Skip to main content

Home/ Open Web/ Group items tagged Google-cloud

Rss Feed Group items tagged

Gary Edwards

GMailr: An Unofficial Javascript API for GMail - ReadWriteCloud - 1 views

  •  
    Google has pretty much given up on developing a JavaScript API for GMail. There was once a Greasemonkey script Google developed for GMail but that broke and Google shows no sign of fixing it. James Yu is now trying to fix that scenario with GMailr, a JavaScript API for GMail. It is made from the code he wrote for 0Boxer, an extension for GMail that turns organizing your inbox into a game. Yu is also a lead developer at Scribd. Yu said developing the API took him on a path fraught with frustrations and dead ends. He writes there is supported official JavaScript API for Gmail. The Greasemonkey script is broken and no one has yet released a frontend API for Gmail. He said he needed access to the various user actions in the UI as the backend APIs were not going to work as he wished. He decided to write his own library from scratch.
Gary Edwards

Discoverer of JSON Recommends Suspension of HTML5 | Web Security Journal - 0 views

  •  
    Fascinating conversation between Douglas Crockford and Jeremy Geelan. The issue is that XSS - the Cross Site Scripting capabilities of HTML. and "the painful gap" in the HTML5 specification of the itnerface between JavaScript and the browser. I had to use the Evernote Clearly Chrome extension to read this page. Microsoft is running a huge JavaScript advertisement/pointer that totally blocks the page with no way of closing or escaping. Incredible. Clearly was able to knock it out though. Nicely done! The HTML5-XSS problem is very important, especially if your someone like me that sees the HTML+ format (HTML5-CSS3-JSON-JavaScript-SVG/Canvas) as the undisputed Cloud Productivity Platform "compound document" model. The XSS discussion goes right to the heart of matter of creating an HTML compound document in much the same way that a MSOffice Productivity Compound Document worked. The XSS mimics the functionality of of embedded compound document components such as OLE, DDE, ODBC and Scripting. Crack open any client/server business document and it will be found to be loaded with these embeded components. It seems to me that any one of the Cloud Productivity Platform contenders could solve the HTML-XSS problem. I'm thinking Google Apps, Zoho, SalesForce.com, RackSpace and Amazon - with gApps and Zoho clearly leading the charge. Also let me add that RSS and XMP (Jabber), while not normally mentioned with JSON, ought to be considered. Twitter uses RSS to transport and connect data. Jabber is of course a long time favorite of mine. excerpt: The fundamental mistake in HTML5 was one of prioritization. It should have tackled the browser's most important problem first. Once the platform was secured, then shiny new features could be carefully added. There is much that is attractive about HTML5. But ultimately the thing that made the browser into a credible application delivery system was JavaScript, the ultimate workaround tool. There is a painful gap
Gary Edwards

Google Ventures, Andreessen Horowitz And Khosla Back Big Data Startup ClearStory | Tech... - 0 views

  •  
    Interesting, but do they have a plan to implement ODBC at the Cloud level?  It's one thing to provide connectivity, exploration and analysis to non Cloud data and transaction servers.  And another to connect the data feeds into next generation compound documents.  Seems to me this is an effective first step, but the value remains elusive.  Left a comment on this page. exerpt: The startup's offering, which has not been released yet, will connect to data stored in databases as well as the web and other sources, and adds a visual discovery component to make it easy for users to parse through this data and make sense of the information. The beauty of ClearStory is that it allows businesses to analyze internal and publicly available data at the same time and make this data easy for the masses to understand.
Gary Edwards

Telax Unveils HTML5 Software for Mac OS Contact Centers - 0 views

  •  
    Interesting development in the world of real time Web Apps.  Looks like Business processes and services in the Cloud are embracing HTML5, and moving fast to replace legacy client/server.  Note this is not Flash or Silverlight RiA.   excerpt: Telax Hosted Call Center, a leader in cloud contact center solutions announced the release of its HTML5-based Call Center Agent (CCA) today. Key to the development of the browser-based CCA was Websocket, a component of HTML5 that provides a bi-directional, full-duplex communication channel over a single Transmission Control Protocol (TCP) socket. Websocket is currently supported by the latest versions of Google Chrome, Apple Safari, and Firefox, making Telax's new CCA compatible with the most popular browsers in Mac environments. Before HTML5, real-time unified communication software was typically deployed as a local client because its browser-based counterparts were unable to deliver an acceptable user experience. Some browser-based clients use 3rd party software such as Adobe Flash or Sliverlight to operate adequately, but both solutions require software installation and are not mobile friendly.
Paul Merrell

