Skip to main content

Home/ Open Web/ Group items tagged browser-productivity

Rss Feed Group items tagged

Gary Edwards

Productivity on Cloud - 0 views

  •  
    Office suites are now taking the cloud route and offering advanced services, luring partners with smart gain  By Varun Aggarwal While all applications are moving to the cloud, there is no reason why the ubiquitous office productivity suites like MS Office or OpenOffice should stick to the desktop. Providing customers with a key set of capabilities, and a browser to aid easy access makes complete sense. Take for instance a student working on a class paper. Writing in a Web browser might aid in sharing and incorporating constructive changes, but it is a cumbersome experience as compared to using Office on his PC. But by using productivity suite online, he gets best of both worlds.  
Gary Edwards

Businesses deploying Office 2010 five times faster than previous version | WinRumors - 1 views

  •  
    Not sure what to make of this news.  XP continues to rule the desktop, Office 2003-2007 the productivity sweet spot.  I have used and researched Office 2010 and emphatically insist that it is a honey-trap for SharePoint and Live.com cloud-computing.  The MS-Cloud becomes THE default hard drive for Office 2010, with social networking-Facebook like contagion based on shared documents, crap collaboration and in-your-face insistent Live.com/Hotmail eMail.  Everytime i wanted to do something in Office 2010, there were 20 road blocks and hurdles MS put in the path forcing their Facebook-virus on my associates and myself.  Incredibly anti-productive.  Yet it's the only cloud-productivity solution capable of easing the difficult transition from desktop to cloud productivity environments.  Office 2010 does this by integrating into legacy desktop productivity  systems just enough that users will not realize until it's too late that a mine filed of hurdles and gotchas lies ahead. excerpt: Businesses are now deploying Office 2010 five times faster than they deployed Office 2007. Office 2010 is also the fastest-selling version of Office in history. "Nearly 50 million people worldwide use Office Web Apps to view, edit, and share their documents from anywhere with a browser and an Internet connection," added Numoto. Microsoft previously revealed in October that the company had sold six million copies of Office 2010. The company didn't reveal any additional sales figures on Wednesday but reaffirmed that the software is selling well. Office is currently used by more than 750 million users worldwide according to Microsoft.
  •  
    I wonder about those numbers. 6 million copies of Office 2010 sold; total of 750 million users of all versions. That makes 0.8 per cent of Office users who had upgraded between June and October of 2010? Five times faster than Office 2007 would make Office 2007 sales in the same period of its release cycle 0.16 per cent of the 750 million, assuming the number of users had remained constant. I suspect there are some apples and oranges in that wood pile, to mix a metaphor. E.g., retail sales that exclude sales to OEMs?
Gary Edwards

Office 365 vs. Google Apps: The InfoWorld review | Cloud Computing - InfoWorld - 0 views

  •  
    Clash of the Productivity Clouds: Before we attempt to answer those questions, one thing must be stated flatly: Office 365 and Google Apps are vastly different products. Office 365 is meant to be used with a locally installed version of Office (preferably Office 2010), whereas Google Apps lives 100 percent in the browser. To use a hackneyed metaphor, we're talking apples and oranges. With so many feature variables between the two products, blanket pronouncements don't make a lot of sense. Nonetheless, with the production release of Office 365, the cloud era of desktop productivity software officially kicks into high gear. Office 365 works with Microsoft's Web App versions of desktop Office applications -- Word, Excel, PowerPoint, and OneNote -- so theoretically, you can use it without a locally installed version of Office at all. But most people won't. The real Office 365 ploy is this: Sick of maintaining Exchange and SharePoint servers? No problem. Pay Microsoft and it will run those servers for you -- and throw in the fancy new Lync communications server. Office 365 represents the first time Microsoft has bundled desktop software (Office 2010) with an online service into a single subscription-based offering. But if you have another source of licenses for Office (2010, 2007, or otherwise), or if you want to run just the Office Web Apps (not likely), you can get an Office 365 license without paying for Office.
Gary Edwards

Key Google Docs changes promise faster service | Relevant Results - CNET News - 0 views

