Skip to main content

Home/ Open Web/ Group items tagged deal

Rss Feed Group items tagged

Gary Edwards

How-to-fix untrusted key signature packages in mint (ubuntu) - 1 views

  •  
    This works! The problem is the "sudo apt-get update" command returns a number of "W: GPG error:" messages, each referencing a http:// domain source in the sources.list file. After trying perhaps 20 different mehtods for dealing with this MInt-Ubuntu problem, this web site finally cracked it. Good explanation of how and why this problem comes up.
Gary Edwards

Asus shows off ARM-based Windows 8 tablet - Computerworld - 0 views

  •  
    Is Intel right?  Is there a "compatibility-interoperability" problem between Windows RT Office (ARM) and legacy (x86) Windows MS Office productivity environments?  It seems to me that the entire reason iPAD, Android and other ARM based tablet systems want MSOffice and MSOffice Visual Document Viewers is exactly because they want and expect a high level of compat-interop with legacy Windows productivity workgroups and client/server systems. What's the truth?  And is there anything x86 providers like Intel and AMD can do about compat-interop and the unstoppable cloud-mobility revolution? excerpt: The Asus tablet has a quad-core Tegra 3 processor from Nvidia. Windows RT comes preloaded with Office 15, a group of widely used productivity applications. Microsoft has said it had to re-engineer Windows RT to deal with expectations for ARM based devices, which include all-day connectivity and low power consumption. The tablet also has an 8-megapixel camera at the rear with LED flash, and a 2-megapixel camera at the front. It has 2GB of RAM, 32GB of storage, Wi-Fi and Bluetooth 4.0. Intel has already started the war of words against ARM around Windows 8, with Intel's CEO Paul Otellini saying that ARM devices will be incompatible with existing Windows applications and drivers. But analysts have said that Windows RT devices will likely be attractive to users who have few ties with legacy Windows PCs. Low prices could also attract users to Windows on ARM devices.
Gary Edwards

CPU Wars - Intel to Play Fab for an ARM Chipmaker: Understanding What the Altera Deal M... - 0 views

