<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-10202443</id><updated>2024-08-28T20:32:14.220+04:00</updated><category term="Web 2.0"/><category term="Web 3.0"/><title type='text'>Computer Consultant</title><subtitle type='html'>&quot;If you have an apple and I have an apple and we&#xa;exchange apples then you and I will still each have&#xa;one apple. But if you have an idea and I have an idea&#xa;and we exchange these ideas, then each of us will have&#xa;two ideas.&quot; --  George Bernard Shaw (1856-1950))</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>69</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-10202443.post-1367348290351692775</id><published>2010-04-28T09:56:00.002+04:00</published><updated>2010-04-28T09:56:58.699+04:00</updated><title type='text'>Microsoft Certification: free Second Shot offer</title><content type='html'>Take a Second Shot at certification and advance your career&lt;br /&gt;
Whether you are currently unemployed, looking for a promotion, or trying to become indispensable in your existing role, Microsoft Certifications can help validate that you have the skills needed to work in the top IT professional and developer jobs in the industry.&lt;br /&gt;
Take advantage of our Second Shot offer and get a free retake if you do not pass an IT professional or developer Microsoft Certification exam the first time. You must take both the first and (if necessary) the retake exam before June 30, 2010.&lt;br /&gt;
Offer details:&lt;br /&gt;
• Dates: January 13, 2010 – June 30, 2010.&lt;br /&gt;
• Details: You must register, obtain a voucher code, schedule, pay, and take the first and (if necessary) the retake exam before June 30, 2010.&lt;br /&gt;
• Applicable exams: This offer applies to all Microsoft Learning IT professional, developer, project management, and Microsoft Dynamics exams, including academic exams.&lt;br /&gt;
• Eligible countries and regions: This is a worldwide offer that is available at Prometric test centers only.&lt;br /&gt;
Note Only one Second Shot voucher is available per purchased exam. &lt;br /&gt;
&lt;br /&gt;
For vouchers Contact: saleempc@gmail.com&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/1367348290351692775/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/1367348290351692775' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/1367348290351692775'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/1367348290351692775'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2010/04/microsoft-certification-free-second.html' title='Microsoft Certification: free Second Shot offer'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-7795537888717296140</id><published>2010-03-18T09:40:00.000+04:00</published><updated>2010-03-18T09:40:33.889+04:00</updated><title type='text'>Are You Frustrated The Law of Attraction is Not Working For You Especially in the Area of Attracting Money?</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;I don’t know about you, but I seem to get the feeling that people are generally frustrated the Law of Attraction is not working consistently for them, ESPECIALLY in the area of wealth.&lt;/p&gt;&lt;br /&gt;
&lt;p align=&quot;justify&quot;&gt;Sure, people have used the Law of Attraction to help them in many areas of life, from love and relationships to career to health. But wealth seems to be the area of priority for most people, and ironically, it also seems to be the area most people find least success in. It almost feels like there’s a correlation…&lt;/p&gt;&lt;br /&gt;
&lt;p align=&quot;justify&quot;&gt;I’m curious to see if I’ve somehow hit the nail on the head with this observed correlation, so I’ll be interested to know on a scale of 1-10, how much focus have you put into expanding your wealth by using the &lt;a href=&quot;http://saleempc.thesgr.hop.clickbank.net/?s=equation&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Law of Attraction?&lt;/b&gt;&lt;/a&gt; And, on a scale of 1-10, how successful have you been with the Law of Attraction to attract money into your life?&lt;/p&gt;&lt;br /&gt;
Just let me know in the comments. Cheers.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/7795537888717296140/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/7795537888717296140' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/7795537888717296140'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/7795537888717296140'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2010/03/are-you-frustrated-law-of-attraction-is.html' title='Are You Frustrated The Law of Attraction is Not Working For You Especially in the Area of Attracting Money?'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-506925445099954870</id><published>2010-02-16T15:48:00.000+04:00</published><updated>2010-02-16T15:48:56.679+04:00</updated><title type='text'>Information Security Management System (ISMS) – ISO 27001</title><content type='html'>Information Security Management System (ISMS) is a management system based on a systematic business risk approach, to establish, implement, operate, monitor, review, maintain, and improve information security. It is an organizational approach to information security. ISO/IEC 27001 is a standard for information security that focuses on an organization&#39;s ISMS.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Objective of ISMS&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Information security is the protection of information to ensure:&lt;/b&gt;&lt;br /&gt;
• Confidentiality: ensuring that the information is accessible only to those authorised to access it.&lt;br /&gt;
• Integrity: ensuring that the information is accurate and complete and that the information is not modified without authorization.&lt;br /&gt;
• Availability: ensuring that the information is accessible to authorized users when required.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why should I implement ISO 27001 ISMS?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
