November 08, 2011

Meet CommentAir Technologies

CommentAir a
ims to provide in-stadium sports fans access to game commentaries previously heard only by TV viewers.



Bookmark php Will flow-through shares program help finance tech firms?

Posted by: blogtest123 at 03:52 PM | No Comments | Add Comment
Post contains 30 words, total size 1 kb.

November 07, 2011

People imbue the tech brand

 

Back in the late-1990s I wrote a column for Computer Dealer News in which I somewhat facetiously contended that the Pope is the world’s greatest living spokesperson for a “brand.” I still think that, and was reminded of it after the recent passing of Steve Jobs.

 

Andrew Berthoff

I say living spokesperson, because most religions have a prophet who established the doctrine. We can point to central figures in Christian, Buddhist, Mormon and other faiths whose teachings guide the religion’s beliefs.

 

While I don’t want to wade into the murky waters of whether Steve Jobs led a quasi religion of Apple faithful, we can use his leadership to illustrate the pros and cons of an individual being closely identified with a company, or, conversely, the identity of a company wrapped in a single person.

 

As a reader of ITBusiness, you are most likely working with a company of some kind. Whether a large enterprise or a SME or even as a three-person consultancy, the essential tenets and risks of branding via personality remain the same. While products and services are brought to customers by people, at the end of the day they are products and services. They work or they don’t. They live on after the people behind them move on. The sellable goods provide a guarantee of continuity.



Motorola t215 bluetooth car speaker phone The End of XP…they MEAN it this time.

Posted by: blogtest123 at 05:02 PM | No Comments | Add Comment
Post contains 242 words, total size 2 kb.

November 04, 2011

Is RIM taking too long to release BlackBerry outage peace offering?

by Nestor E. Arellano

 

In cartoons, sitcoms and some real life situations, when a man makes a mistake in a relationship, he usually tries to patch things up with a bunch of flowers.  

Nestor Arellano

A was Research In Motion’s peace offering to over 70 million BlackBerry users who were inconvenienced by an outage that prevented them from using the popular BlackBerry Messenger service. From Oct 19 to Dec. 31, BlackBerry users could pick for free as much as a $100 worth of pre-selected premium apps from RIM’s App World store. The selection, which ranges in price from $5 to $15 each, includes apps such as Sims 3, Bejeweled, Texas Hold’em Poker 2, and Shazam Encore. Enterprise customers also get a month of free tech support.

“This is something we would like to offer as a form of thanks,” said Jim Balsillie, the companies co-CEO. 

At first blush, the move appears to be a master stroke of brinkmanship. 



Bookmark php Osfoora HD winners!

Posted by: blogtest123 at 07:42 AM | No Comments | Add Comment
Post contains 176 words, total size 2 kb.

November 03, 2011

Tricky social media puzzle makes audience feel smart

Tricky social media puzzle makes audience feel smart

I’ve been a long time fan of Trent Reznor and the , to the point that I pay an unhealthy amount of attention to every project Reznor becomes involved in. At least enough that I know that after winning an Oscar for scoring David Fincher’s The Social Network last year, Reznor collaborated with Fincher again on the upcoming movie sound track.

Not only was Reznor involved in the soundtrack, but it’s become clear to me that he’s also involved in the marketing of the movie. There’s been a couple of cryptic Web sites set up and a Twitter account called . Much of the design on the Web sites harken back to artwork NIN has featured both online and in its album art over the years with images of natural elements in a square grid. And today, the MouthTapedShut Twitter account engaged its users in a puzzle that is reminiscent of the tactics Reznor used to promote Year Zero.

Here’s what I saw come up on my screen in TweetDeck, and the same puzzle as it appears on Twitter, where it is a bit easier to read:

TweetDeck is on left, Twitter page on right.

Staring at the cryptic text over my lunch, I realized the message could be read by starting from the top and reading down, column by column to reveal a Web address: . The “What Is Hidden In Snow” domain is one of the Web sites attached to promotion of Fincher’s new movie. This particular page featured a photo of a street bench, a clock with time running down from 6 hours, and two numbers separated by comma. Also the phrase “Trouve l’objet avant que le temps soit écoulé.” The french translates loosely to “find this object before time runs out.”

I guessed that the two numbers under the photo were longitude and latitude and input them into Google Maps. (A bit later on, the Web page just embedded a Google Map of the location for those who solved the Twitter puzzle, removing a step needed to solve this riddle.) The location is on a busy street in Paris, and I confirmed the bench location using Street View. Unfortunately that was as far as I could play, as the object of the game was to physically get to the bench.

Following the trail of this puzzle was quite a delight, and I felt pretty smart when I tracked down the bench in question, even though I had no idea what was there in the real world. The step-by-step puzzle was tricky enough to trip up the casual observer, but solvable by anyone willing to think it through and with a basic knowledge of available Web services. It provided a real sense of discovery as you worked through it and succeeded at making those talking about it feel like they were “in” on something exclusive.

The clues had me scouring Twitter for people talking about the experiment, and I discovered that similar games have been played in other cities including Orlando, New Orleans and . I was disappointed to have missed out on Toronto, but don’t think I would have solved the puzzle that required knowledge of how braille works.

It’s a refreshing example of how social media marketing can be about more than link sharing, and sometimes making the payoff a bit more challenging (but still fun) to get to can make for a memorable experience.

November 02, 2011

A new twist on shortened URLs as spam carriers

Symantec rep
orts on a new way spammers are getting victims to click on spam links in e-mails.



