District Judge in San Francisco were first reported by Google Watch. A smaller video site, LiveDigital, also received a subpoena as part of the legal action.
Fox confirmed the existence of the subpoena, but would not comment further. LiveDigital said it had received the request and intended to comply, however YouTube would not comment on the matter.
According to the document, episodes of "24" appeared on YouTube before the season debut on January 14. YouTube was contacted by Fox on January 8, but apparently did not remove the videos in time to avoid legal action.
12 "Simpsons" episodes are also included in the suit, most from the seventh season of the show. The show is now in its 18th season.
The YouTube user who posted the videos was known by the handle "ECOTotal." A BetaNews search of the username on the video site shows that the company has suspended that user. Fox seeks to find the indentity of this user.
Even if ECOTotal is identified, that person may have not been the start of the leak. Even before January 8, press reports indicate the unaired episodes of "24" appeared on file-sharing networks, meaning others could have viewed the content in question before it appeared on YouTube.
Legal experts say that while Google has a history of protecting the users of its services, the law would allow Fox to press for the real identity.
News : ECIS Accuses Microsoft of Plotting HTML Hijack
In a prepared statement this morning, ECIS Chairman Simon Awde connected XAML with Windows Vista, the system that will next week be the predominant deployment system for Windows Presentation Foundation. XAML can be used to lay out pages and controls for programs that WPF produces using the .NET Framework.
"Vista is the first step in Microsoft's strategy to extend its market dominance to the Internet," the statement quotes Awde as saying. The statement then goes on to say, "For example, Microsoft's 'XAML' markup language, positioned to replace HTML (the current industry standard for publishing language on the Internet), is designed from the ground up to be dependent on Windows, and thus is not cross-platform by nature."
The statement does not mention that XAML is an XML implementation.
Indeed, XAML (pronounced "zammel") will become the preferred method for implementing applications front-ends in Windows, with more direct support forthcoming in the next version of Visual Studio - current editions support it with patches and updates. And while Microsoft was expected as far back as 2004 to submit XAML to the ECMA organization, which last year approved its Office Open XML document format as an international standard, since that time, there's been no detectable international standardization activity on the XAML front.
The reason for that may be different that you might expect. The W3C has been working to develop its own XML-based forms lexicon for the Web called XForms, the latest recommendation for which was published last year. But besides XForms, the Open XUL Alliance in 2005 counted no fewer than 21 active commercial implementations of XML-based layout lexicons, XAML being just one of them.
If Microsoft were to campaign for ECMA or another organization to push XAML as an international standard, others might pose this question: All things being equal (ignoring the fact that Microsoft often isn't, or at least, doesn't play like it is), what would make XAML any more deserving of standardization and accreditation than, say, Macromedia's (Adobe's) MXML layout lexicon being developed for Flash?
Indeed, throughout XAML's developmental history, Microsoft's own people have argued that the lexicon cannot possibly replace HTML. In a 2005 video, XAML architect Chris Anderson demonstrates that XAML is different from CSS, the stylesheet lexicon used within HTML Web pages, because it does not specify the tools with which controls are bound; instead, it leaves those definitions to the developer, and thus conceivably to the market.
In a much more explicit explanation, Microsoft developer Chad Hower lists and enumerates the features XAML lacks in a side-by-side comparison with HTML. Among the items Hower mentions: XAML has no provisions for submitting the contents of forms - no counterpart to the FORM element in HTML; XAML has no way to embed a scripting language; and perhaps the most striking differentiation, XAML has no provisions for hyperlinking to other documents.
Or perhaps this is the clincher: Hower actually argues that XAML cannot replace HTML because XAML is not yet cross-platform. From his perspective, Hower conceded that many sites are designed for Internet Explorer only, so for at least a chunk of Internet users, Windows-only support is acceptable. But not for everyone.
Nonetheless, from ECIS' perspective, the lone enemy is at the gate: "With XAML and OOXML," stated ECIS attorney Thomas Vinje, "Microsoft seeks to impose its own Windows-dependent standards and displace existing open cross-platform standards which have wide industry acceptance, permit open competition and promote competition-driven innovation. The end result will be the continued absence of any real consumer choice, years of waiting for Microsoft to improve - or even debug - its monopoly products, and of course high prices."
Among the companies that ECIS represents in arguments before the EC is IBM, which is one of the principal sponsors of the XForms effort before the W3C. XForms is - or would be - one part of XUL, Mozilla's own long campaign to implement XML in Web standards, first implemented in the Netscape 6.0 browser in 2000.
Daniel Glazman is a co-creator of CSS, currently a Mozilla developer, and the creator of the Nvu Web editor application. In late 2005, after the W3C announced its next step in the XUL campaign - the standardization of an HTTP request format using XML - Glazman argued on his personal blog that such a step may have been too long in coming.
"With dozens of Mozilla milestones in the wild, and almost in sync with [Internet Explorer 7], the W3C finally discovers the whole browser world uses XML-based UI languages," Glazman wrote. Citing a W3C document, he continued, "The future W3C format will 'be based on an existing application/UI format, such as Mozilla's XUL, Microsoft's XAML, Macromedia's MXML or Laszlo Systems' LZX, provided the owners of the format are willing to contribute.' OK, but how the hell are Mozilla and Microsoft going to implement that? Moving from their own format to that one? Seriously?...It's late guys, too late, far too late."