• Certification of a management system brings several advantages. It gives an independent assessment of your organization&#39;s conformity to an international standard that contains best practices from experts for ISMS.&lt;br /&gt;
• Meeting legislative and regulatory requirements&lt;br /&gt;
• As a measure and independent evidence that industry best practices are being followed.&lt;br /&gt;
• As part of a corporate governance program&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Process for implementing ISO 27001&lt;/b&gt;&lt;br /&gt;
1. Define an information security policy&lt;br /&gt;
2. Define scope of the information security management system&lt;br /&gt;
3. Perform a security risk assessment&lt;br /&gt;
4. Manage the identified risk&lt;br /&gt;
5. Select controls to be implemented and applied&lt;br /&gt;
6. Prepare as SoA (a &quot;statement of applicability&quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Certification Process&lt;/b&gt;&lt;br /&gt;
 Guidelines  -  ISO/IEC 27002:2007&lt;br /&gt;
 Certification  -  ISO/IEC 27001:2005&lt;br /&gt;
 Stage 1 : Documentation Review &amp; evaluate client&#39;s readiness&lt;br /&gt;
 Stage 2  : Implementation audit &amp; evaluate effectiveness of client&#39;s systems&lt;br /&gt;
 Lead Auditor&#39;s recommendation to certify&lt;br /&gt;
 Certificate issued by certification/registration body&lt;br /&gt;
 Surveillance&lt;br /&gt;
 Periodic review audits (6 months interval)&lt;br /&gt;
 Re-certification (after 3 years)&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/506925445099954870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/506925445099954870' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/506925445099954870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/506925445099954870'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2010/02/information-security-management-system.html' title='Information Security Management System (ISMS) – ISO 27001'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-2313025611410723646</id><published>2010-02-16T15:47:00.000+04:00</published><updated>2010-02-16T15:47:29.902+04:00</updated><title type='text'>Penetration Testing</title><content type='html'>Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. &lt;br /&gt;
Pen tests can be automated with software applications or they can be performed manually. Either way, the process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or for real) and reporting back the findings. &lt;br /&gt;
The main objective of penetration testing is to determine security weaknesses. A pen test can also be used to test an organization&#39;s security policy compliance, its employees&#39; security awareness and the organization&#39;s ability to identify and respond to security incidents. &lt;br /&gt;
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. &lt;br /&gt;
Pen test strategies include: -&lt;br /&gt;
&lt;br /&gt;
Targeted testing&lt;br /&gt;
&lt;br /&gt;
Targeted testing is performed by the organization&#39;s IT team and the penetration testing team working together. It&#39;s sometimes referred to as a &quot;lights-turned-on&quot; approach because everyone can see the test being carried out.&lt;br /&gt;
&lt;br /&gt;
External testing&lt;br /&gt;
&lt;br /&gt;
This type of pen test targets a company&#39;s externally visible servers or devices including domain name servers (DNS), e-mail servers, Web servers or firewalls. The objective is to find out if an outside attacker can get in and how far they can get in once they&#39;ve gained access. &lt;br /&gt;
&lt;br /&gt;
Internal testing&lt;br /&gt;
&lt;br /&gt;
This test mimics an inside attack behind the firewall by an authorized user with standard access privileges. This kind of test is useful for estimating how much damage a disgruntled employee could cause. &lt;br /&gt;
&lt;br /&gt;
Blind testing&lt;br /&gt;
&lt;br /&gt;
A blind test strategy simulates the actions and procedures of a real attacker by severely limiting the information given to the person or team that&#39;s performing the test beforehand. Typically, they may only be given the name of the company. Because this type of test can require a considerable amount of time for reconnaissance, it can be expensive.&lt;br /&gt;
&lt;br /&gt;
Double blind testing&lt;br /&gt;
&lt;br /&gt;
Double blind testing takes the blind test and carries it a step further. In this type of pen test, only one or two people within the organization might be aware a test is being conducted. Double-blind tests can be useful for testing an organization&#39;s security monitoring and incident identification as well as its response procedures. &lt;br /&gt;
Penetration Testing Tools&lt;br /&gt;
1) Nmap - Worlds Best Port Scanner&lt;br /&gt;
2) Nessus - Vulnerability Scanner&lt;br /&gt;
3) Metasploit - Exploit framework&lt;br /&gt;
4) Pass-The-Hash - Who needs passwords?&lt;br /&gt;
5) Hydra - Brute force password guessing&lt;br /&gt;
6) Cain &amp; Abel - The ultimate MITM utility&lt;br /&gt;
7) Wireshark - network protocol analyzer&lt;br /&gt;
8) Snort - traffic analysis and packet logging on IP networks&lt;br /&gt;
9) Netcat - reads and writes data across TCP or UDP network connections&lt;br /&gt;
10) Nikto - web server scanner which performs comprehensive tests against web servers&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/2313025611410723646/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/2313025611410723646' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/2313025611410723646'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/2313025611410723646'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2010/02/penetration-testing.html' title='Penetration Testing'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-4506879941866885310</id><published>2010-02-16T15:46:00.000+04:00</published><updated>2010-02-16T15:46:27.734+04:00</updated><title type='text'>Technology Trends 2010</title><content type='html'>1. Unified Communication&lt;br /&gt;
2. Information Security&lt;br /&gt;
3. Cloud Computing&lt;br /&gt;