Cavoukian orders Cancer Care Ontario to implement EMR

Posted by: blogtest123 at 03:52 PM | No Comments | Add Comment
Post contains 34 words, total size 1 kb.

November 01, 2011

How to lose public trust and achieve international ridicule

How to lose public trust and achieve international ridicule

by Claudiu Popa

Talk to anyone in the world of business about their biggest hacking fear and you’re bound to hear that “embarrassment” ranks right up there near the top.

Claudiu Popa

Everyone knows that to do a proper job of alienating clients and embarrassing your organization you need to not just be good at, but excel at three things:

  1. amateurish planning in protecting against security and privacy problems
  2. boneheaded response once a breach has taken place
  3. abject failure to make sure it doesn’t happen again

 

I know what you’re thinking: “Hey! That sounds pretty difficult to pull off! I was hoping for an easy way to annihilate my audience and damage my credibility! I thought you were good! Can you at least give me an example?”

Okay, if you’re gonna be like that, I’ll give you three!

Sony: Still tops

Not to harp on the now familiar , but by many accounts, it wasn’t just one, but by some accounts some 18 different breaches that impacted over 77 million users. That’s more than twice the population of Canada plus all the bricks in theEmpireStateBuilding (that’s right, I did my homework, folks)!

If you’re looking for a perfect example, look no further:

  1. poor or no protection for private information & confidential data: check (12 million unencrypted credit cards: exposed)
  2. weak, delayed, ineffective response to the breach: check (this week, 93000 users were surprised to find that Sony has locked them out of their accounts as it still struggles to contain the breach)
  3. will it happen again? Yes, but only 17 times. Stay tuned. (the figure was later revised to 101.6 million compromised records)

Our favorite stunt was the gazillions supposedly spent on ‘thanking’ users for their loyalty by offering a couple of free games. The catch? You forget about download caps and exercise patience as you strive to download the multiple DVDs worth of data. Thankfully, the load on the Sony servers was such that most users simply gave up trying.

RIM, made a run for the top spot this month when it apologized for an that left an estimated 17 million Blackberry – mostly business – users worldwide without data service for the greater part of a week. RIM’s CEO stated the obvious: “We’ve worked hard to earn [customer] trust over the past 12 years, and we’re committed to providing the high standard of reliability they expect, today and in the future”. The predictability of this event notwithstanding, RIM has declined to offer any other compensation than, you guessed it, . And you guessed again, when trying to cash in on their stated $100 value of the 8 games on offer, the message predictably says: “Blackberry App World is having trouble connecting… verify your connection and try again…”

The U.S. military: A good one, but not in a good way

You may have heard that the U.S. Air Force’s deadly unmanned drone program routinely employed in Iraqand Afghanistan. #1: check.

As it turns out, the malware wasn’t the highly targeted infection by an evil foreign nation that everyone said it was. According to the Air Force, the virus was simply designed to steal logins and passwords from regular users (not military personnel, you see), with a particular affinity for online games. So there you have it, nothing to worry about: it wasn’t so serious, just some plain old malware that happened to infect the Predator and Reaper drones’ ground systems. Thanks for the clarification. #2: check.

Will it happen again? “It’s standard policy not to discuss the operational status of our forces” said a spokesperson but added: “The ability to fly the drones remained secure throughout the incident”. According to some reports, the malware resisted several attempts to clean infected systems. In its statement, the Air Force did not name the threat or state whether it had been expunged from affected systems. #3: check. 

The German government: Still fans of people watching

As the story goes, government officials have been you’ve heard of. The undetectable software was detected by the (in)famous Chaos Computer Club (CCC) who upon dismantling it, found the names of the two famous Star Wars droids embedded within. Dubbed R2D2 (which is better than the two alternatives currently in use, 0zapftis and Bundestrojaner), the software initially prompted the government to clam up, but in the face of public outrage, an investigation was initiated by the German Justice Minister. To date, four German states have confessed to using the program. #1: check.

The four state authorities allege that the software was only used with court orders and specifically to conduct wiretaps on encrypted Internet telephony, however the forensic analyses performed by CCC and other companies indicate that its use was to broadly capture activity through all installed browsers, keyboard and other applications. It was also created to allow remote control, software updates and on-the-fly customization to add or modify its functionality, thus voiding any claims of its legality. To top it all off, it was found to have security vulnerabilities, further exposing the users. The state authorities have offered no explanation or clarification so far. #2: check.

When this all hit the fan, a German firm called DigiTask came forward and indicated that the software was likely theirs, having sold it to the government for the equivalent of millions of dollars back in 2007. The company also volunteered that it had sold it to other governments, such asAustria,Switzerlandand theNetherlands. Given the European nation’s Nazi and Communist past, the degree of outrage and potential ramifications of this embarrassing event couldn’t be overstated, even by me. #3: check.

So there you have it, your very own free checklist with very real examples! The very complex process of damaging public trust and confidence. I simply couldn’t make it any easier than this. It’s as easy as 1,2,3!

 

About the author:
Claudiu Popa, Principal Risk Advisor at Informatica Corporation (www.SecurityandPrivacy.ca).Follow him at or . A published author, lecturer and entrepreneur, Claudiu enjoys writing incendiary pieces of great interest to ITBusiness readers.

 

 





Give Canada’s Privacy Commissioner the teeth it deserves

Posted by: blogtest123 at 07:42 AM | No Comments | Add Comment
Post contains 1026 words, total size 8 kb.

<< Page 2 of 2 >>
28kb generated in CPU 3.5536, elapsed 3.5164 seconds.
32 queries taking 3.467 seconds, 81 records returned.
Powered by Minx 1.1.6c-pink.