Skip to main content

Home/ Open Web/ Group items tagged Competition

Rss Feed Group items tagged

Gary Edwards

Is Oracle Quietly Killing OpenOffice? | Revelations From An Unwashed Brain - 1 views

  •  
    Bingo!  Took five years, but finally someone gets it: excerpt:  Great question. After 10 years, OpenOffice hasn't had much traction in the enterprise - supported by under 10% of firms, and today it's facing more competition from online apps from Google and Zoho. I'm not counting OpenOffice completely out yet, however, since IBM has been making good progress on features with Symphony and Oracle is positioning OpenOffice for the web, desktop and mobile - a first. But barriers to OpenOffice and Web-based tools persist, and not just on a feature/function basis. Common barriers include: Third-party integration requirements. Some applications only work with Office. For example, one financial services firm I spoke with was forced to retain Office because its employees needed to work with Fiserv, a proprietary data center that is very Microsoft centric. "What was working pretty well was karate chopped." Another firm rolled out OpenOffice.org to 7,00 users and had to revert back 5,00 of them when they discovered one of the main apps they work with only supported Microsoft. User acceptance. Many firms say that they can overcome pretty much all of the technical issues but face challenges around user acceptance. One firm I spoke with went so far as to "customize" their OpenOffice solution with a Microsoft logo and told employees it was a version of Office. The implementation went smoothly. Others have said that they have met resistance from business users who didn't want Office taken off their desktop. Other strategies include providing OpenOffice to only new employees and to transition through attrition. But this can cause compatibility issues. Lack of seamless interoperability with Office. Just like third-party apps may only work with Office, many collaborative activities force use of particular versions of Office. Today's Web-based and OpenOffice solutions do not provide seamless round tripping between Office and their applications. Corel, with its
Gary Edwards

Microsoft's Cracked Windows: How The World's Technology Juggernaut Lost Its Buzz And Be... - 1 views

  •  
    Excellent article on the surprising decline and increasing irrelevance of Microsoft. excerpt: All of this has diminished the biggest number of all: After reaching a peak market capitalization of $642 billion in September 2000, Microsoft's worth has been sliced in half. These reversals have occurred even as Microsoft has spent astronomic sums on research and development--$8.7 billion in the last year alone. Microsoft has also lost ground in key areas in which the Redmond giant had viable contenders well before the competition. Microsoft saw the potential of television in the mid-1990s with WebTV, years before companies like Apple and Google took up the battle for the living room. In short, changing appetites of the marketplace, technological evolution and questionable decision-making inside Microsoft itself have combined to accomplish what antitrust regulators never did: rolling back the company's dominance and opening the terrain for newer, nimbler entrants.
Gary Edwards

Businesses Looking to Cloud Computing to Enhance Productivity: Report - Midmarket - New... - 0 views

  •  
    "Based on the results of this survey, it's clear that SMBs see the value of cloud-based solutions and are eager to benefit from a productivity and ROI perspective," said Fonality president and CEO Dean Mansfield. "Cloud-based communications tools in particular can be leveraged by companies to drive competitive differentiation while maximizing working capital." Minimizing total cost of ownership is the "ultimate goal" of adopting service-based offerings, according to survey results, while mobility and UC were recognized by a strong majority of those surveyed as key technologies to increase efficiency and profitability. Most respondents saw their current communications solutions as being "good," but 78 percent also seek to improve their capabilities. There was a very high amount of interest in cloud-based solutions and an "excellent prognosis" for cloud-based AaaS (Anything as a Service), with market opportunities still emerging "The needs of small and mid-size businesses differ significantly from large enterprises," said Steve Taylor, editor-in-chief and publisher for Webtorials, "This study shows that SMBs have a notable disposition to leveraging cloud-based technology to enhance their operations and their communications capabilities in particular."
Gary Edwards

I, Cringely » Blog Archive » iCloud's real purpose: kill Windows - Cringely o... - 0 views