4. Virtualisation&lt;br /&gt;
5. Mobile application&lt;br /&gt;
6. Data Centre Management&lt;br /&gt;
7. Mobility &amp; GPS&lt;br /&gt;
8. Business Intelligence&lt;br /&gt;
9. Gaming Application &amp; Animation&lt;br /&gt;
10. Bar-coding &amp; RFID&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/4506879941866885310/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/4506879941866885310' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/4506879941866885310'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/4506879941866885310'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2010/02/technology-trends-2010.html' title='Technology Trends 2010'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-5853602514301423262</id><published>2009-06-10T14:49:00.003+04:00</published><updated>2009-06-10T14:57:03.942+04:00</updated><title type='text'>Cyberoam Net-to-Net Connection</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq-bqZLnxr3eLCTq6J-bveW-OkrtSkihoRCfwQyMsGhBBx2dnIH6wKGrsx-t2Ng2zSvUVwa4xAgjArg6pG6QCUPLpf12FQVfrHRRNw2u2kY64sDA-0pVKA4NAAYaiuMqRNjhVgxw/s1600-h/nettonet.JPG&quot;&gt;&lt;img style=&quot;TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 193px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5345651162307239458&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq-bqZLnxr3eLCTq6J-bveW-OkrtSkihoRCfwQyMsGhBBx2dnIH6wKGrsx-t2Ng2zSvUVwa4xAgjArg6pG6QCUPLpf12FQVfrHRRNw2u2kY64sDA-0pVKA4NAAYaiuMqRNjhVgxw/s320/nettonet.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;Cyberoam UTM device allows configuring IPSec VPN tunnels over ADSL link. The configuration based on DYN DNS service. Both the head office and branch office use ADSL link. Configure a DYN DNS address for both the sites. The configuration is very simple and straight forward.&lt;br /&gt;&lt;br /&gt;The advantage of this type of connection is:-&lt;br /&gt;a) Speed&lt;br /&gt;b) Less expensive&lt;br /&gt;c) Easy to get ADSL link&lt;br /&gt;d) Easy of deployment&lt;br /&gt;e) Good for branch office / small office connections&lt;br /&gt;f) Easy to manage&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/5853602514301423262/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/5853602514301423262' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/5853602514301423262'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/5853602514301423262'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2009/06/cyberoam-net-to-net-connection.html' title='Cyberoam Net-to-Net Connection'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq-bqZLnxr3eLCTq6J-bveW-OkrtSkihoRCfwQyMsGhBBx2dnIH6wKGrsx-t2Ng2zSvUVwa4xAgjArg6pG6QCUPLpf12FQVfrHRRNw2u2kY64sDA-0pVKA4NAAYaiuMqRNjhVgxw/s72-c/nettonet.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-1296229315171065873</id><published>2007-12-19T17:31:00.000+04:00</published><updated>2007-12-19T17:47:48.759+04:00</updated><title type='text'>Storage</title><content type='html'>As data keeps growing exponentially, the need for more advanced storage technologies has increased. We take a look at the upcoming technologies that will make storage simpler in future&lt;br /&gt;&lt;br /&gt;Data growth in any organization is an irreversible process. You can control and manage data, but you can&#39;t reduce it. Hence, there will always be the need for efficient ways of storing and managing data. Since data is generated by umpteen types of applications in zillions of formats, some pretty innovative ways are required for storing it. That&#39;s why storage has always remained such a hot topic, and it will continue to remain so as long as there&#39;s growing data.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Market drivers&lt;/strong&gt;&lt;br /&gt;The ever increasing amount of data brings with it not only requirements for more storage capacity, but also issues of security, physical space for hosting more storage devices, concerns of managing them, the speed of accessing data, and much more. So much so that storage has become the driver for innovation across so many industries. It has provided an opportunity to the software development world for creating applications to store, back up, retrieve, index, and search data. It has given the security industry an opportunity to find new ways of securing the growing volumes of data. The storage industry itself is coping with the challenge of cramming higher storage capacity in smaller form factors. The growing volume of data is also creating opportunities in the storage management and virtualization space.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Even the consumer electronics industry is banking on storage, because most consumer appliances and even digital gadgets require lots of it.&lt;br /&gt;&lt;br /&gt;MP3 players, smartphones, digital cameras and camcorders, Digital Video Recorders, are just a few examples that require storage.Plus, storage is also driving niche markets like IP Surveillance.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Glimpses 2007&lt;/strong&gt;&lt;br /&gt;1) Hard drive capacities hit the 1 Terabyte mark.&lt;br /&gt;2) Tiny personal NAS boxes became ubiquitous this year. New security standards emerged for encrypting data at rest, like the IEEE 1619.3.&lt;br /&gt;3) Email archival solutions became widespread&lt;br /&gt;4) USB based flash drive capacities exceeded 4 GB.&lt;br /&gt;5) NAS boxes, ILM, Continuous Data Protection, Document and Content Management Systems were on the purchase list.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hot trends this year&lt;/strong&gt;&lt;br /&gt;We&#39;ve had a pretty eventful year as far as storage goes. Several foundation stones have been laid this year that will set the tone for things to come in the future.&lt;br /&gt;&lt;br /&gt;While the trend of increasing capacities and reducing costs in hard drives has been around for a long time now, this year they finally hit the 1 TB mark. In fact, the competition to bring out higher capacity drives has become very similar to the GHz wars of the past in microprocessors, which continued until they reached the limit. Thankfully, hard drive capacities have not yet reached their limits. We&#39;ll see capacities beyond 1 TB in a single hard drive in the coming years.