The Cover Pages: Alfresco Enterprise Edition v3.3 for Composite Content Applications - 0 views

  • While CMIS, cloud computing and market commoditization have left some vendors struggling to determine the future of enterprise content management (ECM), Alfresco Software today unveiled Alfresco Enterprise Edition 3.3 as the platform for composite content applications that will redefine the way organizations approach ECM. As the first commercially-supported CMIS implementation offering integrations around IBM/Lotus social software, Microsoft Outlook, Google Docs and Drupal, Alfresco Enterprise 3.3 becomes the first content services platform to deliver the features, flexibility and affordability required across the enterprise.
  • Quick and simple development environment to support new business applications Flexible deployment options enabling content applications to be deployed on-premise, in the cloud or on the Web Interoperability between business applications through open source and open standards The ability to link data, content, business process and context
  • Build future-proof content applications through CMIS — With the first and most complete supported implementation of the CMIS standard, Alfresco now enables companies to build new content-based applications while offering the security of the most open, flexible and future-proof content services platform. Repurpose content for multiple delivery channels — Advanced content formatting and transformation services allow organizations to easily repurpose content for delivery through multiple channels (web, smart phone, iPad, print, etc). Improve project management with content collaboration — New datalist function can be used to track project related issues, to-dos, actions and tasks, supplementing existing commenting, social tagging, discussions and project sites. Deploy content through replication services — Companies can replicate and deploy content, and associated information, between content platforms. Using powerful replication services, users can develop and then deploy content outside the firewall, to web servers and into the cloud. Develop new frameworks through Spring Surf — Building on SpringSource, the leader in Java application infrastructure used to create java applications, Spring Surf provides a scriptable framework for developing new content rich applications.
Gary Edwards

Glide Extends the IPad, Converts Flash on the Fly - PCWorld Business Center - 2 views

  •  
    Wow!  30GB free.  250 file formats with a "universal translation engine".  And HTML5. excerpt: "You can't have convergence unless you have the ability to translate files across different platforms and devices," Donald Leka, TransMedia's CEO, told Macworld. "There's a war between the big tech companies like Adobe, Apple, Microsoft, and Google, and these compatibility issues are not going to go away." Glide also lets you share any documents or media in your account with other users or the public. And with new desktop clients for Mac and PC that can sync a local folder up to your cloud storage space, Glide is taking on popular competitors like Dropbox, SugarSync, and Apple's own iDisk. Glide is free to use in desktop browsers and on the iPad, and free accounts get 30GB of space to start. Premium accounts offer 250GB of space for $50 per year.
Gary Edwards

Google's Ultra-Real-Time Messaging Tool Lives On - Technology Review - 0 views

  •  
    The company halted its work on Wave, but aspects of its radical approach to communication have been reincarnated for business collaboration. When Google Wave launched in 2009, the company suggested the program was a "new category" of communication because it combined the virtues of e-mail, instant messaging, and methods for sharing pictures, links, and other documents. Among its other features, Wave went a step beyond IM by letting people see what their message partners were writing as they typed it. That meant that the people on the receiving end of your messages would see characters appear onscreen even before you had finished formulating a sentence. It was a radical approach. I tried Wave myself and found it very distracting to watch people type, delete, retype, and misspell their thoughts. People I had persuaded to try it with me never signed in again, unsure as to how it was useful. We weren't alone in our confusion: last year, Google announced it would stop developing Wave. And yet, Google Wave lives on-in business software.
Paul Merrell

Display Daily » Blog Archive » Google Sees Life in the Cloud w/o Windows - 0 views