  • Intel wants x86 to conquer all computing spaces -- including mobile -- and is trying to leverage its process lead to make that happen.  However, it's been slowed by a lack of inclusion of 4G cellular modems on-die and difficulties adapting to the mobile market's low component prices.  ARM, meanwhile, wants a piece of the PC and server markets, but has received a lukewarm response from consumers due to software compatibility concerns. The disappointing sales of (x86) tablet products using Microsoft Corp.'s (MSFT) Windows 8 and the flop of Windows RT (ARM) product in general somewhat unexpectedly had the net result of being a driver to maintain the status quo, allowing neither company to gain much ground.  For Intel, its partnership with Microsoft (the historic "Wintel" combo) has damaged its mobile efforts, as Windows 8 flopped in the tablet market.  Likewise ARM's efforts to score PC market share were stifled by the flop of Windows RT, which led to OEMs killing off ARM-based laptops and convertibles.
  • Both companies seem to have learned their lesson and are migrating away from Windows towards other platforms -- in ARM's case Chromebooks, and in Intel's case Android tablets/smartphones. But suffice it to say, ARM Holdings and Intel are still very much bitter enemies from a sales perspective.
  • III. Profit vs. Risk -- Understanding the Modern CPU Food Chain
  • ...16 more annotations...
  • Whether it's tablets or PCs, the processor is still one of the most expensive components onboard.  Aside from the discrete GPU -- if a device has one -- the CPU has the greatest earning potential for a large company like Intel because the CPU is the most complex component. Other components like the power supply or memory tend to either be lower margin or have more competitors.  The display, memory, and storage components are all sensitive to process, but see profit split between different parties (e.g. the company who makes the DRAM chips and the company who sells the stick of DRAM) and are primarily dependent on process technology. CPUs and GPUs remain the toughest product to make, as it's not enough to simply have the best process, you must also have the best architecture and the best optimization of that architecture for the space you're competing in. There's essentially five points of potential profit on the processor food chain: [CPU] Fabrication [CPU] Architecture design [CPU] Optimization OEM OS platform Of these, the fabrication/OS point is the most profitable (but is dependent on the number of OEM adopters).  The second most profitable niche is optimization (which again is dependent on OEM adopter market share), followed by OEM markups.  In terms of expense, fabrication and operating system designs requires the greatest capital investment and the highest risk.
  • In terms of difficulty/risk, the fabrication and operating system are the most difficult/risky points.  Hence in terms of combined risk, cost, and profitability the ranking of which points are "best" is arguably: Optimization Architecture design OS platfrom OEM Fabrication ...with the fabrication point being last largely because it's so high risk. In other words, the last thing Intel wants is to settle into a niche of playing fabs for everybody else's product, as that's an unsound approach.  If you can't keep up in terms of chip design, you typically spin off your fabs and opt for a different architecture direction -- just look at Advanced Micro Devices, Inc.'s (AMD) spinoff of GlobalFoundries and upcoming ARM product to see that.
  • IV. Top Firms' Role on That Food Chain
  • Apple has seen unbelievable profits due to this fundamental premise.  It controls the two most desirable points on the food chain -- OS and optimization -- while sharing some profit with its architecture designer (ARM Holdings) and a bit with the fabricator (Samsung Electronics Comp., Ltd. (KSC:005930)).  By choosing to play operating system maker, too, it adds to its profits, but also its risk.  Note that nearly every other first-party exclusive smartphone platform has failed or is about to fail (i.e. BlackBerry, Ltd. (TSE:BB) and the now-dead Palm).
  • Intel controls points 1, 2, and 5, currently, on the food chain.  Compared to Apple, Intel's points of control offer less risk, but also slightly less profitability. Its architecture control may be at risk, but even so, it's currently the top in its most risky/expensive point of control (fabrication), where as Apple's most risky/expensive point of control (OS development) is much less of a clear leader (as Android has surpassed Apple in market share).  Hence Apple might be a better short-term investment, but Intel certainly appears a better long-term investment.
  • Samsung is another top company in terms of market dominance and profit.  It occupies points 1, 3, 4, and 5 -- sometimes.  Sometimes Samsung's devices use third-party optimization firms like Qualcomm Inc. (QCOM) and NVIDIA Corp. (NVDA), which hurts profitability by removing one of the most profitable roles.  But Samsung makes up for this by being one of the largest and most successful third party manufacturers.
  • Microsoft enjoys a lot of profit due to its OS dominance, as does Google Inc. (GOOG); but both companies are limited in controlling only one point which they monetize in different ways (Microsoft by direct sales; Google by giving away OS product for free in return for web services market share and by proxy search advertising revenue).
  • Qualcomm and NVIDIA are also quite profitable operating solely as optimizers, as is ARM Holdings who serves as architecture maker to Qualcomm, NVIDIA, Apple, and Samsung.
  • V. Four Scenarios in the x86 vs. ARM Competition
  • Scenario one is that x86 proves dominant in the mobile space, assuming a comparable process.
  • A second scenario is that x86 and ARM are roughly tied, assuming a comparable process.
  • A third scenario is that x86 is inferior to ARM at a comparable process, but comparable or superior to ARM when the x86 chip is built using a superior process.  From the benchmarks I've seen to date, I personally believe this is most likely.
  • A fourth scenario is that x86 is so drastically inferior to ARM architecturally that a process lead by Intel can't make up for it.
  • This is perhaps the most interesting scenario, in the sense of thinking of how Intel would react, if not overly likely.  If Intel were faced with this scenario, I believe Intel would simply bite the bullet and start making ARM chips, leveraging its process lead to become the dominant ARM chipmaker.  To make up for the revenue it lost, paying licensing fees to ARM Holdings, it could focus its efforts in the OS space (it's Tizen Linux OS project with Samsung hints at that).  Or it could look to make up for lost revenue by expanding its production of other basic process-sensitive components (e.g. DRAM).  I think this would be Intel's best and most likely option in this scenario.
  • VI. Why Intel is Unlikely to Play Fab For ARM Chipmakers (Even if ARM is Better)
  • From Intel's point of view, there is an entrenched, but declining market for x86 chips because of Windows, and Intel will continue to support Atom chips (which will be required to run Windows 8 tablets), but growth on desktops will come from 64 bit desktop/server class non-Windows ARM devices - Chromebooks, Android laptops, possibly Apple's desktop products as well given they are going 64 bit ARM for their future iPhones. Even Windows has been trying to transition (unsuccessfully) to ARM. Again, the Windows server market is tied to x86, but Linux and FreeBSD servers will run on ARM as well, and ARM will take a chunk out of the server market when a decent 64bit ARM server chip is available as a result.
  •  
    Excellent article explaining the CPU war for the future of computing, as Intel and ARM square off.  Intel's x86 architecture dominates the era of client/server computing, with their famed WinTel alliance monopolizing desktop, notebook and server implementations.  But Microsoft was a no show with the merging mobile computing market, and now ARM is in position transition from their mobile dominance to challenge the desktop -notebook - server markets.   WinTel lost their shot at the mobile computing market, and now their legacy platforms are in play.  Good article!!! Well worth the read time  ................
Paul Merrell