  •  
    I'm not convinced that iCloud will eliminate Windows, MAC and Linux desktops.  I've been using DropBox, SyncDocs, Live.com while testing a number of backup-store-synch-share file services. IMHO, it's all about the apps that act on your data.  And these can come from the desktop, the Browser, or the device.  The best app platform for Cloud hosted data seems to be moving towards HTML5-JS.  Not Win32, .NET, C#, Java or Cocoa (iOS).  And Google clearly has he best platform of integrated services and API's.  They are best positioned to win the Cloud Wars if HTM5-JS and Native Client can close the deal on Cloud apps.  IMHO. excerpt: Apple's announcements yesterday about OS X 10.7 pricing (cheap), upgrading (easy), iOS 5, and iCloud storage, syncing, and media service can all be viewed as increasing ease of use, but from the perspective of Apple CEO Steve Jobs they perform an even more vital function - killing Microsoft. Here is the money line from Jobs yesterday: "We're going to demote the PC and the Mac to just be a device - just like an iPad, an iPhone or an iPod Touch. We're going to move the hub of your digital life to the cloud." Just like they used to say at Sun Microsystems, the network is the computer. Or we could go even further and say our data is the computer. This redefines digital incumbency. The incumbent platform today is Windows because it is in Windows machines that nearly all of our data and our ability to use that data have been trapped. But the Apple announcement changes all that. Suddenly the competition isn't about platforms at all, but about data, with that data being crunched on a variety of platforms through the use of cheap downloaded apps.
Gary Edwards

'Returnees' dominate Chinese startup culture - Tech News and Analysis - 0 views

  •  
    excerpt: In China, the red-hot tech scene seems dominated by a small group of entrepreneurs who paid their dues in Silicon Valley before returning home to create successful Internet and software startups. Aside from finding fame and fortune, these "returnees" are also laying the foundation for a startup culture that will allow grassroots entrepreneurs to flourish as well. Returnees - Chinese nationals who studied or worked the U.S. - head up just 3 percent of all tech companies in China, yet they represent nearly 70 percent of all startups that go public in the U.S. market (still the largest measure of success in the industry), according to an internal study by Palo Alto, Calif.-based venture capital firm GSR Ventures, which deals exclusively in China. The firm also found startups created by returnees were much likelier to become financially successful and hire more employees than startups founded by Chinese entrepreneurs who never worked in the U.S. Part of that may be cultural: a culture Jack Jia, a partner at GSR sees changing, albeit slowly. he still sees a "drastic" disparity between startups founded by home-grown entrepreneurs and their returnee counterparts during pitching sessions and business plan competitions all across China. Thus, he rarely funds companies headed up by Chinese engineers without managerial-level experience at tech companies in the U.S., even though he would like to encourage the growth of Chinese entrepreneurs who have stayed at home. "Most have no clue what they are doing. The basic expertise, the passion and experience is often lacking," he said. "And it's not that they don't have the same talent or ability, it's just they haven't been exposed to the same things as their American counterparts."
Dimple Patel

Important aspects of SEO Content Development - 0 views

  •  
    While designing a web page, you should make sure that enough efforts are put into optimizing the content of the page. A competitive keyword will, without doubt, show up around 30 to 50 million search results. Of these, the first 10 to 100 web pages will tie for number one. If the content on your web page is not optimized for a particular keyword, there will be many other web sites that have been.
Gary Edwards

Cloud Computing Set to 'Skyrocket,' Driven by Economy: Survey - Forbes - 0 views

  •  
    Cloud computing is becoming more than a tactical measure adopted by managers and professionals seeking quick solutions to business and technical problems. It is increasingly being seen as a strategic initiative. Not only are most executives now planning to adopt some form of cloud computing for their organizations, they also expect these technology services to help position their organizations to succeed in today's rough-and-tumble economy. These are some of the findings of a new survey of 900 executives released by KPMG International and Forbes Insight. The majority, 81%, say their organizations have already moved at least some business activities to the cloud and expect 2012 investment "to skyrocket, with some companies planning to spend more than a fifth of their IT budget on cloud next year," the study finds. Economic factors were cited by 76% as an important driver for cloud adoption, bringing strategic benefits such as transforming their business models to gain a competitive advantage. Other considerations for moving to cloud computing include improving processes to offer more agility across the enterprise (80%), and offering technical benefits that they otherwise could not gain from their own data centers (76%). Eighty-seven percent of executives feel that the changes delivered by cloud will be "significant." This view is consistent among companies of all sizes and whether the respondents work within IT functions or business units.  KPMG summarized the transformative effects cloud is delivering:
Gary Edwards