January 25, 2007
News : Google to List YouTube Videos on Site
Beginning Thursday, users of Google Video would see videos from the popular social video site included in searches. When a user clicks on a video from YouTube, he or she would be taken to the site to view it.
Salar Kamangar, vice president of product management at Google, says this is what the company hopes to do with Google Video in the future: the ability to search for any video regardless of where it is located.
"This is part of Google's overall goal to give you the highest quality search results possible," he said. But he stressed that YouTube would remain an independent subsidiary of Google.
"Google will support YouTube by providing access to search and monetization platforms and, when/where YouTube launches internationally, to international resources," he added. "Today represents just the first step in our plan to bring you a comprehensive video search and content platform."
News : Apple, Norway Headed for iTunes DRM Showdown
A complaint was filed with ombudsman Erik Thon by Forbrukerradet, the Norwegian Consumer Council. It argued that Apple's FairPlay was illegal in the country. According to previous statements by the Norwegian government, interoperability is a requirement for operation.
Forbrukerradet has won its case against Apple, with Thon siding with the group. The Cupertino company has been contacted about the decision, and must either remove the DRM or appear in court, the latter being the more likely outcome.
Apple has three options according to the group: license FairPlay, join with other companies to develop an open standard, or abandon DRM altogether. The company has until September to comply, otherwise facing fines or legal action.
Given Apple's past comments, it appears as if none of those options are likely. What will likely result is a court showdown between the Scandinavian country and Apple. The resulting decision could mean much to Apple's future in Europe.
Consumer groups from both France and Germany have joined the effort, possibly signaling any decision in Norway could reverberate throughout the rest of the European Union.
"Apple hopes that European governments will encourage a competitive environment that lets innovation thrive, protects intellectual property and allows consumers to decide which products are successful," Apple spokesman Tom Neumayr told the Associated Press recently.
News : Microsoft Photosynth Now for Firefox
Photosynth was first announced at SIGGRAPH 2006. Microsoft describes it as "a hybrid of a slide show and a gaming experience that lets the viewer zoom in to see greater detail or zoom out for a more expansive view."
For now, Microsoft is providing the collections of photographs, as a user processing his or her own photos could take hours, or even days. The application also has pretty hefty hardware requirements and will only run on Windows XP SP2 or Windows Vista systems with a capable graphics card.
"As you know, this is a long term project and the team continues to make progress on a daily basis to add more functionality to the underlying technology. After we released the technology preview in November we saw a number of requests for a version that would work in Firefox," said Group Product Manager Adam Sheppard.
Photosynth was born out of Microsoft's Live Labs, a group of scientists and engineers that are studying new ways to use the Internet. The group was founded in February 2006 by Dr. Gary Flake, who joined MSN as a distinguished engineer in April of last year.
"We know that you are waiting for the day when you will be able to create your own collections, and that will happen, but in the meantime look for more beautiful new examples of Photosynth in action over the coming months," Sheppard added.
The Photosynth plug-ins for both Firefox and Internet Explorer are available for download from FileForum.
January 24, 2007
News : AOL Preps for Windows Vista Launch
A beta of an AOL Mail & AIM Gadget for the Windows Vista sidebar is now available, and would allow the user to check his or her e-mail and instant messages. The mini-application would allow users to read e-mail messages, receive new mail and incoming IM alerts, as well as including other AOL-related features.
The AOL 9.0 client has also been updated for Vista, and is immediately available for download from the AOL Web site. In addition, the new version would also feature legacy support for Windows 98 through Windows XP, the company said.
While AIM 6 will not be compatible with Vista, the company is offering beta of the next update to the client, version 6.1 This would allow early adopters to get a first look at the updated client, as well as gain Vista compatibility.
In addition, OpenRide 1.5 is now Vista ready and available from AOL's beta software site. The application is intended for broadband users and has been billed as the Dulles, Va. company's next-generation software, replacing the aging AOL client.
News : Global Collaborative Music Experiment
News : The iPod International Currency Index
News : Financial Analyst Calls Second Life a Pyramid Scheme
January 22, 2007
News : AOL Co-Founder Case Launches Health Site
Those premium services would cost about $100 per year, according to the Wall Street Journal. However, a free trial option that includes both telephone support and digital record service would be offered to those who subscribe within the first 90 days. Case is serious about the new venture: he told the WSJ that he has invested $100 million of his personal fortune.
News : Real's Film.com to Stream Indie Films
Called "Movie of the Week," the films will initially be provided by GreenCine, which carries a catalog of over 10,000 movies and documentaries available for download. Each film will be featured for one week, and the feature is expected to run throughout the year.
Real will also accept submissions from independent filmmakers to be featured within the service. "We will be able to showcase up-and-coming and independent filmmakers and offer their films' exposure to an audience they might not consistently reach," Real Media Software and Services vice president Elizabeth Coppinger said.
"24 Hours on Craigslist," directed by Michael Ferris Gibson and Zealot Pictures & Heretic Films is one such film. It documents some of the posters to the popular online classified ads site during a day in August 2003 in San Francisco, where the service got its start.