CISPA is back! - 0 views

  • OPERATION: Fax Big Brother Congress is rushing toward a vote on CISA, the worst spying bill yet. CISA would grant sweeping legal immunity to giant companies like Facebook and Google, allowing them to do almost anything they want with your data. In exchange, they'll share even more of your personal information with the government, all in the name of "cybersecurity." CISA won't stop hackers — Congress is stuck in 1984 and doesn't understand modern technology. So this week we're sending them thousands of faxes — technology that is hopefully old enough for them to understand. Stop CISA. Send a fax now!
  • (Any tweet w/ #faxbigbrother will get faxed too!) Your email is only shown in your fax to Congress. We won't add you to any mailing lists.
  • CISA: the dirty deal between government and corporate giants. It's the dirty deal that lets much of government from the NSA to local police get your private data from your favorite websites and lets them use it without due process. The government is proposing a massive bribe—they will give corporations immunity for breaking virtually any law if they do so while providing the NSA, DHS, DEA, and local police surveillance access to everyone's data in exchange for getting away with crimes, like fraud, money laundering, or illegal wiretapping. Specifically it incentivizes companies to automatically and simultaneously transfer your data to the DHS, NSA, FBI, and local police with all of your personally-indentifying information by giving companies legal immunity (notwithstanding any law), and on top of that, you can't use the Freedom of Information Act to find out what has been shared.
  • ...1 more annotation...
  • The NSA and members of Congress want to pass a "cybersecurity" bill so badly, they’re using the recent hack of the Office of Personnel Management as justification for bringing CISA back up and rushing it through. In reality, the OPM hack just shows that the government has not been a good steward of sensitive data and they need to institute real security measures to fix their problems. The truth is that CISA could not have prevented the OPM hack, and no Senator could explain how it could have. Congress and the NSA are using irrational hysteria to turn the Internet into a place where the government has overly broad, unchecked powers. Why Faxes? Since 2012, online and civil liberties groups and 30,000+ sites have driven more than 2.6 million emails and hundreds of thousands of calls, tweets and more to Congress opposing overly broad cybersecurity legislation. Congress has tried to pass CISA in one form or another 4 times, and they were beat back every time by people like you. It's clear Congress is completely out of touch with modern technology, so this week, as Congress rushes toward a vote on CISA, we are going to send them thousands of faxes, a technology from the 1980s that is hopefully antiquated enough for them to understand. Sending a fax is super easy — you can use this page to send a fax. Any tweet with the hashtag #faxbigbrother will get turned into a fax to Congress too, so what are you waiting for? Click here to send a fax now!
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Join The Internet Vote - 0 views