  •  
    Jonathan Rochelle and Dave Girouard: Google's long-term vision of computing is based around the notion that the Web and the browser become the primary vehicles for applications, and Google Docs is an important part of realizing that vision. The main improvement was to create a common infrastructure across the Google Docs products, all of which came into Google from separate acquisitions, Rochelle said. This has paved the way for Google to offer users a chance to do character-by-character real-time editing of a document or spreadsheet, almost the same way Google Wave lets collaborators see each other's keystrokes in a Wave. Those changes have also allowed Google to take more control of the way documents are rendered and formatted in Google Docs, instead of passing the buck to the browser to make those decisions. This allows Google to ensure that documents will look the same on the desktop or in the cloud, an important consideration for designing marketing materials or reviewing architectural blueprints, for example.
Gary Edwards

Microsoft Links Office With Win 7 - IBD - Investors.com - 0 views

  •  
    In this interview with Microsoft's Chris Capossela, he admits that OOXML is not an interoperable format - that using OOXML will result in a loss of productivity.   excerpt: "The collaboration experience end users are going to have with Office 2010 and the Web applications in the browser and Office on the phone is far superior to anything out there, whether it's from Google or anybody else. And the increase in costs to do what they're suggesting and the decrease in productivity that's going to result is something that customers will see, and then they'll choose Microsoft. The best example of that is just sharing a document. Just taking an Office document that was built in the rich client that has a piece of smart art and a watermark or a header or a footer, and then when I share that with you and you open it in the Office Web app, it looks absolutely identical to what I created. When you make edits to it and save it and I open it back up, I see exactly the edits you made and all the stuff I had in there originally. If you do that exact same thing with Google or Zoho or OpenOffice, you lose stuff. And that means loss of productivity."
Gary Edwards

It's Microsoft's Game to Lose with Windows Mobile 7 - PCWorld Business Center - 0 views

  •  
    Good title.  Nice to see that some of the tech media are starting to figure this out.  It's about time. excerpt: While Microsoft has struggled with its mobile operating system, it still occupies a dominant stake of the server operating system, desktop operating system, business productivity software, messaging, and Web browser markets. Bells and whistles aside, it's hard to argue with the potential of a smartphone platform that can seamlessly tie in with the platforms and tools that businesses rely on. RIM, Apple, Palm, and now Google, all recognize and respect Microsoft's presence in the enterprise. These other mobile platforms realize that integration with Microsoft backend tools--particularly Exchange Server--is imperative to success in the enterprise. No matter how hard they try, though, the solutions are often clumsy or cumbersome, and have a sort of "square peg in the round hole" feel to them. The core appeal of a Microsoft mobile operating system is the inclusion of native tools that naturally integrate with the existing server, desktop, and office productivity environment. Windows Mobile is uniquely suited to deliver a seamless and familiar experience for business professionals. Expecting Microsoft to introduce unique innovations or raise the bar in any way for mobile operating systems is probably a recipe for disappointment. Assuming that Microsoft can at least improve Windows Mobile to the point that Windows Phones are more or less on par with next-generation smartphones like the iPhone or Droid will be enough, though, for Microsoft to get the ship pointed in the right direction and begin to reclaim some of its lost mobile platform market share. Microsoft has a built-in audience and the game is Microsoft's to lose.
Gary Edwards

Google Is Prepping A Sneak Attack On Microsoft Office - ReadWrite - 0 views

    • Gary Edwards
       
      Pretty good quote describing the reach of "Visual Productivity".  Still, the quote lacks the power of embedded data (ODBC) streams and application obects (OLE) so important to the compound document model that sits at the center of all productivity environments and business system automation efforts.
  • In a supporting comment, Zborowski pointed out that Google doesn't support the Open Document Format, suggesting that Microsoft is more open than Google.
    • Gary Edwards
       
      Now this is funny!!!
  • Productivity software is built to help people communicate. It's more than just the words in a document or presentation; it's about the tone, style and format you use to convey an overall message. People often entrust important information in these documents -- from board presentations to financial analyses to book reports. You should be able to trust that what you intend to communicate is what is being seen.
Paul Merrell

Google adds bookmark sync to Chrome browser - 0 views

  • Google upgraded the beta version of its Chrome browser yesterday, adding integrated bookmark synchronization and boasting of a 30% speed improvement over the current production edition.
  • Bookmark sync requires that all the machines being kept in step run the Chrome beta, and that the user has a Google account, such as a Gmail username and password. The browser syncs bookmarks using Google Docs, the company's Web-based application suite.
Gary Edwards