Since the films would be streamed using Real's format, the videos would be viewable on both Windows and Mac platforms. Users would also have the option to watch the film in full-screen mode. The cost of the service would be offset by in-movie sponsorship and advertising, Real said.
News : 22% of Windows Installs Non-Genuine
Since WGA launched in July 2005, over 512 million users have attempted to validate their copy of Windows, Microsoft said. Of those, the non-genuine rate was 22.3 percent. 56,000 reports have been made by customers of counterfeit software, which grants that user a free replacement copy of Windows.
While high, that number is less than the average software piracy rate around the world, according to the Business Software Alliance. The BSA reports that 35 percent of the world's software is pirated (22 percent in North America specifically), and a Yankee Group study noted that 55 percent of organizations report instances of counterfeit or pirated software.
As it prepares to launch both Windows Vista and Office 2007 to the public next week, Microsoft has kicked off what it calls the "Genuine Fact Files" campaign for educating consumers on the downfall and risks associated with non-genuine software. It hopes to discourage users from downloading illicit software in the process.
Acknowledging that potential customers may be tempted to "try the new products first before they make the decision to buy" through the use of pirated software, Microsoft has posted an online "test drive" of Windows Vista, which joins an existing Web-based preview of Office 2007.
The Vista test drive, which requires Internet Explorer 6 or 7 and runs the operating system in a small Active X based virtual machine, lets visitors explore various new features of the forthcoming operating system, and guides them through common tasks. Meanwhile, a 60-day trial download of Office 2007 is also available.
January 16, 2007
News : Netflix Now Offers Instant Online Movie Streaming
Only a small percentage of customers has it available at the moment, but they hope to roll it out to everyone within six months.
January 15, 2007
PHP : SPAW Editor 2 Released
SQL Hacks
"Many of the recipes in SQL Hacks will improve the SQL you write day to day, and many will give you the confidence to attempt much more involved tasks with SQL. Other recipes will rarely if ever be needed, but make for a entertaining and education reading in a similar way that "worse case survival scenario" books do — SQL is pitted against the most difficult analysis tasks just as survival scenario books pit humans against pavement and lions. SQL Hacks fits well in the Hacks series, which raises the bar on advanced books by offering large, eclectic sets of tricks for problems that an unambitious person (a non-hacker) wouldn't ever push technology hard enough to run into. Put another way, the questions answered in a good Hacks book are ones that would get a "good question" comment rather than a an "RTFM!" response. It does a good job continuing where O'Reilly's SQL Cookbook left off, which is always difficult with two books written at slightly different times by different authors. Still, it's harder to review a Hacks book than a Learning book as, with hacks, the sky is the limit, and the reader will always find herself wishing for more. To this end, I hope O'Reilly continues to publish newer editions of their various Hacks books, drawing in more and more content in each edition, and identifying recipes that might better serve in the Cookbook counterpart."
Read the rest of Scott's review. SQL Hacks
author Andrew Cumming & Gordon Russell
pages 386
publisher O'Reilly & Associates
rating 7
reviewer Scott Walters
ISBN 0-596-52799-3
summary Tips & Tools for Digging into Your Data
SQL Hacks skips most of the tutelage and shows you very specific ways for doing specific chores, with more explanation of how to adapt it than theory behind it. Most hacks have database specific information for the five databases the book tackles, and many hacks are inherently different on each system, making them completely different solutions to the same problem. Those five databases are Microsoft Access, Microsoft SQL Server, MySQL, Oracle, and PostgresSQL; most of the ideas require work to adapt or are completely specific to the database system, so I wouldn't suggest straying from this supported set. The authors did their homework, and SQL Hack's strengths are the depth, detail, and level of knowledge with which each database system is covered, and the book's willingness to get down and gritty. There's never an impression that juicy details were omitted because the authors didn't want to expend the effort to pick a colleague's brain or hunt down a factoid that never got documented elsewhere. Learning how to create indices on functions with multiple arguments in Postgres was worth more than the "hack" it was a footnote in. This dedication carriers over to screen shots showing how something is done in Microsoft Access directly opposite Unix shell pipelines between grep, perl, and the SQL command shell. Most books, including mine, are a bit awkward or vague on either Unix or Microsoft Windows, but the author's and contributor's experience on this one expertly covered platforms specific database topics. Besides just database systems and platforms, the authors challenged themselves to show how to securely and efficiently use the database interfaces of a set of languages: C#, Java, Perl, Python, and PHP. The polish shows, and you'll have absolute confidence that all of the tricks really are at your fingertips, regardless of your choice of operating system, database system, or programming language.
It gets bonus points for mentioning non-obvious types of input, such as cookies, that must be sanitized or sent through bound parameters, in its discussion of SQL injections. In the security department, it looks at SQL injections from three points of view: early on in the book, correct code is shown; later, SQL injections are shown from the point of view of the attacker, with several pages of strategies and scenarios for formulating attacks; and then from the point of view of the defender, who has to defang and avoid these scenarios — extra bonus points for this comprehensive treatment.