  • Congress is about to introduce a bill to fast track a secret deal that could lead to global censorship. It’s called the Trans-Pacific Partnership (TPP). We think Internet users everywhere should have a say in decisions that affect the Internet — but if “Fast Track” legislation passes, there is no chance that the public will see the text before the deal is approved. Join the Internet Vote on April 23rd and let’s make it clear to DC how we’re voting: against Fast Track and against Internet censorship. (Learn More)
  •  
    Sign up (email address) for updates on a monumental lobbying effort coming up in the next few days when Congress comes back into session and the legislation to "Fast Track" the TPP *and all future trade agrerements* is introduced. From leaked draft portions, we know that the TPP brings us internet censorship and a mass of copyright law changes that have the giant intellectual property corproate folk drooling at the mouth, because they helped write it while the public was excluded. This is your chance to help end secret trade agreements that the public doesn't even get to see until they have already been made into law.
Gary Edwards

Does It Matter Who Wins the Browser Wars? Only if you care about the Future of the Open... - 1 views

  •  
    The Future of the Open Web You're right that the browser wars do not matter - except for this point of demarcation; browsers that support HTML+ and browser that support 1998 HTML. extensive comment by ~ge~ Not all Web services and applications support HTML+, the rapidly advancing set of technologies that includes HTML5, CSS3, SVG/Canvas, and JavaScript (including the libraries and JSON). Microsoft has chosen to draw the Open Web line at what amounts to 1998-2001 level of HTML/CSS. Above that line, they provision a rich-client / rich-server Web model bound to the .NET-WPF platform where C#, Silverlight, and XAML are very prominent. Noticeably, Open Web standards are for the most part replaced at this richer MSWeb level by proprietary technologies. Through limited support for HTML/CSS, IE8 itself acts to dumb down the Open Web. The effect of this is that business systems and day-to-day workflow processes bound to the ubiquitous and very "rich" MSOffice Productivity Environment have little choice when it comes to transitioning to the Web but to stay on the Microsoft 2010 treadmill. Sure, at some point legacy business processes and systems will be rewritten to the Web. The question is, will it be the Open Web or the MS-Web? The Open Web standards are the dividing line between owning your information and content, or, having that content bound to a Web platform comprised of proprietary Microsoft services, systems and applications. Web designers and developers are still caught up in the browser wars. They worry incessantly as to how to dumb down Web content and services to meet the limited functionality of IE. This sucks. So everyone continues to watch "the browser wars" stats. What they are really watching for though is that magic moment where "combined" HTML+ browser uptake in marketshare signals that they can start to implement highly graphical and collaboratively interactive HTML+ specific content. Meanwhile, the greater Web is a
Gary Edwards

Father of CSS plans for Web publishing future | Deep Tech - CNET News - 1 views

  • "You paint a layout with ASCII art," a sort of visual design made out of text directly in the CSS code, Lie said, "then fill content into that. It's an experimental specification, but one I think has that compactness and terseness and minimalism that's part of CSS but still allows you to do quite advanced layouts."
    • Gary Edwards
       
      What???  Why not use SVG!
  •  
    After years of relative obscurity, the Web formatting standard called CSS, or Cascading Style Sheets has come into its own, taking a starring role as the mechanism for building a new generation of interactive, elaborate Web pages. CSS is growing in new directions now, and the technology's original creator believes its next direction for improvement will be dealing with more complicated Web page layout chores. "There is important work left to be done for layout," Håkon Wium Lie, who is also Opera's chief technology officer, said in an interview here. The new CSS3 under development now can handle multi-column text arrangements, "but you couldn't replicate a printed newspaper in CSS."
Maluvia Haseltine

Open Web Foundation - 0 views

  •  
    An independent non-profit dedicated to the development and protection of open, non-proprietary specifications for web technologies. Aimed at building a lightweight framework to help communities deal with the legal requirements necessary to create successful and widely adopted specifications. hoping to break the trend of creating separate legal entities to support individual specifications, coming out of the realization that we could come together and generalize our efforts.
Gary Edwards

Outlook 2011 uses Webkit to render HTML | 9 to 5 Mac Outlook 2011 uses Webkit to render... - 0 views