Official Google Enterprise Blog: Upgrade here - 0 views

  •  
    This week Microsoft will take its Office 2010 suite out of beta. If you're considering upgrading Office with Office, we'd encourage you to consider an alternative: upgrading Office with Google Docs. If you choose this path, upgrade means what it's supposed to mean: effortless, affordable, and delivering a remarkable increase in employee productivity. This is a refreshing alternative to the expensive and laborious upgrades to which IT professionals have become accustomed. Google Docs has been providing rich real-time collaboration to millions of users for nearly four years. It lets employees edit and share documents, spreadsheets, and presentations in the browser from anywhere in the world. We recently made tremendous strides in improving Google Docs formatting, speed and functionality, and a growing number of companies are now using it as their primary productivity software. Of course, you probably already own Office 2003 or 2007 (or maybe Office 2000?), and there's no need to uninstall them. Fortunately, Google Docs also makes Office 2003 and 2007 better. For example, you can store any file - including Microsoft Office documents - in Google's cloud and share them in their original format (protected, naturally by Google's synchronous replication across datacenters). Plus, in the coming months, Google will enable real-time collaboration directly in Office 2003 and 2007, as you can see here. Google Docs represents a real alternative for companies: a chance to get the collaboration features you need today and end the endless cycle of "upgrades". For more information on the choices available to you, check out the summary below. But don't take our word for it - you can try Google Docs and the rest of the Google Apps suite for free. The only thing you have to lose is a server or two.
Gary Edwards

Snow Fall: The Avalanche at Tunnel Creek - Multimedia Feature - NYTimes.com - 0 views

  •  
    Incredible project exploring new methods of story telling that make full use of an emerging interactive, graphical and multimedia rich, extraordinarily visual Web platform.  Awesome use of Web technology and a great story to boot!   While the Snow Fall Project is hardly the first Visual Document, it's truly a landmark effort.  Hopefully the business process and systems editing tools for Web based Visual Productivity will not be far behind simple Visual Web publication tools. Marbux viewed the source code and pointed out the great efforts that the NY Times had gone to to provide cross browser compatibility.  That in turn reminded me just how close the world came to having Microsoft seize the Web and take control of its future.  A very close call if ever there was one.  Many thanks to Marc Andresssen and the Netscape investors for their heroic efforts to stop Bill Gates and his Microsoft monopoly.
Gary Edwards

Electronic Imp: Former Apple, Google, Facebook engineers launch IoT startup - 2012-05-1... - 0 views

  • "We've put it in a user-installable module. The user buys the card and just plugs it into any device that has a slot," Fiennes explained." All a developer needs to do is add a socket and a 3-pin Atmel ID chip to their product. That's 75 cents: 30 cents for the ID chip and 45 cents for the socket." This assumes the availability of 3.3 V. "But given that most things you want to control from the Internet are electrical, we think that's reasonable," he said. If not, developers can include a battery.
  • Fiennes demonstrated a power adaptor with an Imp socket. He installed a card and an appropriately labeled block appeared in a browser window. Fiennes plugged in a chain of decorative lights and we clicked on the box on our browser. After clicking, the box text went from "off" to "on." Over Skype, we could see the lights had come on.Fiennes emphasized that control need not be manual and could be linked to other Internet apps such as weather reports, or to Electric Imp sensor nodes that monitor conditions such as humidity.A second example is an Electric Imp enabled passive infrared sensor. Fiennes demonstrated how it could be programmed to report the time and date of detected motion to a client's Web pages on the Electric Imp server. In turn, those pages could be programmed to send an alarm to a mobile phone. The alarm could also be triggered if no motion was detected, allowing the sensor to serve as a monitor for the elderly in their homes, for example. If there is no activity before 9 a.m., a message is sent to a caregiver.
  • The final example is an Electric Imp washing machine. Machine operation can be made conditional on a number of variables, including the price of electricity. "Every washing machine has microcontroller and that microcontroller has a lot of data," said Fiennes. "That data could be sent back to a washing machine service organization that could call the client up before the washing machine breaks down."
  • ...1 more annotation...
  • The cards will be on sale to developers by the end of June for $25 each and Electric Imp will also supply development kits that include a socket, ID chip and power connection on a small board for about $10. While these are intended for consumer electronics developers Electric Imp is happy to sell them to students and non-professional developers. "Hobbyists can play with it and tell us what they think."
  •  
    Put Electronic Imp at the top of the "Technologies to watch" list.  Good stuff and great implementation - platform plan.   excerpt "We've put it in a user-installable module. The user buys the card and just plugs it into any device that has a slot," Fiennes explained." All a developer needs to do is add a socket and a 3-pin Atmel ID chip to their product. That's 75 cents: 30 cents for the ID chip and 45 cents for the socket." This assumes the availability of 3.3 V. "But given that most things you want to control from the Internet are electrical, we think that's reasonable," he said. If not, developers can include a battery. When the $25 card is installed in a slot and powered up, it will find the ID number and automatically transmit the information to Electric Imp's servers. Fiennes and his colleagues have written a virtual machine that runs under a proprietary embedded operating system on the node and looks for updates of itself on the Internet. SSL encryption is used for data security when transmitted over the link. ........
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Gary Edwards