If you're looking for a quick buy/don't buy indication, then, by all means, buy it. That is, assuming that it's not intended to be your first or only SQL book. By it's own indication, it won't teach you the basics of database normalization, installation, and so forth. I would buy it as a second SQL book, though, after the fantastic 'The Practical SQL Handbook', as it's written to a much higher standard than most books, and gets things right, such as security, the intricacies of using a database to handle accounts, and transactions and shopping carts. The cover text promises lots of advanced hackery, but that's vague. "Pushing the limits of SQL"... "Solve puzzles using SQL"... "Manage users and audit the changes they make to the database".
Here are the major sections: SQL Fundamental; Joins, Unions, and Views; Text Handling; Date Handling; Number Crunching; Online Applications; Organizing Data; Storing Small Amounts of Data; Locking and Performance; Reporting; Users and Administration; and Wider Access.
Wider Access requires some explanation. It deals with locking down the various database systems to securely providing guest accounts, or, more generally, to limit damage in the case of an SQL injection attack or similar compromise.
With some well designed tables, SQL Hacks will show you quite a few tricks, some of them quote involved, quite non-obvious, and quite clever, to extract meaning from the data. You'll probably learn quite a few new types of reports you can do — intersecting ranges from different sets of data, outputting SVG pie charts, swapping rows and columns, finding medians, computing running totals, and computing running functions such as compound interest struck me as the most useful and got mental bookmarks.
I have two metrics for this book. The first metric is whether I'd buy it if I came across it in a book store, and that's a function of whether I'd have exhausted what it had to offer after an hour or so of furious skimming and intentionally picking out the best parts from the table of contents. Very few books make this cut for me.
The other metric is whether the authors did at least what I imagine I would have done were I writing it. This test is also a difficult one but builds in a great deal of forgiveness as my ideas are quite likely dumb ones.
I totally dig the cut-and-paste ASCII query results. The authors could have easily marked all of those up in DocBook and made it prettier but also alien compared to what you'll see at the computer. They're not ashamed of the SQL command shell, and they're not ashamed of SQL.
Many hacks have several examples, covering the problem with different constraints and end goals in mind.
Multi-platform, and thoroughly so. One moment, it's showing how to use XSLT tools from the command line on Microsoft Windows, and on the next page, there's a Unix shell pipeline with wget, xsltproc, and grep. Perl one-liners abound, and there are screen shots from Windows applications with instructions for navigating the menus and setting the needed options. You won't feel shortchanged for running the "wrong" platform.
When a powerful, modern SQL extension, such as replace, gets ratified by the standards committees, the authors let you know. Sidebars are spread around sharing the good news that sometime you might not have heard of before is portable. At the same time, some features are just fluff, and you're warned off of operations intentionally left out of the SQL92 standard.
Sometimes database systems have non-portable local extensions, such as MySQL's full-text indexing and SQLServer's XML handling features, and lots of these get motioned too, usually as variations on examples demonstrating the feature as a short-cut or simplification.
The treatment of security is first rate. The polish is top notch. Writing a book is a huge undertaking, and the economics of book publishing gives publishers little margin for advances. A book that reads like it's third release but is actually in its first can only be the product of an exceptional level of dedication by the authors.
Rarely, the authors do get tutorial-ish, but only a little, and I think it works: "Choose the right join style for your relationship" deals the difference between inner and outer joins, and whether records should be partially populated with nulls or omitted entirely when relations between tables can't be made for a record. Another section shows how to convert between subqueries and outer joins, and talks about when it's possible, and this serves as a sort of lesson in demonstrating the equivalencies between the two.
The "Hacks" format is similar to the "Cookbook" format. Both offer small, randomly-accessible (flip to it when you need it) examples of how to accomplish various tasks. In the traditional, MIT circles, a hack is piece of work that's either brilliant in its simple elegance or else brilliant in its expediency and simple effectiveness, and as such, is worthy of some esteem. It's also work that's custom for a particular scenario and has limited domain — in other words, it's a highly specialized fix or improvement. If a stock fix is applied systematically, that's mechanical, not clever. By this definition, showing users how to invoke their SQL monitor, or showing users how to decide whether to use an outer or inner join, are not hacks. Few of the recipes triggered this peeve, and they were early in the book, but including those few muddles the question of who the audience is, and lowers the standard for the Hacks series, endangering its basic premise. 'SQL Hacks' isn't alone in this sin; most of the Hacks books do it to some degree.
It was written by two professors at Napier University in Edinburgh, Scotland. The style, grammar, and presentation are perfectly fine — but only that. It's not a bone dry college text book, but it was written with a dedication to professionalism that can make a technical book tedious and will certainly keep it from becoming a classic. The literary power of Brooks, Hoare, or Wall is conspicuously absent.
Authors of Hacks books are at liberty to tap the experiences of the best and brightest of the field, and the best and brightest often have tricks just too strange, clever, or specialized to fit into any ordinary sort of text. I'd like to imagine that if I were charged with writing one of these, I'd have hundreds of contributors (I'm not likable, but I am persistent). Nothing against the contributors (two of them more than 20 years experience each), but why stop at three?
I said I had two benchmarks: whether I'd be likely to walk out of a bookstore with it if I had an hour alone with it to try to get my fill, and whether it touched on the subject that I thought it should.