Microsoft's secret 'screw Google' meetings in D.C. -- DailyFinance - 0 views

  •  
    The more things change, the more they remain the same. Excerpt: Microsoft's chief Washington lobbyist has been convening regular meetings attended by the company's outside consultants that have become known by some beltway insiders as "screw Google" meetings, DailyFinance has learned. The meetings are part of an ongoing campaign by Microsoft (MSFT), other Google (GOOG) opponents, and hired third parties to discredit the Web search leader, according to multiple sources with knowledge of the matter. "Microsoft is at the center of a group of companies who see Google as a threat to them in some combination of business and policy," said a source familiar with the matter, who requested anonymity to avoid retribution. "The effort is designed make Google look like the big high-tech bad guy here." Microsoft lobbyist, the Law Media Group, has several people who work full-time on Google-bashing. Everybody knows Microsoft is trying to throw roadblocks at Google and knock them off their game. Microsoft is trying to harm Google in the regulatory, legal, and litigation arenas because they're having problems with Google in the competitive marketplace." "This is textbook Microsoft," the source adds. "Microsoft has got some of the best, highest-priced lobbyists that money can buy in Washington."
Paul Merrell

Microsoft Is Said to Be in Talks to Settle EU Cases (Update2) - Bloomberg.com - 0 views

  • Microsoft Corp., which has been fined 1.68 billion euros ($2.34 billion) in European Union antitrust cases, is in preliminary talks to settle two additional probes before EU Competition Commissioner Neelie Kroes leaves office, four people familiar with the negotiations said. Any agreement would have to resolve a case over Microsoft’s Internet browser as well as a separate investigation into word processing and spreadsheet software, said the people, who declined to be identified because the talks are confidential.
  • The commission has said it is considering forcing the Redmond, Washington-based company to offer consumers a choice of browsers when setting up a new personal computer on a so-called ballot screen. Microsoft responded by saying it would ship Windows 7 operating-system software without Internet Explorer to avoid breaking EU law.
Gary Edwards

The Rise of the Microsoft Monopoly - 1 views

  •  
    Microsoft claims that WordPerfect fell into disfavor because it came late to Windows; Novell, which owns the WordPerfect Office technology (after selling the rest of the company to Corel), claims that Microsoft unfairly used its knowledge of Windows APIs to give itself a competitive advantage. There's one very solid piece of evidence in Novell's favor - a 1994 email from Bill Gates that states: "I have decided that we should not publish these extensions. We should wait until we have away to do a high level of integration that will be harder for likes of Notes, WordPerfect to achieve, and which will give Office a real advantage . . . We can't compete with Lotus and WordPerfect/Novell without this."
Paul Merrell

Microsoft Demos Real-Time Translation Over Skype - Slashdot - 0 views

  • "Today at the first annual Code Conference, Microsoft demonstrated its new real-time translation in Skype publicly for the first time. Gurdeep Pall, Microsoft's VP of Skype and Lync, compares the technology to Star Trek's Universal Translator. During the demonstration, Pall converses in English with a coworker in Germany who is speaking German. 'Skype Translator results from decades of work by the industry, years of work by our researchers, and now is being developed jointly by the Skype and Microsoft Translator teams. The demo showed near real-time audio translation from English to German and vice versa, combining Skype voice and IM technologies with Microsoft Translator, and neural network-based speech recognition.'"
  •  
    Haven't yet explored to see what's beneath the marketing hype. And I'm less than excited about the Skype with its NSA tendrils being the vehicle of audio translations of human languages. But given the progress in: [i] automated translations of human texts; [ii] audio screenreaders; and [iii] voice-to-text transcription, this is one we saw coming. Slap the three technologies together and wait until processing power catches up to what's needed to produce a marketable experience. After all, the StarTrek scriptwriters saw this coming too.   Ray Kurzweil, now at Google, should get a lot of the pioneer credit here. His revolutionary optical character recognition algorithms soon found themselves redeployed in text-to-speech synthesis and speech recognition technology. From Wikipedia: "Kurzweil was the principal inventor of the first CCD flatbed scanner, the first omni-font optical character recognition, the first print-to-speech reading machine for the blind, the first commercial text-to-speech synthesizer, the first music synthesizer Kurzweil K250 capable of recreating the grand piano and other orchestral instruments, and the first commercially marketed large-vocabulary speech recognition." Not bad for a guy the same age as my younger brother. But Microsoft's announcement here may be more vaporware than hardware in production and lines of executable code. Microsoft has a long history of vaporware announcements to persuade potential customers to hold off on riding with the competition.  And the Softies undoubtedly know that Google's human language text translation capabilities are way out in front and that the voice to text and text to speech API methods have already found a comfortable home in Android and Chromebook. What does Microsoft have that's ready to ship if anything? I'll check it out tomorrow. 
Paul Merrell