&lt;br /&gt;&lt;br /&gt;Solid State storage drives also hit the market this year, and many laptop vendors launched their models with them. So imagine a laptop with no magnetic hard drive-just a single solid state drive with flash memory inside and a SATA interface. The technology behind high capacity solid state drives is NAND, which stands for &#39;Not AND&#39;. In the digital world, NAND is a kind of logic gate.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Jargon Buster&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Storage Terms you should know for next year&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;&lt;p&gt;&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;1) ILM (Information Lifecycle Management): A comprehensive approach for administering Storage systems on computing devices. The information system&#39;s data and associated metadata are effectively managed right from its creation and initial storage, till the time it becomes obsolete and is deleted.&lt;br /&gt;2) CDP (Continuous Data Protection): It is nothing in line with traditional back up or RAID/replication/mirroring. It refers to backup of data in such a manner that every change made to the data is automatically saved. Essentially it captures every version of the data that the user saves. You can restore data to any point in time.&lt;br /&gt;3) Storage Virtualization: Commonly used in Storage Area Network, it is mainly the pooling of all physical storage from various network devices into what appears to be a single storage device which is managed from a central console.&lt;br /&gt;4) VTL (Virtual Tape Library): It&#39;s mainly a virtualization technology for data storage used primarily for data backup and recovery purposes. It presents a storage component as a tape drive or library for use with existing backup software.&lt;br /&gt;5) SSD (Solid State Drives): A data storage device which uses solid-state memory to store persistent data. SSDs comprise of NAND flash which is non-volatile or SDRAM which is volatile. They are already available as 32GB SSD and 64GB SSD from various vendors and 128GB will be available soon. Super Computers. &lt;/p&gt;&lt;p&gt;&lt;br /&gt;So in effect, storage has become even more ubiquitous than before. Just about every industry demands it today for different applications. In enterprises, branch office automation led to the need for anytime anywhere access to data, which made the concept of Wide Area File Services more popular. Data center consolidation and infrastructure centralization led to greater demands for more storage and backup. The need to standardize and comply led to the popularity of email archival solutions, and even new data encryption technologies.&lt;/p&gt;&lt;p&gt;Network Attached Storage, or NAS for short, saw terrific growth this year. In fact, the interesting thing about this market was that NAS boxes became available for everyone, right from personal users to data centers. Interestingly, 1 TB NAS for personal use or for small offices became commonplace this year.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;Information Lifecycle Management solutions were also on top of the storage purchase chart for many enterprises. Likewise, several other storage terms were pretty common place this year. There was a lot of interest in Continuous Data Protection or CDP for instance. With growing amount of content, organizations started considering content and document management solutions.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key Predictions for the future&lt;br /&gt;&lt;/strong&gt;Now we come to the exciting part. What all can you expect in the storage arena next year. So here&#39;s our list of predictions to help you be prepared for next year:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Storage Virtualization implementations will rise&lt;br /&gt;&lt;/strong&gt;This is one of the most talked about areas in storage for a long time, and has not been able to take off as well as its cousin in the server world. This year saw some traction in storage virtualization, with vendors introducing many new products and early bird implementations. So the momentum has just started, and we&#39;re likely to see a lot more action in storage virtualization next year. While considering storage virtualization, don&#39;t get blinded by its benefits. Look at the other side as well. That&#39;s because it&#39;s not as easy as adding an abstraction layer on top of your existing heterogeneous storage infrastructure and have a virtualized storage environment. Be prepared to add more storage equipment to manage your existing ones. Likewise, there are many different ways of doing storage virtualization, and choosing the right one requires a discussion in itself.&lt;br /&gt;&lt;strong&gt;Solid State drives will become more commonplace&lt;br /&gt;&lt;/strong&gt;We all know that solid state memory is much faster than magnetic memory. It has no moving parts, runs at much higher speed, and is not affected by wear and tear. That&#39;s why RAM is faster than a hard drive. However, solid state memory is also much more expensive, which is why we don&#39;t see everyone rushing to replace all magnetic storage with it. But there are quite a few interesting developments in this area. Many notebooks vendors this year started shipping their products with solid state drives inside. A race has started amongst memory manufacturers to introduce higher capacity solid state drives, with the latest being A-Data&#39;s 128 GB SSD.