Before cracking the cover, I stopped to ponder what would really impress me, and what I'd like to see. The Internal Functional Programming Competition had a puzzle solved by the contest winner using SQL. I'd like to see similar combinatronics and optimization problems solved using SQL. I'd like to see a good implementations of semi-infinite-strings, the text indexing data structure and algorithm that Google uses. I've done a version of this, but my implementation leaves something wanting. When reforming badly non-normalized databases, I've had to build a normalized database in parallel and populate it from queries on the non-normalized one. It would be interesting to hear how other people approach that problem, and what I can learn from them. There are other jobs that I've tackled and managed despite never having been prepared for. Renumber a display_order priority on records in response to the user adjusting or reassigning priorities. Trees using self-joining tables is something more people should be exposed to, especially when presented with non-normalized data.
There was no semi-infinite-string implementation, but the book showed how to build full-text indexes the optimal way for each database, using built-in full-text indices and optional add-on modules offering full-text indexing. The renumbering example took the more general form of running-totals computations. There were a few examples of self-joining data, and one tree example visualized the structure. Normalizing data had tricks, including some with views, and it showed how to use Cartesian joins to do combinatronics problems. So, aside form one sort-of, the authors nailed my entire wish list. That's amazing — I've never had that happen before, actually.
The highest endorsement a book can earn from me (a cheapskate, who already has a good deal of knowledge from working the industry for ten years) is getting bought on a random trip to the bookstore where I hadn't been looking for or intending to buy anything, and paying full price on top of that. Books that are surprising, riveting, and so packed with information that I couldn't possibly copy all of the best parts down and exhaust it in an hour or two are the ones that get purchased in this manner. I have 'SQL Hacks' in my hot little hands here at home, so this benchmark is now synthetic, but... I'm somewhat undecided, and not sure whether I would or wouldn't walk out with it. More likely, I'd just put it on my wishlist and pick it up later, for a discount (I'm a cheapskate, remember). If you don't know how to do more than half of the things listed in the table of contents, most certainly buy it. If you find yourself frequently working with SQL and constantly face new problems, buy it. If you find yourself still learning SQL and wanting a variety of examples, buy it. If you're shopping for a handful of good SQL books, buy it.
On a scale of stuff laying around the house, I give it 7 gold stars, half a box of binder clips, some AA batteries, and a bottle of really good soy sauce.
News : The Trouble with Physics
"You've likely heard of Lee Smolin's book The Trouble with Physics. It has created a lot of controversy because it argues that string theory gets far too much attention and money, despite a complete lack of evidence. It accuses string theorists of groupthink. Smolin has dabbled in string theory from time to time but he's a proponent of the alternative loop quantum gravity. Although irrelevant to this book review, he has also suggested that it is possible that universes reproduce via black holes, making them prone to pressure similar to natural selection (universes that produce a lot of black holes are more successful spawners than those that don't). In The God Delusion, Richard Dawkins quotes Nobel-winner Murray Gell-Mann as once saying, "Smolin? Is he that young guy with those crazy ideas? He may not be wrong.""
Read the rest of SpaceAdmiral's review.
The Trouble with Physics
author Lee Smolin
pages 392pp
publisher Houghton Mifflin Company
rating 9
reviewer Fane Henderson
ISBN 0618551050
summary The Rise of String Theory, the Fall of a Science, and What Comes Next
The Trouble with Physics is very unlike most pop-physics books not only in its criticism of string theory, but in its open adulation of Einstein and skepticism of the Copenhagen interpretation of quantum theory. Having said that, it does provide a very decent summary of 20th century physics (including string theory) for laypeople, not unlike more traditional pop-physics books (e.g. by Hawking and Greene).
The book's main criticisms of string theory are that it makes no testable predictions and that some things string theorists take for granted haven't been rigorously proven mathematically. Smolin is highly skeptical of many string theorists' reliance on the Anthropomorphic Principle.
The book becomes most interesting somewhere in the middle where he discuses truly controversial approaches to physics. This includes things like MOND, which, interestingly enough, Smolin is skeptical of.
In case you've forgotten your high-school physics, I'm going to use this paragraph to refresh your memory of special relativity to prepare you for the next couple paragraphs. The basic idea of special relativity is that the speed of light is constant. Pretend that I am shining a light at you while (A) standing still relative to you; (B) moving towards you at half the speed of light, and; (C) moving away from you at half the speed of light. In all three scenarios, I will accurately measure the light moving away from me at 3,000,000 km/s and you will accurately measure the light moving toward you at 3,000,000 km/s. To ensure this result, distances and times will have to be different for me than they are for you, except in case (A).
Now I'll quickly remind you of the Planck length: This is a theoretical limit on how small something can be. According to Smolin, all versions of quantum gravity seem to suggest the Planck length as a limit. But would observers moving relative to each other disagree about the Planck length?