Crocodoc's HTML Document Viewer Infiltrates the Enterprise | Xconomy - 0 views

  •  
    Excellent report on Crocodoc and their ability to convert MANY different document file types to HTML5.  Including all MSOffice formats - OOXML, ODF, and PDF. " Crocodoc, and took on the much larger problem of allowing groups to collaborate on editing a document online, no matter what the document type: PowerPoint, PDF, Word, Photoshop, JPEG, or PNG. In the process, they had to build an embeddable viewer that could take apart any document and reassemble it accurately within a Web browser. And as soon as they'd finished that, they had to tear their own system apart and rebuild it around HTML5 rather than Flash, the Adobe multimedia format that's edging closer and closer to extinction. The result of all that iterating is what's probably the world's most flexible and faithful HTML5-based document viewer: when you open a PDF, PowerPoint, or Word document in Crocodoc, the Web version looks exactly like the native version, even though it's basically been stripped down and re-rendered from scratch. When I talked with Damico in February of 2011, the startup had visions of building on this technology to become a kind of central, Web-based clearinghouse for everyone's documents-a cross between Scribd, Dropbox, and Google Docs, but with a focus on consumers, and with prettier viewing tools. In the last year, though, Crocodoc's direction has changed dramatically. Damico and his colleagues realized that it would be smarter to partner with the fastest growing providers of document-sharing services and social business-tool providers than to try to compete with them. "The massive, seismic change for us is that we had a huge opportunity to partner with Dropbox and LinkedIn and SAP and Yammer, and let them build on top of Crocodoc and make it into a core piece of their own products," Damico says. In other words, every time an office worker opens a document from within a Web app like Dropbox or Yammer, they're activating a white-label version
Gary Edwards

Diary Of An x264 Developer » Flash, Google, VP8, and the future of internet v... - 0 views

  •  
    In depth technical discussion about Flash, HTML5, H.264, and Google's VP8.  Excellent.  Read the comments.  Bottom line - Google has the juice to put Flash and H.264 in the dirt.  The YouTube acquisition turns out to be very strategic. excerpt: The internet has been filled for quite some time with an enormous number of blog posts complaining about how Flash sucks-so much that it's sounding as if the entire internet is crying wolf.  But, of course, despite the incessant complaining, they're right: Flash has terrible performance on anything other than Windows x86 and Adobe doesn't seem to care at all.  But rather than repeat this ad nauseum, let's be a bit more intellectual and try to figure out what happened. Flash became popular because of its power and flexibility.  At the time it was the only option for animated vector graphics and interactive content (stuff like VRML hardly counts).  Furthermore, before Flash, the primary video options were Windows Media, Real, and Quicktime: all of which were proprietary, had no free software encoders or decoders, and (except for Windows Media) required the user to install a clunky external application, not merely a plugin.  Given all this, it's clear why Flash won: it supported open multimedia formats like H.263 and MP3, used an ultra-simple container format that anyone could write (FLV), and worked far more easily and reliably than any alternative. Thus, Adobe (actually, at the time, Macromedia) got their 98% install base.  And with that, they began to become complacent.  Any suggestion of a competitor was immediately shrugged off; how could anyone possibly compete with Adobe, given their install base?  It'd be insane, nobody would be able to do it.  They committed the cardinal sin of software development: believing that a competitor being better is excusable.  At x264, if we find a competitor that does something better, we immediately look into trying to put ourselves back on top.  This is why
Gary Edwards