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;Currently, if you were to buy a laptop with a SSD inside, then you have to shell out at least 40-50K extra for it. But the growing competition amongst flash drive manufacturers and economies of scale will eventually bring down prices, and you might find lots of SSD based notebooks in the market next year. The advantages are many. SSDs are thinner, lighter, and faster, which should improve system performance, make notebooks lighter and perhaps more power friendly as well.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;A peek into the future&lt;/strong&gt;&lt;br /&gt;1) Storage virtualization will become widespread.&lt;br /&gt;2) Solid State drives in notebooks will become common place.&lt;br /&gt;3) Hard drive capacities will reach 2 TB+ range for desktops.&lt;br /&gt;4) Virtual Tape Libraries will become more common.&lt;br /&gt;5) Full Disk Encryption or FDE based drives will hit the market for data centers. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Full disk encryption based drives will emerge for storage security&lt;br /&gt;&lt;/strong&gt;One of the biggest challenges most organizations are facing today is securing their ever growing volumes of data. This is becoming even a bigger concern with so many laptops being used amongst organizations. Plus of course there&#39;s all the data being backed up to tape drives. All this data in computers, which is not travelling across a network is known as data at rest. The answer to doing this is to encrypt it. There are many ways of doing this, and we&#39;ve seen many attempts at it over the past few years with vendors introducing various types of solutions for doing so. There are software programs that encrypt data on the fly, and even appliances that encrypt data before backing it up. This year however, another technology has started gaining ground, which aims to build encryption capabilities within the hard drive itself, a concept known as Full-Disk Encryption or FDE. This is currently being backed up by Seagate, IBM, and LSI, and even IEEE is creating a management standard, called 1619.3, to ensure interoperability.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;If everything goes well, then you should see FDE based drives shipping next year. The logic behind having FDE based drives is also quite strong. If the logic of encrypting all data lies within the hard drive controller itself, it will improve performance. Moreover, even as more drives get added, the performance won&#39;t degrade because each drive will be handling its own encryption.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;VTLs will grow in popularity&lt;br /&gt;&lt;/strong&gt;This is one area that&#39;s becoming strong competitor to tape based backup. Virtual Tape Libraries will become more popular next year, as vendors gear up with more offerings.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;Storage has become so ubiquitous and there have been so many developments around it that one can go on and on talking about them. But we&#39;ll end the discussion here and bring you more news on it in our forthcoming issues.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/1296229315171065873/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/1296229315171065873' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/1296229315171065873'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/1296229315171065873'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2007/12/storage.html' title='Storage'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-3557385055209816775</id><published>2007-04-30T08:06:00.000+04:00</published><updated>2007-04-30T08:18:45.980+04:00</updated><title type='text'>Laptop Security Basics</title><content type='html'>&lt;strong&gt;Laptop security basics&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;There are some rudimentary steps that you can take to prevent your laptop from being stolen.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Use the features of your operating system&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;If you have chosen an operating system that has in-built security features (Windows 2000 Professional and Windows XP Professional are examples) then do not be afraid to use them. Features may include secure logon, file level security, and the ability to encrypt data.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Use the BIOS password&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;It would be unwise not to protect the BIOS. Find out whether the BIOS will also protect the hard disk drive to stop it from being used in another machine. Another tip is to find out what the procedure is for resetting the BIOS password. If it has to be sent back to the manufacturer, so much the better, as that will afford some protection, as a thief is unlikely to do that. Some will offer an in-the-field work around, which might make it attractive to a thief.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Your laptop&#39;s serial numbers&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;It is written down, right? And stored in a safe place? Good. That will help the police return it to you should it ever be recovered by them.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Use some form of permanent marking on the laptop&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Engraving your company name on the case of the laptop with an address or contact number, or both, may increase the likelihood of getting the laptop returned to you if it is stolen and recovered (or, if by some accident, you forget it). Commercial asset tags are also a great aid to the police to return the laptop to you. It may also serve as a deterrent to the casual thief if the choice is between stealing a marked laptop or an unmarked laptop. Why? They cannot sell it using an online auction so easily. Also, travelling through airport security means that someone is also less likely to pick up your laptop accidentally. Information freely available on the Web suggests that 97% of stolen laptops are never recovered.