  • First impressions were startling, as the new device (sans any hard disc) finally delivered on the long promised "Instant-on" feature that has eluded Bill Gates and his army of engineers for decades. The remarkable demo also included an instant download of the almost 2K page Obama-Health care Act. The point here is 2K pages downloaded from the Internet with absolutely no delay.
  • But perhaps most troubling to Microsoft, they now must compete with the economics of free, as Google is offering its Open Source Chrome operating system (O/S) free to hardware manufacturers—taking dead aim at the core business model that sustains rival Microsoft. That’s give-away O/S, give-away browser, give-away video player technology all from Google. This can power literally hundreds of next generation devices, from netbooks to iPad tablet /EBR wannabe’s ready to hit the market.
Paul Merrell

Microsoft Pitches Technology That Can Read Facial Expressions at Political Rallies - 0 views

  • On the 21st floor of a high-rise hotel in Cleveland, in a room full of political operatives, Microsoft’s Research Division was advertising a technology that could read each facial expression in a massive crowd, analyze the emotions, and report back in real time. “You could use this at a Trump rally,” a sales representative told me. At both the Republican and Democratic conventions, Microsoft sponsored event spaces for the news outlet Politico. Politico, in turn, hosted a series of Microsoft-sponsored discussions about the use of data technology in political campaigns. And throughout Politico’s spaces in both Philadelphia and Cleveland, Microsoft advertised an array of products from “Microsoft Cognitive Services,” its artificial intelligence and cloud computing division. At one exhibit, titled “Realtime Crowd Insights,” a small camera scanned the room, while a monitor displayed the captured image. Every five seconds, a new image would appear with data annotated for each face — an assigned serial number, gender, estimated age, and any emotions detected in the facial expression. When I approached, the machine labeled me “b2ff” and correctly identified me as a 23-year-old male.
  • “Realtime Crowd Insights” is an Application Programming Interface (API), or a software tool that connects web applications to Microsoft’s cloud computing services. Through Microsoft’s emotional analysis API — a component of Realtime Crowd Insights — applications send an image to Microsoft’s servers. Microsoft’s servers then analyze the faces and return emotional profiles for each one. In a November blog post, Microsoft said that the emotional analysis could detect “anger, contempt, fear, disgust, happiness, neutral, sadness or surprise.” Microsoft’s sales representatives told me that political campaigns could use the technology to measure the emotional impact of different talking points — and political scientists could use it to study crowd response at rallies.
  • Facial recognition technology — the identification of faces by name — is already widely used in secret by law enforcement, sports stadiums, retail stores, and even churches, despite being of questionable legality. As early as 2002, facial recognition technology was used at the Super Bowl to cross-reference the 100,000 attendees to a database of the faces of known criminals. The technology is controversial enough that in 2013, Google tried to ban the use of facial recognition apps in its Google glass system. But “Realtime Crowd Insights” is not true facial recognition — it could not identify me by name, only as “b2ff.” It did, however, store enough data on each face that it could continuously identify it with the same serial number, even hours later. The display demonstrated that capability by distinguishing between the number of total faces it had seen, and the number of unique serial numbers. Photo: Alex Emmons
  • ...2 more annotations...
  • Instead, “Realtime Crowd Insights” is an example of facial characterization technology — where computers analyze faces without necessarily identifying them. Facial characterization has many positive applications — it has been tested in the classroom, as a tool for spotting struggling students, and Microsoft has boasted that the tool will even help blind people read the faces around them. But facial characterization can also be used to assemble and store large profiles of information on individuals, even anonymously.
  • Alvaro Bedoya, a professor at Georgetown Law School and expert on privacy and facial recognition, has hailed that code of conduct as evidence that Microsoft is trying to do the right thing. But he pointed out that it leaves a number of questions unanswered — as illustrated in Cleveland and Philadelphia. “It’s interesting that the app being shown at the convention ‘remembered’ the faces of the people who walked by. That would seem to suggest that their faces were being stored and processed without the consent that Microsoft’s policy requires,” Bedoya said. “You have to wonder: What happened to the face templates of the people who walked by that booth? Were they deleted? Or are they still in the system?” Microsoft officials declined to comment on exactly what information is collected on each face and what data is retained or stored, instead referring me to their privacy policy, which does not address the question. Bedoya also pointed out that Microsoft’s marketing did not seem to match the consent policy. “It’s difficult to envision how companies will obtain consent from people in large crowds or rallies.”
  •  
    But nobody is saying that the output of this technology can't be combined with the output of facial recognition technology to let them monitor you individually AND track your emotions. Fortunately, others are fighting back with knowledge and tech to block facial recognition. http://goo.gl/JMQM2W
Gary Edwards