I used to be a big fan of MOND (in a layperson sense) until Smolin introduced me to DSR (doubly special relativity) and DSR II. The basic idea is that it may be possible to modify the theories of relativity such that observers agree not only on a constant speed of light, but also on a constant Planck length. It's not unreasonable to guess that a modification of this sort could solve some of the same problems MOND does (e.g. explain astronomical observations without resorting to dark matter and dark energy). Furthermore, since DSR in its current incarnation predicts that more energetic photons are slightly faster than less energetic photons (only the speed of the least energetic photons is constant in DSR), it could also explain away, for example, inflation in the Big Bang model. (Immediately after the Big Bang, everything was hotter and more energetic, so the average speed of light would have been faster than it is now if DSR is correct.) Although I'm not qualified to judge the actual mathematics of such a theory, I find it very appealing for reasons of consilience.
I was slightly disappointed with the final chapters of Smolin's book since, despite an obvious effort to the contrary, it struck me as awfully bitter and reeked of sour grapes. Leaving physics in favor of sociology, he lambasted the current tenure and peer review systems (particularly in the United States) as favoring Master Craftspeople (like those scientists who developed the standard model of particle physics) over Seers (like Einstein, Bohr, and de Broglie) who look at the deep questions of physics that border on the philosophical rather than the latest technical problem. A few interesting things do emerge in these chapters. One such thing is that Smolin seems to have a soft spot for Paul Feyerabend as a philosopher of science (despite describing himself as a proud Popperazzo in an endnote). Another is that Smolin thinks a scientist who is hated by half his senior colleagues and loved by the other half is likely better than a scientist who is liked by all his senior colleagues. I strongly recommend this book.
January 11, 2007
News : VeriSign Puts Flaw Bounty on Vista and IE7
News : Paypal Won't Release Funds To Slain Soldier's Family
robustyoungsoul writes
"Popular sports blog Deadspin established the Adam Knox Fund for the purpose of raising money in honor of the fallen soldier who was killed in Iraq. They took the donations through a PayPal account. Turns out now, however, PayPal will not release the money due to the way the account was set up on their end."
News : Apple iPhone
"We're calling it 'iPhone,"' Apple Inc. CEO Steve Jobs proclaimed yesterday at Macworld. But just how long he'll be able to do so has just been cast in doubt, as Reuters has reported minutes ago that Cisco Systems - which holds the 'iPhone' trademark after its Linksys division acquired Infogear in 2000 - has filed suit against Apple claiming trademark infringement.
Although Linksys has had the right to use the word since its Infogear acquisition, for use with telephony gear, it only began doing so last month, renaming its WIP product line of VoIP devices.
January 10, 2007
YouTube May Look Offline for Growth
The Wall Street Journal is reporting that YouTube is considering moving into the offline world by offering videos on television. Additionally, the company is working on a system that would allow content owners to better control their content by either blocking it, or charging for it if they so desire.
One begins to wonder how much of this most recent initiative is being pushed for by Google, who purchased the site in October of last year for $1.65 billion. With such a large investment, you have to think the search giant is looking for other ways to generate revenue.
Either way, the company is saying its “looking at the options.” Exactly what that means for YouTube’s future plans is anyone’s guess.
News : The Buzz: iPhone Reaction Mostly Positive
While most of the media (including ourselves, admittedly) was agog over the announcement of the phone, reaction to it from the tech punditry was a little less positive. While some did see it as a "game changing" device, others lamented the high price, and others were unhappy with the lack of 3G or exclusivity through Cingular. We've included a sampling of their comments below.
What do you think? Leave your thoughts on the iPhone below this article.
"This product is revolutionary and is critical for Apple's future success in the mobile music market. It could become the de facto standard in this space and will set a very high bar that competitors will have to deal with in the future."
- Tim Bajarin, Creative Strategies
"The big news was clearly the iPhone and what a great looking device it is both in terms of form and function. It totally defines carressability. Let's face it, this is the most anticipated telephone since Alexander Graham Bell's original."
- Michael Gartenberg, Jupiter Research
"It is sweet irony that the company that sparked off the desktop computing revolution is the one announcing its passing. Dropping Computer from its name is a sure sign that Apple, from this point forward, is a consumer electronics company, a mobile handset maker - one that also makes computer hardware and software as well."
- Om Malik
"In a twisted way, this is one rumor mill we're almost sad to see grind to a halt."
- Engadget
"Ok, so how is this different then my Palm Treo 650? I can go online, play all the MP3's I want, and of course it's a phone. Not to mention it has 10,000 programs you can download . I guess it's different because there is a picture of an Apple and it the word iPod is there."
- BetaNews reader "ladylust"
"Cingular only. HAHAHA! DOA."
- BetaNews reader "drumcat"
"If the iPhone works as advertised, they're going to sell a ton and really bring 'smart phones' to the masses (despite the $500-$600 price tag) - along with music and video."
- Dave Zatz, Zatz Not Funny
"Apple had to impress at this year's MacWorld to distract from their recent options issues, and with the iPhone and Apple TV, they surely have."
January 08, 2007
News : Metalink Makes Large Downloads Easier
MetaLink is a new technology that makes it easier and faster to get large files. It's kind of like a playlist for such files (they can be FTP, HTTP, or P2P), because it stores multiple file locations in a single file - and then the download proceeds according to a set of rules.