Save Firefox! | Electronic Frontier Foundation - 0 views

  • The World Wide Web Consortium (W3C), once the force for open standards that kept browsers from locking publishers to their proprietary capabilities, has changed its mission. Since 2013, the organization has provided a forum where today's dominant browser companies and the dominant entertainment companies can collaborate on a system to let our browsers control our behavior, rather than the other way. This system, "Encrypted Media Extensions" (EME) uses standards-defined code to funnel video into a proprietary container called a "Content Decryption Module." For a new browser to support this new video streaming standard -- which major studios and cable operators are pushing for -- it would have to convince those entertainment companies or one of their partners to let them have a CDM, or this part of the "open" Web would not display in their new browser. This is the opposite of every W3C standard to date: once, all you needed to do to render content sent by a server was follow the standard, not get permission. If browsers had needed permission to render a page at the launch of Mozilla, the publishers would have frozen out this new, pop-up-blocking upstart. Kiss Firefox goodbye, in other words.
  • The W3C didn't have to do this. No copyright law says that making a video gives you the right to tell people who legally watch it how they must configure their equipment. But because of the design of EME, copyright holders will be able to use the law to shut down any new browser that tries to render the video without their permission. That's because EME is designed to trigger liability under section 1201 of the Digital Millennium Copyright Act (DMCA), which says that removing a digital lock that controls access to a copyrighted work without permission is an offense, even if the person removing the lock has the right to the content it restricts. In other words, once a video is sent with EME, a new company that unlocks it for its users can be sued, even if the users do nothing illegal with that video. We proposed that the W3C could protect new browsers by making their members promise not to use the DMCA to attack new entrants in the market, an idea supported by a diverse group of W3C members, but the W3C executive overruled us saying the work would go forward with no safeguards for future competition. It's even worse than at first glance. The DMCA isn't limited to the USA: the US Trade Representative has spread DMCA-like rules to virtually every country that does business with America. Worse still: the DMCA is also routinely used by companies to threaten and silence security researchers who reveal embarrassing defects in their products. The W3C also declined to require its members to protect security researchers who discover flaws in EME, leaving every Web user vulnerable to vulnerabilities whose disclosure can only safely take place if the affected company decides to permit it.
  • The W3C needs credibility with people who care about the open Web and innovation in order to be viable. They are sensitive to this kind of criticism. We empathize. There are lots of good people working there, people who genuinely, passionately want the Web to stay open to everyone, and to be safe for its users. But the organization made a terrible decision when it opted to provide a home for EME, and an even worse one when it overruled its own members and declined protection for security research and new competitors. It needs to hear from you now. Please share this post, and spread the word. Help the W3C be the organization it is meant to be.
Paul Merrell

EUROPA - Press Releases - Antitrust: Commission opens proceedings against MathWorks - 2 views

  •  
    Commission v. MIcrosoft Redux.
Paul Merrell

AT&T Thumbs Nose at Net Neutrality With 'Sponsored' Bandwidth Scheme | Threat Level | W... - 0 views

  • AT&T announced a new scheme today that allows app-makers and websites to pay for the bandwidth you consume using their services — a move digital rights activists say breaches the spirit of net neutrality. The second largest mobile provider is taking advantage of the data caps it imposes on subscribers by letting companies sponsor the bandwidth their wares use. The consumer who enjoys those sponsored services will not have that broadband count against their monthly data allotment. Sponsorship is not mandatory — if a company doesn’t pay AT&T, the bandwidth will count against the user’s cap as always. Online rights groups said the move is anti-competitive and takes advantage of a loophole in Federal Communications Commission rules prohibiting ISPs from favoring one service over the other. For the most part, however, those FCC guidelines adopted in 2010 apply to cable, fiber and DSL internet providers, not wireless ones.
Paul Merrell