9 Open Source Big Data Technologies Set to Change the Web - 0 views

  •  
    Good run down of new big data technologies for Cloud Computing. The technologies are arranged in context beginning with Apache Hadoop and including HBase and MongoDb. Nice reference article.
Paul Merrell

Spooked By Lax U.S. Data Privacy, European Firms Build Their Own Cloud Services - 0 views

  • A few recent legal developments affecting U.S. online privacy have rightfully troubled privacy advocates and civil libertarians on American soil. In addition to the Patriot Act's relaxed regulation of law enforcement's access to private data, recent court rulings have made it clear that U.S. authorities can secretly request data from tech companies without the user ever knowing. If this seems objectionable from the standpoint of U.S. citizens, imagine how it looks to outsiders who are storing their data there. Some European companies who do business with U.S. technology companies are concerned enough to start looking elsewhere for infrastructure
  •  
    Draconian post-9/11 U.S. government surveillance statutes will cost U.S. economy as customers shop for cloud services elsewhere.  
Gary Edwards

Is Microsoft On The Verge Of A Sudden Collapse Predicted By Catastrophe Theory? - Forbes - 1 views

  •  
    Forbes magazine has a doom and gloom Microsoft article that "ends on a note of doom".  They lampoon Windows 8 using the reviews of other bloggers like Charlie Demerjian, "Microsoft has failed". http://goo.gl/H4mZc The end of Microsoft though comes from the inability of Microsoft to change course.  In short, Microsoft has fallen into a death spiral consistent with Catastrophe theory (http://goo.gl/6CWwY). No comment or mention of Microsoft Cloud efforts:  Azure, Live.com, or SkyDrive. excerpt: In the end, the death spiral for Microsoft is in full effect, and management is expending a lot of effort to speed it up. Anyone who dares point out that the entire system is collapsing, or worse yet suggests an alternative, gets Sinofsky'd. Or was it Guggenheimer'd? In any case, Microsoft is unwilling to change, and that is very clear. Even if they wanted to, they are culturally far beyond the point of being able to. What was a slow bleed of marketshare is now gushing, and management is clueless, intransigent, and myopic. Game over, the thrashing will continue for a bit, but it won't change the outcome. Microsoft has failed. I hope this isn't true. Microsoft has been a stabilizing force in the market and many users are very attached to its products. For the first time, however, businesses can look to Google and to Apple and see plausible, battle-tested alternatives to the products they have used from Microsoft-for much less money. And in a bizarre way, Microsofts spasm of innovation has made the company now a destabilizing factor for IT departments and Google Docs is looking an awful lot like the old guard. The big question is how fast Microsoft might collapse if businesses began to defect en masse. Like other phenomena of global instability, extreme change seems to come quicker now. For Microsoft, the window is closing fast."
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

The real reason why Steve Jobs hates Flash - Charlie's Diary - 1 views

  • Flash is a cross platform development tool. It is not Adobe's goal to help developers write the best iPhone, iPod and iPad apps. It is their goal to help developers write cross platform apps."
  • he really does not want cross-platform apps that might divert attention and energy away from his application ecosystem
  • This is why there's a stench of panic hanging over silicon valley. this is why Apple have turned into paranoid security Nazis, why HP have just ditched Microsoft from a forthcoming major platform and splurged a billion-plus on buying up a near-failure; it's why everyone is terrified of Google: The PC revolution is almost coming to an end, and everyone's trying to work out a strategy for surviving the aftermath.
  •  
    Excellent must read!  Best explanation of what is currently driving Silicon Valley.  Charlie puts all the pieces in context, provides expert perspective, and then pushes everything forward to describe a highly probable future.  MUST READ stuff! excerpts:  I've got a theory, and it's this: Steve Jobs believes he's gambling Apple's future - the future of a corporation with a market cap well over US $200Bn - on an all-or-nothing push into a new market. HP have woken up and smelled the forest fire, two or three years late; Microsoft are mired in a tar pit, unable to grasp that the inferno heading towards them is going to burn down the entire ecosystem in which they exist. There is the smell of panic in the air, and here's why ... We have known since the mid-1990s that the internet was the future of computing.  With increasing bandwidth, data doesn't need to be trapped in the hard drives of our desktop computers: data and interaction can follow us out into the world we live in. .....Wifi and 4G protocols will shortly be delivering 50-150mbps to whatever gizmo is in your pocket, over the air. ......  It's easier to lay a single fat fibre to a radio transciever station than it is to lay lots of thin fibres to everybody's front door.... Anyway, here's Steve Jobs' strategic dilemma in a nutshell: the PC industry as we have known it for a third of a century is beginning to die. PCs are becoming commodity items. The price of PCs and laptops is falling by about 50% per decade in real terms, despite performance simultaneously rising in real terms. The profit margin on a typical netbook or desktop PC is under 10%.  At the same time, wireless broadband is coming. As it does so, organizations and users will increasingly move their data out into the cloud (read: onto hordes of servers racked up high in anonymous data warehouses, owned and maintained by some large corporation like Google). Software will be delivered as a service to users wherever they are, via whatev
Paul Merrell