The Wikipedia page for metalink describes it like this:
"Metalink is an open standard/framework for programs that download (download managers, BitTorrent clients, Web browsers, FTP clients, & P2P programs). For increased convenience, it stores the many locations of files (FTP/HTTP/P2P) in a single file (a .metalink) for extra reliability in case one method fails and so chunks/segments of each file can be downloaded from multiple resources at the same time (known as accelerated/multi-threaded/segmented downloading)."
For developers, metalink files are made up of XML and they are extensible. They also work across multiple operating systems. For ordinary users, metalinks apparently make downloads "simpler, faster, and more reliable".
News : Bill Gates CES Keynote 2007
Bill Gates' keynote at CES was webcast live by Microsoft. This keynote was entitled 'Connected Experiences' and a relaxed-looking Bill Gates kicked things off by cracking a joke about how, at future CES appearances, he might talk about infectious diseases (referring to his increasing involvement in philanthropy work).
The Digital Decade
He starts off by discussing "the digital decade", noting in particular digital photography and the Internet. He says 65% of homes have digital cameras, there's more broadband penetration now, and 40% of homes have multiple computers. As far as Microsoft devices go, he says there will be more high definition and use of advanced graphics in games and virtual reality - "presentation richness" he calls it. He also talks about the terabytes and petabytes of storage being made available now.
Although he says "we have amazing hardware" (referring to hardware in general, not necessarily Microsoft's), he thinks there are some key things missing - especially "connections". He gives the usual Microsoft refrain about multiple devices connecting people together, via the Internet. Interestingly he also notes that it's not just a consumer experience - but spans into the business environment too.
Foundational Products
He then talks about the "foundational products" that Microsoft has coming into the market. Firstly he notes Vista, "the highest quality release [of Windows] we've ever done". He says Vista and the PC "continue to have a central role, all these devices have to work together."
He also notes the importance of Office 07 - saying that Office and Windows Vista will work closely together. With Office 07, there is a new UI (with improved richness) and it will connect up to Office Live services.
Vista Media Center
Vista Media Center is an interesting product. The demo showed on stage focused on live HD TV and rich on demand media services. They showed off Sports Lounge, a partnership with Fox Sports. It gives users real-time sports scores, real-time alerts, and ability to track fantasy teams. There was also talk about new content partnerships in Media Center, which is another familiar Microsoft strategy (partner with as many major content/service providers as possible).
Windows Ecosystem
Bill then discusses the ecosystem of windows. Services are key for connecting up software and hardware to online. He says s/w developers are doing all kinds of apps for vista - sidebar, using search APIs, visualizations (WPF and more), etc. The general theme here is the "enablement of hardware and software partners".
Connected Entertainment
Robbie Bach bounds onto the stage to talk about connected entertainment. Content and community are the two key concepts here. He starts off with music - noting the MTV Urge partnership launched at last year's CES, and also the launch in 2006 of Zune. He says Zune is already the 2nd most popular music device in their segment.
News : Hacking 2.0: Today's Hackers Target Web, For Money
Web Security firm Finjan has just released their Q4 2006 report on web threats, which includes describing two cases of web 2.0 hacker attacks, on Wikipedia and MySpace. What's more, the report says that hacking the Web is very much a commercial activity nowadays - which is keeping Web security companies like Finjan on their toes heading into 2007. The report also makes some predictions around web security for 2007.
You may remember that R/WW covered the Q3 Finjan report, which outlined threats to Web 2.0 and Ajax websites. The Q4 report extends that theme and notes that the dynamic nature of the Web complicates security going into 2007. It states:
"2006 saw the arrival of a diverse range of web-based infection techniques -- including rogue anti-spyware, ransomware, and rootkits -- that elude traditional security solutions geared to protect against email viruses and spam. Another development in 2006 was the commercialization of malicious code, as financial motivations played an increasing role in the evolution of malware. Motivated by financial gain, hackers are trading vulnerabilities in online auctions, commercializing products such as malicious website creation toolkits, and developing new distribution techniques, including spam, for the propagation of malicious code."
Finjan predicts that in 2007, Web 2.0 platforms and technologies will increasingly be used by hackers as a "legitimate" tool for distributing malicious code. Also they predict that, as Windows Vista and Internet Explorer 7.0 begin to achieve critical mass, this "will likely trigger a new wave of exploits from professional hackers who have had time to prepare in advance for this scenario."
Two Hacking 2.0 Cases: Wikipedia and MySpace
Regarding the two specific Web 2.0 cases discussed in the report, the methods used involved spam and phishing. Firstly here is the Wikipedia case:
"This scam was detected and published by Sophos in early November 2006. Taking advantage of the fact that Wikipedia allows anyone to create and modify articles, hackers uploaded an article to the German edition of Wikipedia (de.wikipedia.org) including a link to a fix for a supposedly new version of the Blaster worm. However, the "fix" was actually a piece of malicious code. Sophos discovered the scam by intercepting spam messages directing recipients to the Wikipedia article with the malicious code.
Alerted to the problem on their site, Wikipedia immediately fixed the page with the malicious link. However, according to Sophos, the previous version of the page was still present in the archive and continued to point to malicious code. This allowed the hackers to continue to send spam pointing to the archived page on Wikipedia, and infect victims' computers. Wikipedia later confirmed that it had permanently erased the archived version of the page."