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
Gary Edwards

Who Really Wins From Android's Success? | Casey Research - 0 views

  • Gartner recently reported that smartphone sales grew 46.5% in the second quarter of 2013 and exceeded feature-phone sales for the first time. In other words, we're still at the beginning of the dumbphone conversion cycle, and a global revolution in mobile is really just getting started. This revolution is fueling monstrous growth in a less-known market that goes by "MEMS" (micro-electro-mechanical systems).
  • Interest in the technology grew throughout the 1960s, and a number of companies commercialized silicon pressure sensors. Advancements in micromachining and silicon processing in the early 1970s then led to what could arguably be called the first true MEMS sensors, which had particular geometries that yielded superior performance. It was not until three decades later, however, that MEMS were small enough, cheap enough, and reliable enough to begin penetrating the consumer market. Today, the overall MEMS market is fragmented and has an extremely diverse application set comprised of such things as oscillators, microfluidics, compasses, gyroscopes, accelerometers, microphones, and pressure sensors. For our purposes here, we're mostly concerned with MEMS accelerometers and—even more so—MEMS gyroscopes.
  • MEMS accelerometers have been making cars safer for years by triggering airbags in the event of a crash. But manufacturers of the sensors wanted more: a world filled with gadgets that sense and respond to motion. That's exactly the direction we're going in today. In terms of overall value, the global MEMS market is projected to double from over $10 billion in 2012 to more than $20 billion in 2017. To get a leg up on the competition, consumer-electronics device manufacturers have been eager to adopt new device functionalities and create compelling interactive experiences, such as the touchscreen and, more recently, motion-based functions.
  • ...1 more annotation...
  • Nintendo's Wii game console made MEMS accelerometer technology somewhat of a household name. The iPhone took the next step, with portrait/landscape orientation and basic motion gaming, which sent production volumes of MEMS accelerometers skyrocketing and competitors scurrying to catch up, copy, and come up with new motion-based functions. MEMS accelerometers are now standard features in smartphones. And the same thing is happening with MEMS gyroscopes. These represent a fresh way for users to interact with their mobile devices, providing a new set of motion-driven commands that bypass certain touchscreen or hard-key commands while promising more reliability than voice commands. MEMS gyroscopes are expected to be the next big thing in smartphones and tablets. Figures from Yole Développement peg MEMS accelerometer penetration of mobile phones at 37%, while MEMS gyroscope penetration of the handset market is a mere 4%. These figures are projected to climb to 64% and 17% respectively by 2015, as the technology is more widely applied to new mobile devices.
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux ... - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
Paul Merrell

Democrats unveil legislation forcing the FCC to ban Internet fast lanes - The Washingto... - 0 views

  • Democratic lawmakers will unveil a piece of bicameral legislation Tuesday that would force the Federal Communications Commission to ban fast lanes on the Internet. The proposal, put forward by Senate Judiciary Committee chair Patrick Leahy (D-Vt.) and Rep. Doris Matsui (D-Calif.), requires the FCC to use whatever authority it sees fit to make sure that Internet providers don't speed up certain types of content (like Netflix videos) at the expense of others (like e-mail). It wouldn't give the commission new powers, but the bill — known as the Online Competition and Consumer Choice Act — would give the FCC crucial political cover to prohibit what consumer advocates say would harm startup companies and Internet services by requiring them to pay extra fees to ISPs. "Americans are speaking loud and clear," said Leahy, who is holding a hearing on net neutrality in Vermont this summer. "They want an Internet that is a platform for free expression and innovation, where the best ideas and services can reach consumers based on merit rather than based on a financial relationship with a broadband provider."
  • The Democratic bill is another sign that net neutrality is dividing lawmakers along partisan lines. In May, Rep. Bob Latta (R-Ohio) introduced a bill that would prevent the FCC from reclassifying broadband. A Democratic aide conceded Monday that the Leahy-Matsui bill is unlikely to attract Republican cosponsors. The fact that Republicans control the House make it unlikely that the Leahy-Matsui bill will advance very far. Still, the politics of net neutrality are obscuring the underlying economics at stake, according to the aide, who asked not to be named because he wasn't authorized to speak publicly.
  • "People are missing the point," the aide said. "The point is: Ban paid prioritization. Because that'll fundamentally change how the Internet works." FCC Chairman Tom Wheeler has said that he's reserving the reclassification option in case his existing plan fails to protect consumers. He has been reluctant to use that option so far, likely because it would be politically controversial. But increasingly, it seems net neutrality is divisive enough without him.
Paul Merrell

Study: Surveillance will cost US tech sector more than $35B by 2016 | TheHill - 0 views