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Use the manufacturer&#39;s registration scheme&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt; Most people ignore registration because they think that it is likely to lead to spam. However, remembering that thieves are usually not smart, one might be unintelligent enough to send it in for service or to reset the BIOS, so having it registered with the manufacturer might prove valuable if you alert them to the fact that it is stolen.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Cable lock&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;Most laptops have a Universal Security Slot (USS), also known as a Kensington Security Slot (sometimes referred to as a K-slot or Kensington Slot). Will it stop bolt cutters? Unlikely. Will it stop a casual thief that just happened to be walking past your hotel room while room service had propped the door open, and then gone off to get more towels? Probably. And make sure to secure it around a strong, immovable, indestructible object. Also use it in the office. What percentage of laptop thefts occur in the office? (See below for answer).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Docking station&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Use a docking station that is securely fastened to your desk. If it also allows you to lock the laptop in place, so much the better. This is especially important if you are leaving the laptop overnight, or longer. Better still, lock it in a strong cabinet if at all possible.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Personal firewall&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;Use a third-party firewall to prevent hackers from hacking into your laptop, and maybe into the company network. If you do disable it for any reason, do not forget to turn it back on.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Biometrics&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;If your laptop has this capability, then familiarize yourself with them and then use them. Your fingerprint can be your logon ID in place of a password.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Tracking software&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;There are companies that offer tracking software, allowing your laptop to regularly ping a tracking center with a signal that allows it to be traced. If the laptop is stolen the company will work with law enforcement to trace your laptop.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Laptop case&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;It might look chic to have the latest designer laptop case or manufacturers case, but nothing sends out a better signal to a thief than an ostentatious display, which may include your company logo, elite looking luggage tags, your business card embossed in plastic that gives a thief a clue as to the likely worth of the contents. There are nondescript backpacks that have padded sleeves to hold a laptop safely. A backpack is useful for going to the restroom without having to put your case down. For the ultra-security conscious, buy little padlocks to lock the zips so that no-one can get into the backpack quickly, steal the laptop, and then zip it back up again.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Passwords&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Make them a combination of numbers and letters so that they are harder to crack. Do not leave the password on a Post-It on the laptop (it does happen).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Encryption&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Always encrypt sensitive, personal, confidential data and leave the password with a trusted source if you need to. If you do not know how to encrypt files, then learn.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Back up your hard drive&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;At the very least, back up your hard disk drive before you travel.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/3557385055209816775/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/3557385055209816775' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/3557385055209816775'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/3557385055209816775'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2007/04/laptop-security-basics.html' title='Laptop Security Basics'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-5346945622691565793</id><published>2007-04-12T07:48:00.000+04:00</published><updated>2007-04-12T08:07:41.600+04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web 2.0"/><category scheme="http://www.blogger.com/atom/ns#" term="Web 3.0"/><title type='text'>Web 3.0</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilsYY7VBc_L5hjX2f5ddu2bH2phpaSqyPQODcLnz3qQPD8fZBVhBHGbEMX8DTbkhO5HMa3cKI35Lvut_BJZ0GjU5J6WUXqoOx_TuVeVvrS_9WVDwkq4-3NcKldYiw5SUdJXSaacw/s1600-h/web30.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5052385976870815026&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilsYY7VBc_L5hjX2f5ddu2bH2phpaSqyPQODcLnz3qQPD8fZBVhBHGbEMX8DTbkhO5HMa3cKI35Lvut_BJZ0GjU5J6WUXqoOx_TuVeVvrS_9WVDwkq4-3NcKldYiw5SUdJXSaacw/s320/web30.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Just in case you missed it, the web now has version numbers. Nearly three years ago, amid continued hand-wringing over the dot-com crash, a man named Dale Dougherty dreamed up something called Web 2.0, and the idea soon took on a life of its own. In the beginning, it was little more than a rallying cry, a belief that the Internet would rise again. But as Dougherty&#39;s O&#39;Reilly Media put together the first Web 2.0 Conference in late 2005, the term seemed to trumpet a particular kind of online revolution, a World Wide Web of the people.