Microsoft's Sidekick/Pink problems blamed on dogfooding and sabotage - RoughlyDrafted M... - 0 views

  • Additional insiders have stepped forward to shed more light into Microsoft’s troubled acquisition of Danger, its beleaguered Pink Project, and what has become one of the most high profile Information Technology disasters in recent memory.
  • The sources point to longstanding management issues, a culture of “dogfooding,” and evidence that could suggest the issue was a deliberate act of sabotage.
  • Beyond T-Mobile, observers say Microsoft’s problems with Danger are likely to reflect poorly on the company’s own Azure Services cloud computing initiative, as well as its MyPhone cloud service for Windows Mobile phones. The sidelining of the Pink Project is also a likely setback to Microsoft’s ongoing relationship with Verizon, which has been an early advocate of Microsoft’s other mobile related technologies, including the DRM used in Verizon’s VCast music and media service.
Gary Edwards

Say hello to the new Mega: We go hands on. - The Next Web - 1 views

  •  
    50GB free.  $9.95 /mo for $500GB + 1TB bandwidth.  WOW!! Full encryption with private key exchange using secure messaging.  Awesome Cloud Drive service, excerpt: "Right now, Mega is still a barebones file sharing service, but the company has massive plans for the future. Snooping around on their site reveals their plans for going much further than just file sharing. A post on their blog - dated January 18th - details the features that were cut from launch but will be added soon. There are also apps for mobile platforms already underway, with the company planning to support all major platforms in the near future and allow uploading from them. The blog details a secure email component (probably the part we can't get working) that will be added, secure instant messaging and the ability for non-Mega users to send large files to those with a Mega account (for example, for printing files at a print shop). It doesn't stop there, though, the company also says they're planning on-site word processing, calendar and spreadsheet applications (watch out, Google Docs!) as well as a Dropbox-esque client for Windows, Linux and Mac. They also say that there are plans in the works for allowing users to run Mega as an appliance on their own machine, though there aren't many details on that in the post. In another place on the site, Mega promises that in the near future they will be offering secure video calling and traditional calling as well. Talk about trying to take over the world."
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

The Past Clouds the Future of Europe's New Antitrust Enforcer - Vox - 0 views

  • Joaquin Almunia left his job as the E.U.’s economics and monetary affairs commissioner this month to become antitrust chief.
  • Christine Varney, the head of the antitrust division at the United States Justice Department, warned European regulators in a speech on Monday to restrict imposing obligations to the European Union on American companies that are doing business globally.Regulators in Europe are under pressure from governments, media companies and technology developers to blunt the market power that Google has amassed by running the world’s most popular Internet search tools.
  • Mr. Almunia also will need to resolve whether to give greater freedom to online merchants like eBay and Amazon which, like Google, are based in the United States. Some specialty goods and luxury goods brands, in particular LVMH of France, have lobbied hard to require that merchants have traditional shops as a precondition for selling goods over the Internet.
Gary Edwards