  • A new study says that the U.S. tech industry is likely to lose more than $35 billion from foreign customers by 2016 because of concerns over government surveillance.“In short, foreign customers are shunning U.S. companies,” the authors of a new study from the Information Technology and Innovation Foundation write.ADVERTISEMENT“The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share,” they said.The think tank’s report found that the cost to the tech sector associated with ongoing concerns over surveillance programs run out of the U.S. was likely to “far exceed” $35 billion by 2016, an earlier estimate set by the group.
  • The group said that lawmakers must enact additional reforms to surveillance policy if they wish to help the tech sector regain the trust of foreign customers. That includes opposing “backdoors,” which allow law enforcement to access otherwise encrypted data, and signing off on trade agreements, including the controversial Trans-Pacific Partnership, that “ban digital protectionism.”The study’s authors found that the revelations about broad U.S. surveillance programs acted as a justification for foreign policymakers to enact protectionist policies aimed at aiding their own domestic technology sectors.Foreign companies have also used the information about U.S. surveillance programs to their advantage.“Some European companies have begun to highlight where their digital services are hosted as an alternative to U.S. companies,” the authors write.
  • American companies, they found, have lost contracts to foreign competitors over fears about mass surveillance.Earlier this month, President Obama signed the USA Freedom Act, a bill that reformed the three Patriot Act provisions that authorized the bulk, warrantless collection of Americans’ phone records. The bill was widely supported by technology companies, including giants like Apple and Google.
Gary Edwards

CPU Wars - Intel to Play Fab for an ARM Chipmaker: Understanding What the Altera Deal M... - 0 views