  •  
    A little tidbit from the Microsoft gathering this evening.  While demonstrating Outlook for Mac and the HTML rendering engine, Microsoft employees revealed that instead of using the Word HTML rendering that previous versions of Mac Office used (and the PC version as well), Microsoft has moved over to Apple's Webkit rendering engine to render HTML mails.  Outlook 2011 also uses WebKit to create HTML mail. For those of you who didn't like Entourage's HTML mail, Outlook's WebKit mail, you are in for a pleasant surprise. Why is this a big deal?  This is the first time that Microsoft has used Apple's Open Source Webkit framework in their products.  It will be interesting to see if Webkit spreads to other areas. Office 2011 ships tomorrow and starts at $110 for a 2 license student edition.
Paul Merrell

FCC Reclaims Powers Over Internet Access Companies (Update3) - BusinessWeek - 0 views

  • May 6 (Bloomberg) -- Federal Communications Commission Chairman Julius Genachowski claimed power to regulate companies that provide Internet access, opening a fight with cable and telephone companies and sparking opposition from Republicans. Comcast Corp., Time Warner Cable Inc. and Cablevision Systems Corp., cable operators that sell Web connections, fell more than 6 percent in New York trading.
  • Genachowski’s plan requires commission approval, and two fellow Democrats have signaled they will support the chairman, giving him a majority. The FCC will vote following a comment period, spokeswoman Jen Howard said in an interview.
  • The FCC had censured Comcast, the largest U.S. cable provider, for blocking customers using the BitTorrent file- sharing software that can send and receive videos. Comcast said it acted to alleviate network congestion. The appeals court sided with Comcast.
  •  
    I wouldn't read too much into the drop in ISP stock prices. NYSE stocks plummeted over-all today, with investors reacting to bad economic news from Greece. The article can be a bit confusing in regard to the FCC move following its court loss to Comcast. That court case did not involve the FCC's telephony regulatory powers. The FCC is now rebuilding its prior position on a new legal foundation, a separate title of the enabling legislation that deals with telephone regulation rather than broadband regulation. 
Paul Merrell

Kohl Wary Of Comcast-NBCU Deal - Tech Daily Dose - Tech Daily Dose - 0 views

  • An influential Democratic senator urged federal regulators today to only approve the proposed $30 billion merger of Comcast and NBC Universal if they determine that "sufficient conditions" are "unlikely to cause any substantial lessening of competition," CongressDaily reported.
  • Kohl detailed his views in a letter to FCC Chairman Julius Genachowski and Assistant Attorney General Christine Varney. The lawmaker recommended 11 requirements, including the divestiture of NBC's stake in the online video site Hulu, a ban on Comcast shifting marquee NBC content to cable for a decade and restricting Comcast from blocking or degrading competing video services online. Kohl weighed in after Congress held four hearings earlier this year on the merger and as lobbying over the transaction continues to intensify. The companies have said they're expecting a regulatory decision in the fourth quarter.
Gary Edwards

Paul Buchheit: The Cloud OS - 0 views

  •  
    First, what is a "cloud OS" and why should I want one? Actually, I don't even know if anyone calls it a "cloud OS", but I couldn't find a better generic term for something like ChromeOS. The basic idea is that apps and data all live on the Internet, which is has been renamed "The Cloud" since that sounds cooler, and your laptop or whatever is basically just a window into that cloud. If your laptop is stolen or catches fire or something, it's not a big deal, because you can just buy another one and nothing has been lost (except your money). Many people characterize this approach as using a "dumb terminal", but that's wrong. Your local computer can still do all kinds of smart computation and data manipulation -- it's just no longer the single point of failure. To me, the defining characteristic of cloud based apps is "information without location". For example, in the bad old days, you would install a copy Outlook or other email software on your PC, it would download all of your email to your computer, and then the email would live on that computer until Outlook corrupted its PST file and everything was lost. If you accidentally left your computer at home, or it was stolen, then you simply couldn't get to your email. Information behaved much like a physical object -- it was always in one place. That's an unnecessary and annoying limitation. By moving my email into "the cloud", I can escape the limitations of physical location and am able to reach it from any number of computers, phones, televisions, or whatever else connects to the Internet. For performance and coverage reasons, those devices will usually cache some of my email, but the canonical version always lives online. The Gmail client on Android phones provides a great example of this. It stores copies of recent messages so that I can access them even when there is no Internet access, and also saves any recent changes (such as new messages or changes to read state), but as soon as possible it sends those chang
Gary Edwards