Top 10 GigaOM Posts of 2010: Tech News and Analysis « - 0 views

  •  
    1)  What's the Best Android Phone for Verizon Right Now? Droid X. This was one of two reviews to break into the top 10, both of them on Android. It hit as the Android frenzy was reaching a crescendo and highlighted how a bigger screen could work on smartphones. This review and the number two post also hit the top mobile posts of the year. 2)  Android Sales Overtake iPhone. This has been a theme that has generated a lot of traffic all year. With Android ascendant, we saw the first quarter where recent sales surged past the iPhone. While the iPhone appears to still have a larger overall installed base, the reports of Android's rise touched off a lot of debate about where the two platforms will end up. 3)  Nexus One: The Best Android Phone Yet. This post went up in January and foreshadowed a big year for Android. While praising the device, Om said it still didn't match the experience of the iPhone, but it showed Google was ready to compete. 4)  4chan Decides to Do Something Nice for a Change. This was a nice change-up and showed that 4chan, despite its reputation for sophomoric humor and sexual imagery, could be used for good. The online community banded together to wish 90-year-old WWII veteran William J. Lashua a happy birthday. 5)  Your Mom's Guide to Those Facebook Changes and How to Block Them. Where would we be without a Facebook post in our top 10? This post looked at the expansion of the "like" button to outside websites and instant personalization and explained how users can sidestep the features. This fit into a larger story about privacy on Facebook, which never seems to get old. 6)  Is Apple About to Cut Out the Carriers? This post stirred a lot of conversation after we reported that Apple was looking at putting its own SIM card in iPhones to sell devices directly to consumers. The move would have allowed Apple to cut out European carriers. It looks like the plan didn't come to pass, but it illustrated the power of Apple and its am
Gary Edwards

Five reasons why Microsoft can't compete (and Steve Ballmer isn't one of them) - 2 views

  • discontinued
  • 1. U.S. and European antitrust cases put lawyers and non-technologists in charge of important final product decisions.
  • The company long resisted releasing pertinent interoperability information in the United States. On the European Continent, this resistance led to huge fines. Meanwhile, Microsoft steered away from exclusive contracts and from pushing into adjacent markets.
  • ...11 more annotations...
  • Additionally, Microsoft curtailed development of the so-called middleware at the core of the U.S. case: E-mail, instant messaging, media playback and Web browsing:
  • Microsoft cofounder Bill Gates learned several important lessons from IBM. Among them: The value of controlling key technology endpoints. For IBM, it was control interfaces. For Microsoft: Computing standards and file formats
  • 2. Microsoft lost control of file formats.
  • Charles Simonyi, the father of Microsoft, and his team achieved two important goals by the mid 1990s: Established format standards that resolved problems sharing documents created by disparate products.
  • nsured that Microsoft file formats would become the adopted desktop productivity standards. Format lock-in helped drive Office sales throughout the late 1990s and early 2000s -- and Windows along with it. However, the Web emerged as a potent threat, which Gates warned about in his May 1995 "Internet Tidal Wave" memo. Gates specifically identified HTML, HTTP and TCP/IP as formats outside Microsoft's control. "Browsing the Web, you find almost no Microsoft file formats," Gates wrote. He observed not seeing a single Microsoft file format "after 10 hours of browsing," but plenty of Apple QuickTime videos and Adobe PDF documents. He warned that "the Internet is the most important single development to come along since the IBM PC was introduced in 1981. It is even more important than the arrival of the graphical user interface (GUI)."
  • 3. Microsoft's senior leadership is middle-aging.
  • Google resembles Microsoft in the 1980s and 1990s:
  • Microsoft's middle-management structure is too large.
  • 5. Microsoft's corporate culture is risk adverse.
  • Microsoft's
  • . Microsoft was nimbler during the transition from mainframe to PC dominance. IBM had built up massive corporate infrastructure, large customer base and revenue streams attached to both. With few customers, Microsoft had little to lose but much to gain; the upstart took risks IBM wouldn't for fear of losing customers or jeopardizing existing revenue streams. Microsoft's role is similar today. Two product lines, Office and Windows, account for the majority of Microsoft products, and the majority of sales are to enterprises -- the same kind of customers IBM had during the mainframe era.
  •  
    Excellent summary and historical discussion about Microsoft and why they can't seem to compete.  Lot's of anti trust and monopolist swtuff - including file formats and interop lock ins (end points).  Microsoft's problems started with the World Wide Web and continue with mobile devices connected to cloud services.
« First ‹ Previous 61 - 80 of 92 Next ›
Showing 20 items per page