And the MySpace case:
"In another incident reported in early December 2006 by Websense, hackers compromised the MySpace social networking site and infected hundreds of user profiles with a worm. This malicious code exploited a known vulnerability to replace the legitimate links on the user profiles with links to a phishing site, where victims were asked to submit their username and password. In addition, according to Websense, the worm embedded infected video in victims' user profiles."
Finjan writes that Web 2.0 has "opened the door to new propagation methods for malicious code." They also claim that since the vast majority of these sites are considered "trusted" or legitimate by URL Filtering products, "they will not be blocked despite the fact that they contain malicious code." Finjan notes that the term 'infection by proxy' was coined to describe this attack vector using Web 2.0 sites.
Hack for Dollars
What's perhaps most concerning about this report is Finjan's contention that hackers nowadays are focusing a lot on web-based infection techniques - and that a commercial market has evolved around this. Whereas in the 'old days' the motive of hackers was to gain fame, today it is all about the money. Indeed Finjan says that commercialization of malicious code was the most significant trend in the web security arena during 2006. Here's a graph from Finjan illustrating this:
So this is something to be wary of for web apps and service providers. Along with Web 2.0, we now have Hacking 2.0 to contend with!
AI Favored Search 2.0 Solution
In the current Read/WriteWeb poll (see below), we're asking what 'search 2.0' concepts you think stand the best chance of beating Google. The results so far are interesting, because Artificial Intelligence is currently top pick - despite having a history of underachievement in the tech industry and there being no real AI search contenders yet. Hakia, which we profiled recently, is one such AI (or natural language processing) search engine. But Hakia is at this stage a fair way off being a finished product.
Poll results so far:
1. Artificial Intelligence (e.g. Hakia, Powerset) 23% (123 votes)
2. People Powered Search (e.g. del.icio.us, ChaCha) 21% (115 votes)
3. Vertical Search (e.g. SimplyHired, Technorati) 15% (81 votes)
4. Personalized Search (e.g. Collarity) 12% (63 votes)
5. Clustering (e.g. Clusty, SearchMash) 11% (58 votes)
6. Social Search (e.g. Eurekster, Rollyo) 7% (37 votes)
7. Visualization (e.g. Quintura and Kartoo) 6% (33 votes)
8. Previews (Snap, Live Image Search) 5% (25 votes)
Alex Iskold, in his R/WW post The Race to Beat Google, was skeptical of AI search:
"Based on what we have seen so far, it is difficult to see how these companies can beat Google. Firstly, being able to enter the query using natural language is already allowed by Google, so this is not a competitive difference. It must then be the actual results that are vastly better. Now that is really difficult to imagine. Somewhat better maybe, but vastly different? Unlikely."
But it seems R/WW readers beg to differ. 23% of you think AI search is the most likely approach to challenge Google.
January 03, 2007
News YouTube's Content Identification Failure Raises Eyebrows
"If the delay lasts for more than a week or two into the new year, suggesting more than just a slight technical hitch, 'this is certainly going to be a serious issue', [Mike McGuire, a digital media analyst at Gartner] added. Leading music companies have already made clear they see completion of YouTube's anti-piracy technology as an important step in any closer co-operation. Failure to build adequate systems to protect copyright owners could also add to the risk of legal action against the site."
News : Starbucks Responds In Kind To Oxfam YouTube Video
"Last week, Starbucks placed a video on YouTube responding to a video posted by the Oxfam Charity. The Oxfam video was launched in conjunction with 'Starbucks Day of Action,' held December 16th, when activists visited Starbucks locations across the world in protest of the coffee retailer's alleged mistreatment of Ethiopian farmers. The Starbucks video calmly addresses the Oxfam allegations, citing an impasse over Ethiopian trademark legalities. Starbucks claims the refusal to sign a trademark agreement with Ethiopia is a stumbling block they hope to resolve on behalf of the farmers. The coffee chain's representative goes on to refute the contention that Starbucks refuses to pay a fair price for its coffee reserves and, in fact, routinely pays well above commodity price, and above fair trade price. Unlike many recent ineffectual corporate reactions to social journalism and networking eruptions, Starbucks' response is unique in that the corporation managed Oxfam's unconventional assault in a very unconventional way, via YouTube. Regardless of the outcome of this particular incident, the move on Starbucks' part comes off as unmistakably in touch with today's communication modes and methods."
News : Tamil Nadu (India) Shutting the Door On Microsoft
"The government of Tamil Nadu, a state in southern India, has begun initiatives to convert all of their IT systems fully to OSS-based software. (The link is a copy of a news item that appeared recently in the Deccan Chronicle, an English-language daily.) The managing director of the IT procurement, consulting, and training agency for the Tamil Nadu government describes the reasons why he has chosen OSS, and also how he dealt with Microsoft executives."
From the article:
"Initially, 99 per cent of government systems have been running on Microsoft systems but then 2007 will be a watershed year for the state IT sector... We have already dispatched 6,500 Linux systems to village panchayats and another 6,100 Acer desktop systems with Suse Linux operating systems are on their way. We are procuring 20,000 desktop systems for schools, which will run only on Suse Linux... I require at least 500 trainers to train 30,000 state officials across Tamil Nadu in the next six months."