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;Web 2.0 came to describe almost any site, service, or technology that promoted sharing and collaboration right down to the Net&#39;s grass roots. That includes blogs and wikis, tags and RSS feeds, &lt;a href=&quot;http://del.icio.us/&quot; target=&quot;blank&quot;&gt;del.icio.us&lt;/a&gt; and &lt;a href=&quot;http://www.flickr.com/&quot; target=&quot;blank&quot;&gt;Flickr&lt;/a&gt;, &lt;a href=&quot;http://www.myspace.com/&quot; target=&quot;blank&quot;&gt;MySpace&lt;/a&gt; and &lt;a href=&quot;http://www.youtube.com/&quot; target=&quot;blank&quot;&gt;YouTube&lt;/a&gt;. Because the concept blankets so many disparate ideas, some have questioned how meaningful—and how useful—it really is, but there&#39;s little doubt it owns a spot in our collective consciousness. Whether or not it makes sense, we now break the history of the Web into two distinct stages: Today we have Web 2.0, and before that there was Web 1.0.&lt;br /&gt;Which raises the question: What will Web 3.0 look like?&lt;br /&gt;Yes, it&#39;s too early to say for sure. In many ways, even Web 2.0 is a work in progress. But it goes without saying that new Net technologies are always under development—inside universities, think tanks, and big corporations, as much as Silicon Valley start-ups—and blogs are already abuzz with talk of the Web&#39;s next generation.&lt;/div&gt;&lt;div&gt;The problem is that a complete reannotation of the Web is a massive undertaking. &quot;The Semantic Web is a good-news, bad-news thing,&quot; says R. David Lankes, an associate professor at Syracuse University&#39;s School of Information Studies. &quot;You get the ability to do all these very complex queries, but it takes a tremendous amount of time and metadata to make that happen.&quot;&lt;br /&gt;To many, Web 3.0 is something called the Semantic Web, a term coined by Tim Berners-Lee, the man who invented the (first) World Wide Web. In essence, the Semantic Web is a place where machines can read Web pages much as we humans read them, a place where search engines and software agents can better troll the Net and find what we&#39;re looking for. &quot;It&#39;s a set of standards that turns the Web into one big database,&quot; says Nova Spivack, CEO of Radar Networks, one of the leading voices of this new-age Internet.&lt;br /&gt;But some are skeptical about whether the Semantic Web—or at least, Berners-Lee&#39;s view of it—will actually take hold. They point to other technologies capable of reinventing the online world as we know it, from 3D virtual worlds to Web-connected bathroom mirrors. Web 3.0 could mean many things, and for Netheads, every single one is a breathtaking proposition.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKb6aqmoiTwMXaAlWScUuc5aJFLVmq0clCAHsSKjby-VB1ECshH9pZibdoNuaDscib7kN_cH_tTIdGt3g_Ty60Q05DdkqK7z0wzCzR61IXMPG-CPym2nTsUCPeMotB0etf3kePeg/s1600-h/web+3.1.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5052386655475647826&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKb6aqmoiTwMXaAlWScUuc5aJFLVmq0clCAHsSKjby-VB1ECshH9pZibdoNuaDscib7kN_cH_tTIdGt3g_Ty60Q05DdkqK7z0wzCzR61IXMPG-CPym2nTsUCPeMotB0etf3kePeg/s320/web+3.1.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Tim, Lucy, and The Semantic Web The Semantic Web isn&#39;t a new idea. This notion of a Web where machines can better read, understand, and process all that data floating through cyberspace—a concept many refer to as Web 3.0—first entered the public consciousness in 2001, when a story appeared in Scientific American. Coauthored by Berners-Lee, the article describes a world in which software &quot;agents&quot; perform Web-based tasks we often struggle to complete on our own.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The article begins with an imaginary girl named Lucy, whose mother has just been told by her doctor that she needs to see a specialist. &quot;At the doctor&#39;s office, Lucy instructed her Semantic Web agent through her handheld Web browser,&quot; we read. &quot;The agent promptly retrieved information about Mom&#39;s prescribed treatment from the doctor&#39;s agent, looked up several lists of providers, and checked for the ones in-plan for Mom&#39;s insurance within a 20-mile radius of her home and with a rating of excellent on trusted rating services.&quot;&lt;br /&gt;That&#39;s quite a mouthful, but it only begins to describe Berners-Lee&#39;s vision of a future Web. Lucy&#39;s Semantic Web agent can also check potential appointment times against her mother&#39;s busy schedule, reschedule other appointments if need be, and more—all on its own, without help from Lucy. And Lucy is just one example. A Semantic Web agent could be programmed to do almost anything, from automatically booking your next vacation to researching a term paper.&lt;br /&gt;How will this actually work? In Berners-Lee&#39;s view, it involves a reannotation of the Web, adding all sorts of machine-readable metadata to the human-readable Web pages we use today (see &quot;Questions of Semantics,&quot; opposite). Six years after the Scientific American article, official standards describing this metadata are in place—including the Recourse Description Framework (RDF) and the Web Ontology Language (OWL)—and they&#39;re already trickling into real-world sites, services, and other tools. -Semantic Web metadata underpins Yahoo!&#39;s new food site. Spivack&#39;s Radar Networks is building a kind of Semantic Web portal. A development platform, Jena, is in the works at HP. And you&#39;ll find Semantic Web structures in Oracle&#39;s Spatial database tool.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The problem is that a complete reannotation of the Web is a massive undertaking. &quot;The Semantic Web is a good-news, bad-news thing,&quot; says R. David Lankes, an associate professor at Syracuse University&#39;s School of Information Studies. &quot;You get the ability to do all these very complex queries, but it takes a tremendous amount of time and metadata to make that happen.