Feng Office: Putting the "Flow" in Workflow - 0 views

  •  
    Conrado gets a very good review! Excerpt: Feng Office packs most of the features you should require for most project management duties. In addition to basics like calendars, contacts and email, it also provides milestone and task management, and a built-in time-tracking function. All of the above are well-implemented, although some users may actually find the similar interface design of all the functions more confusing than helpful, since it's often not clear which function you're using at any given time without looking at what tab is highlighted. I like the uniformity, though, since it gives each feature a sense of connectedness to the others and adds to the feeling that Feng Office is a holistic solution. Notes, Links and Documents features also bring much to Feng Office's overall value proposition, and each is well-executed. You can even create new Word docs and PowerPoint HTML documents and presentations directly from within Feng Office using its own built-in editors, both of which retain UI elements from Microsoft's own suite. That means less time switching from browser to standalone apps, which adds up to better productivity.
Paul Merrell

Rich Web Client Activity Statement - 0 views

  • The CDF Working Group remains in hibernation pending an updated implementation report. No significant Team resources are be dedicated to this Working Group, other than coordination with implementers as progress is made. Since there is currently good progress on implementation, the expectation is that these specifications will proceed to Recommendation status, and the CDF WG will be closed.
  •  
    My initial impression is that this is not good news, that this is a further sign of W3C abandonment of XHTML. The announcement that the WG will be closed by implication means that all CDF WG projects are coming to a standstill. The CDF WICD profiles currently have no profiles developed for spreadsheets and presentations albeit feature-rich enough to serve for web display of presentations. WICD profiles are at version. 2.0, with each 2.0 profile a superset of the 1.0 profiles. They are feature-lean in comparison to desktop word processors. The Compoound Document by Incorporation Framework  is an even more immature document, not nearly ready for prime time. All of which suggests that the Compound Document by Reference Framework itself may be the only WG work product with a shot at survival. HTML 5 and browser quirks mode wins; the world loses. Blech!
Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Gary Edwards

Pushing the 3D Boundaries in WebKit with CSS 3D and Three.js - 0 views

  •  
    Good stuff going on at Acko.net! Excerpt: Sometimes, you need to see what a technology can do before you can fully appreciate it. Take, for instance, CSS 3D and Three.js. It's one thing to hear about doing 3D elements for Web sites, and another to see them integrated into a well-designed site. Take, for example, Steven Wittens' Acko.net redesign. Visit Acko.net using a current release of Firefox, and you'll see a nice clean site with a nice header image that demonstrates two-point perspective nicely. But hit the site using a WebKit browser, and you're in for a real treat.
Gary Edwards

The State of the Internet Operating System - O'Reilly Radar - 0 views

  •  
    ... The Internet Operating System is an Information Operating System ... Search is key to managing and working "information" ... Media Access ... Communications ... Identity and the Social Graph ... Payment ... Advertising ... Location ... Activity Streams - "Attention" ... Time  ... Image and Speech Recognition ... Government Data ... The Browser Where is the "operating system" in all this? Clearly, it is still evolving. Applications use a hodgepodge of services from multiple different providers to get the information they need. But how different is this from PC application development in the early 1980s, when every application provider wrote their own device drivers to support the hodgepodge of disks, ports, keyboards, and screens that comprised the still emerging personal computer ecosystem? Along came Microsoft with an offer that was difficult to refuse: We'll manage the drivers; all application developers have to do is write software that uses the Win32 APIs, and all of the complexity will be abstracted away. This is the crux of my argument about the internet operating system. We are once again approaching the point at which the Faustian bargain will be made: simply use our facilities, and the complexity will go away. And much as happened during the 1980s, there is more than one company making that promise. We're entering a modern version of "the Great Game", the rivalry to control the narrow passes to the promised future of computing.
Gary Edwards

Kaazing | Kaazing WebSocket Gateway - 0 views

  •  
    Kaazing WebSocket Gateway is the world's only enterprise solution for full-duplex, high-performance communication over the Web using the HTML5 WebSocket standard. Designed to be the next evolutionary step in web communication, HTML5 WebSocket addresses the problems inherent with traditional Ajax and Comet solutions today. True real-time connectivity in the browser and on mobile devices is now a reality thanks to this exciting new standard. Kaazing WebSocket Gateway delivers these features and benefits with the performance, scalability, robustness, and security that enterprises demand.
‹ Previous 21 - 40 of 50 Next ›
Showing 20 items per page