  • Intel wants x86 to conquer all computing spaces -- including mobile -- and is trying to leverage its process lead to make that happen.  However, it's been slowed by a lack of inclusion of 4G cellular modems on-die and difficulties adapting to the mobile market's low component prices.  ARM, meanwhile, wants a piece of the PC and server markets, but has received a lukewarm response from consumers due to software compatibility concerns. The disappointing sales of (x86) tablet products using Microsoft Corp.'s (MSFT) Windows 8 and the flop of Windows RT (ARM) product in general somewhat unexpectedly had the net result of being a driver to maintain the status quo, allowing neither company to gain much ground.  For Intel, its partnership with Microsoft (the historic "Wintel" combo) has damaged its mobile efforts, as Windows 8 flopped in the tablet market.  Likewise ARM's efforts to score PC market share were stifled by the flop of Windows RT, which led to OEMs killing off ARM-based laptops and convertibles.
  • Both companies seem to have learned their lesson and are migrating away from Windows towards other platforms -- in ARM's case Chromebooks, and in Intel's case Android tablets/smartphones. But suffice it to say, ARM Holdings and Intel are still very much bitter enemies from a sales perspective.
  • III. Profit vs. Risk -- Understanding the Modern CPU Food Chain
  • ...16 more annotations...
  • Whether it's tablets or PCs, the processor is still one of the most expensive components onboard.  Aside from the discrete GPU -- if a device has one -- the CPU has the greatest earning potential for a large company like Intel because the CPU is the most complex component. Other components like the power supply or memory tend to either be lower margin or have more competitors.  The display, memory, and storage components are all sensitive to process, but see profit split between different parties (e.g. the company who makes the DRAM chips and the company who sells the stick of DRAM) and are primarily dependent on process technology. CPUs and GPUs remain the toughest product to make, as it's not enough to simply have the best process, you must also have the best architecture and the best optimization of that architecture for the space you're competing in. There's essentially five points of potential profit on the processor food chain: [CPU] Fabrication [CPU] Architecture design [CPU] Optimization OEM OS platform Of these, the fabrication/OS point is the most profitable (but is dependent on the number of OEM adopters).  The second most profitable niche is optimization (which again is dependent on OEM adopter market share), followed by OEM markups.  In terms of expense, fabrication and operating system designs requires the greatest capital investment and the highest risk.
  • In terms of difficulty/risk, the fabrication and operating system are the most difficult/risky points.  Hence in terms of combined risk, cost, and profitability the ranking of which points are "best" is arguably: Optimization Architecture design OS platfrom OEM Fabrication ...with the fabrication point being last largely because it's so high risk. In other words, the last thing Intel wants is to settle into a niche of playing fabs for everybody else's product, as that's an unsound approach.  If you can't keep up in terms of chip design, you typically spin off your fabs and opt for a different architecture direction -- just look at Advanced Micro Devices, Inc.'s (AMD) spinoff of GlobalFoundries and upcoming ARM product to see that.
  • IV. Top Firms' Role on That Food Chain
  • Apple has seen unbelievable profits due to this fundamental premise.  It controls the two most desirable points on the food chain -- OS and optimization -- while sharing some profit with its architecture designer (ARM Holdings) and a bit with the fabricator (Samsung Electronics Comp., Ltd. (KSC:005930)).  By choosing to play operating system maker, too, it adds to its profits, but also its risk.  Note that nearly every other first-party exclusive smartphone platform has failed or is about to fail (i.e. BlackBerry, Ltd. (TSE:BB) and the now-dead Palm).
  • Intel controls points 1, 2, and 5, currently, on the food chain.  Compared to Apple, Intel's points of control offer less risk, but also slightly less profitability. Its architecture control may be at risk, but even so, it's currently the top in its most risky/expensive point of control (fabrication), where as Apple's most risky/expensive point of control (OS development) is much less of a clear leader (as Android has surpassed Apple in market share).  Hence Apple might be a better short-term investment, but Intel certainly appears a better long-term investment.
  • Samsung is another top company in terms of market dominance and profit.  It occupies points 1, 3, 4, and 5 -- sometimes.  Sometimes Samsung's devices use third-party optimization firms like Qualcomm Inc. (QCOM) and NVIDIA Corp. (NVDA), which hurts profitability by removing one of the most profitable roles.  But Samsung makes up for this by being one of the largest and most successful third party manufacturers.
  • Microsoft enjoys a lot of profit due to its OS dominance, as does Google Inc. (GOOG); but both companies are limited in controlling only one point which they monetize in different ways (Microsoft by direct sales; Google by giving away OS product for free in return for web services market share and by proxy search advertising revenue).
  • Qualcomm and NVIDIA are also quite profitable operating solely as optimizers, as is ARM Holdings who serves as architecture maker to Qualcomm, NVIDIA, Apple, and Samsung.
  • V. Four Scenarios in the x86 vs. ARM Competition
  • Scenario one is that x86 proves dominant in the mobile space, assuming a comparable process.
  • A second scenario is that x86 and ARM are roughly tied, assuming a comparable process.
  • A third scenario is that x86 is inferior to ARM at a comparable process, but comparable or superior to ARM when the x86 chip is built using a superior process.  From the benchmarks I've seen to date, I personally believe this is most likely.
  • A fourth scenario is that x86 is so drastically inferior to ARM architecturally that a process lead by Intel can't make up for it.
  • This is perhaps the most interesting scenario, in the sense of thinking of how Intel would react, if not overly likely.  If Intel were faced with this scenario, I believe Intel would simply bite the bullet and start making ARM chips, leveraging its process lead to become the dominant ARM chipmaker.  To make up for the revenue it lost, paying licensing fees to ARM Holdings, it could focus its efforts in the OS space (it's Tizen Linux OS project with Samsung hints at that).  Or it could look to make up for lost revenue by expanding its production of other basic process-sensitive components (e.g. DRAM).  I think this would be Intel's best and most likely option in this scenario.
  • VI. Why Intel is Unlikely to Play Fab For ARM Chipmakers (Even if ARM is Better)
  • From Intel's point of view, there is an entrenched, but declining market for x86 chips because of Windows, and Intel will continue to support Atom chips (which will be required to run Windows 8 tablets), but growth on desktops will come from 64 bit desktop/server class non-Windows ARM devices - Chromebooks, Android laptops, possibly Apple's desktop products as well given they are going 64 bit ARM for their future iPhones. Even Windows has been trying to transition (unsuccessfully) to ARM. Again, the Windows server market is tied to x86, but Linux and FreeBSD servers will run on ARM as well, and ARM will take a chunk out of the server market when a decent 64bit ARM server chip is available as a result.
  •  
    Excellent article explaining the CPU war for the future of computing, as Intel and ARM square off.  Intel's x86 architecture dominates the era of client/server computing, with their famed WinTel alliance monopolizing desktop, notebook and server implementations.  But Microsoft was a no show with the merging mobile computing market, and now ARM is in position transition from their mobile dominance to challenge the desktop -notebook - server markets.   WinTel lost their shot at the mobile computing market, and now their legacy platforms are in play.  Good article!!! Well worth the read time  ................
‹ Previous 21 - 40 of 65 Next › Last »
Showing 20 items per page