Cognito Comics launches its first graphic novel for the iPad | VentureBeat - 0 views

  •  
    Add this to the Sports Illustrated "immersive" magzine for the iPAD as clear indication that the entire idea of what a visual document is has changed dramatically.  Radically. excerpt: The coolest media experiences that I've seen on the iPad - Operation Ajax, a graphic novel created specifically for the device. At the time, the idea was still very much in development, but today the Operation Ajax application has gone live in Apple's App Store. The major startups in digital comics, ComiXology and Graphic.ly, have focused their energies on making deals with publishers to transfer existing comics to the iPad or other devices. Operation Ajax, on the other hand, was created with the iPad in mind, avoiding some of the issues that come with transferring from print (the iPad screen is slightly smaller than a standard comic book page, for starters), and also making the supplementary material that can't be delivered in print a natural extension of the experience.
Gary Edwards

I, Cringely » Blog Archive » iCloud's real purpose: kill Windows - Cringely o... - 0 views

  •  
    I'm not convinced that iCloud will eliminate Windows, MAC and Linux desktops.  I've been using DropBox, SyncDocs, Live.com while testing a number of backup-store-synch-share file services. IMHO, it's all about the apps that act on your data.  And these can come from the desktop, the Browser, or the device.  The best app platform for Cloud hosted data seems to be moving towards HTML5-JS.  Not Win32, .NET, C#, Java or Cocoa (iOS).  And Google clearly has he best platform of integrated services and API's.  They are best positioned to win the Cloud Wars if HTM5-JS and Native Client can close the deal on Cloud apps.  IMHO. excerpt: Apple's announcements yesterday about OS X 10.7 pricing (cheap), upgrading (easy), iOS 5, and iCloud storage, syncing, and media service can all be viewed as increasing ease of use, but from the perspective of Apple CEO Steve Jobs they perform an even more vital function - killing Microsoft. Here is the money line from Jobs yesterday: "We're going to demote the PC and the Mac to just be a device - just like an iPad, an iPhone or an iPod Touch. We're going to move the hub of your digital life to the cloud." Just like they used to say at Sun Microsystems, the network is the computer. Or we could go even further and say our data is the computer. This redefines digital incumbency. The incumbent platform today is Windows because it is in Windows machines that nearly all of our data and our ability to use that data have been trapped. But the Apple announcement changes all that. Suddenly the competition isn't about platforms at all, but about data, with that data being crunched on a variety of platforms through the use of cheap downloaded apps.
Gary Edwards

'Returnees' dominate Chinese startup culture - Tech News and Analysis - 0 views

  •  
    excerpt: In China, the red-hot tech scene seems dominated by a small group of entrepreneurs who paid their dues in Silicon Valley before returning home to create successful Internet and software startups. Aside from finding fame and fortune, these "returnees" are also laying the foundation for a startup culture that will allow grassroots entrepreneurs to flourish as well. Returnees - Chinese nationals who studied or worked the U.S. - head up just 3 percent of all tech companies in China, yet they represent nearly 70 percent of all startups that go public in the U.S. market (still the largest measure of success in the industry), according to an internal study by Palo Alto, Calif.-based venture capital firm GSR Ventures, which deals exclusively in China. The firm also found startups created by returnees were much likelier to become financially successful and hire more employees than startups founded by Chinese entrepreneurs who never worked in the U.S. Part of that may be cultural: a culture Jack Jia, a partner at GSR sees changing, albeit slowly. he still sees a "drastic" disparity between startups founded by home-grown entrepreneurs and their returnee counterparts during pitching sessions and business plan competitions all across China. Thus, he rarely funds companies headed up by Chinese engineers without managerial-level experience at tech companies in the U.S., even though he would like to encourage the growth of Chinese entrepreneurs who have stayed at home. "Most have no clue what they are doing. The basic expertise, the passion and experience is often lacking," he said. "And it's not that they don't have the same talent or ability, it's just they haven't been exposed to the same things as their American counterparts."
Gary Edwards

Chrome Developer Tools: Remote Debugging - Google Chrome Developer Tools - Google Code - 0 views

  •  
    Incredible.  I'm wondering if either Jason or florian has thought about using the Chrome JSON messaging layer to expose docx conversions to OTXML?  Essentially, when Florian breaks a .docx document, he only deals with the objects and how they are positioned (layout) on a page.  Once captured and described, these xObjects could then be converted to JSON.  The Chrome web client/ web server port (9222) could then, theoretically be used to observe the JSON xObjects?  Interesting. intro:  Under the hood, Chrome Developer Tools is a web application written in HTML, JavaScript and CSS. It has a special binding available at JavaScript runtime that allows interacting with chrome pages and instrumenting them. Interaction protocol consists of commands that are sent to the page and events that the page is generating. Although Chrome Developer Tools is the only client of this protocol, there are ways for third parties to bypass it and start instrumenting browser pages explicitly. We will describe the ways it could be done below. Contents Protocol Debugging over the wire Using debugger extension API
Paul Merrell

AT&T Centennial Purchase Cleared by Antitrust Agency (Update1) - Bloomberg.com - 0 views

  • AT&T Inc.’s purchase of Centennial Communications Corp. was approved by the U.S. Justice Department on condition the combined company sells wireless assets in Louisiana and Mississippi. AT&T, based in Dallas, agreed to purchase Wall, New Jersey-based Centennial last November for $945 million. Centennial has wireless customers in Puerto Rico and rural areas in the Midwest and Southeast.
  • The deal still awaits approval by the Federal Communications Commission. Ruth Milkman, who heads the FCC’s wireless bureau, told a news conference today the agency will make a decision on the combination “very soon.” The Justice Department said it has cooperated with the FCC in reviewing the deal.
  • In recent months, the FCC has been asking the companies about their connections to America Movil, which has customers in Puerto Rico. AT&T and Centennial could have 49 percent of the mobile market in Puerto Rico by the end of 2009, and America Movil’s Claro could have 27 percent, according to an estimate by Jose Magana, a Cambridge, Massachusetts-based analyst with Pyramid Research.
Gary Edwards

Stephen Peront : Custom Document Format Interoperability - bound business processes - 0 views

  •  
    Custom Document Format Interoperability You may have heard that Office 2007 SP2 will now support editing files in the OpenDocument 1.1 (ODF) format. This document format was added to Office's long list of supported documents formats to give customers more choices for the format they use to save their documents. In addition to allowing you to edit the ODF 1.1 format within Office 2007, SP2 also supports a new External File Format API that can be used to edit other document formats as well. With this API, users can choose to save their documents in any format they want. In this post we will explore how to use the API to enable Office 2007 to edit our own custom document format. We will then use Office 2007 to save our custom format as DOCX, ODT and HTML. Our Custom Document Format For the purpose of this article, we have a company who needs to manage their sales pipeline information. The data is available as XML, but they do not want to spend the money to build a custom editor. They just want to let their users edit the pipeline data in Word, as a table. They give these files an extension of SPLX (i.e. Sales PipeLine Xml) The sales pipeline information is made up of a series of SalesItem tags, each with a unique id that represents the index of the item. They track the name of the customer (CustomerName), how much the deal represents (DealValue) and a percent that represents how confident they are that the sales opportunity will close (ConfidencePercent).
Paul Merrell

Microsoft vs. Google: Office Web Will Kill Google Docs - Business Center - PC World - 0 views

  • Maybe Google will be able to rescue something from its Docs misadventure, but it better do something quick. Microsoft says it can solve big customers' big complaint about Google Docs and will do so at a price Google understands: Free. Here's the gripe: Corporate IT doesn't think Google Docs are a secure place for important information. Microsoft will deal with this by offering something Google doesn't, the ability to host Office Web on the customer's own servers. And Microsoft will include this capability--for free--as part of all Office 2010 volume-licensing agreements. OK, that isn’t totally free, but for customers who will upgrade to Office 2010 it's a nice value add. It is also something Microsoft could easily package with other deals, such as server operating systems and even Windows 7, as an incentive to upgrade.
‹ Previous 21 - 40 of 85 Next › Last »
Showing 20 items per page