&quot; &lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5052387471519434098&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4ovE3kztkGYvR4rJ-QrPBAes_ZNif5bpE4qeWSk7AtPepI-K4ddQfJ9oXbJRGhb-X4eeaq7LrKLak8HUsmFTCW9Y771CXa3FfhcKyu7q8ZVD5fvDXp01YHisk90N_hSeHRzifLg/s320/web+3.gif&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/5346945622691565793/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/5346945622691565793' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/5346945622691565793'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/5346945622691565793'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2007/04/web-30.html' title='Web 3.0'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilsYY7VBc_L5hjX2f5ddu2bH2phpaSqyPQODcLnz3qQPD8fZBVhBHGbEMX8DTbkhO5HMa3cKI35Lvut_BJZ0GjU5J6WUXqoOx_TuVeVvrS_9WVDwkq4-3NcKldYiw5SUdJXSaacw/s72-c/web30.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-8291605669207090980</id><published>2007-03-05T07:30:00.000+04:00</published><updated>2007-03-05T07:36:50.905+04:00</updated><title type='text'>The Vista brute force keygen</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://blogs.zdnet.com/hardware/?p=296&quot; rel=&quot;bookmark&quot; title=&quot;Permalink&quot;&gt; The Vista brute force keygen - Updated&lt;/a&gt; by &lt;a href=&quot;http://zdnet.com&quot;&gt;ZDNet&lt;/a&gt;&#39;s Adrian Kingsley-Hughes -- UPDATED Over on KezNews.com a brute force method for acquiring a usable product key for Microsoft&#39;s Vista platform has been released. I can confirm that this method works (for now at any rate), but I don&#39;t think that Microsoft has much to worry about.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/8291605669207090980/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/8291605669207090980' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/8291605669207090980'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/8291605669207090980'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2007/03/vista-brute-force-keygen.html' title='The Vista brute force keygen'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-116177285983096437</id><published>2006-10-25T14:38:00.000+04:00</published><updated>2006-10-25T14:40:59.846+04:00</updated><title type='text'>Firefox 2, Internet Explorer 7</title><content type='html'>OK, it&#39;s official: With today&#39;s release of &lt;a href=&quot;http://www.mozilla.com/en-US/firefox/&quot; target=&quot;_blanket&quot;&gt;Firefox 2&lt;/a&gt;, we have final shipping versions of the two biggest browsers for Windows. My colleague Erik Larkin&#39;s extensive review of both &lt;a href=&quot;http://www.pcworld.com/article/id,127309-page,1/article.html&quot;&gt;Firefox 2 and Internet Explorer 7&lt;/a&gt; has been one of the most popular stories on our site over the past week, and I&#39;m not going to duplicate it here. But after having spent months running beta versions of both--when it comes to browsers, I&#39;ve always been pretty transient--I do feel like thinking out loud briefly about where the browser war stands.&lt;br /&gt;(I apologize, Opera fans, for leaving Opera 9 out of this discussion-and promise I&#39;ll come back to it before too long.)&lt;br /&gt;For the first time since the bygone days when IE 4 battled with Firefox granddaddy Netscape Navigator 4, we have a real battle. (For years, IE didn&#39;t face truly serious competition--then Firefox 1.0 came along, and suddenly there was no question that it was the best browser for most people.)&lt;br /&gt;In &lt;a href=&quot;http://www.microsoft.com/windows/ie/default.mspx&quot; target=&quot;_blank&quot;&gt;Internet Explorer 7&lt;/a&gt;, we have a Microsoft browser that has no glaring deficiencies--which doesn&#39;t sound like much of a compliment, but it&#39;s more than you could say about IE 6. But here&#39;s a compliment that really is complimentary: It&#39;s inched ahead of Firefox in a few respects. It&#39;s got a better printing engine. Its zoom feature lets you resize Web pages onscreen, while Firefox can only resize text, not graphics. And I like how IE now lets you see thumbnails of all the pages in all your open tabs at once. I wish Firefox 2 had all these items built in.&lt;br /&gt;But the funny thing is, Firefox 1.5 already has some of these features--and dozens more that neither Microsoft nor Mozilla has gotten around to implementing--courtesy of the array of &lt;a href=&quot;https://addons.mozilla.org/extensions.php?app=firefox&quot; target=&quot;_blank&quot;&gt;amazing extensions&lt;/a&gt; that let you customize the browser to a fare-thee-well. (My current fave: &lt;a href=&quot;http://www.google.com/tools/firefox/browsersync/&quot; target=&quot;_blank&quot;&gt;Google Browser Sync&lt;/a&gt;, which lets you turn all your copies of Firefox on all your computers into clones of each other with the same bookmarks, cookies, and other settings. It alone is a compelling argument for choosing Firefox over IE 7.)&lt;br /&gt;While some extensions aren&#39;t yet compatible with Firefox 2, they&#39;re the single biggest reason to opt for Firefox over IE 7. There are &lt;a href=&quot;http://www.ieaddons.com/default.aspx?cid=home&amp;scid=0&quot; target=&quot;_blank&quot;&gt;IE 7 add-ins out there&lt;/a&gt;, too, and Microsoft is cultivating the development of more. But for now, Firefox is easily the more vibrant development platform, and it does all its good stuff not only in Windows, but in OS X and Linux, too.&lt;br /&gt;As my Computerworld colleague Scot Finnie says in his &lt;a href=&quot;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyId=16&amp;articleId=9004398&amp;amp;intsrc=hm_topic&quot; target=&quot;_blank&quot;&gt;Firefox 2 first look&lt;/a&gt;, the Mozilla upgrade is no giant step beyond Firefox 1.5. Is it a must for 1.5 users? Yeah, as long as you&#39;re not dependent on any extensions that don&#39;t work yet. Features like search suggestions that appear as you type in the search box, spell checking, better RSS support, and additional tab-related conveniences aren&#39;t life-changing, but I use most of &#39;em almost every day, and they all make my time online more productive and happy.&lt;br /&gt;Which isn&#39;t, sad to say, true of every change in IE 7. Why did Microsoft turn off menus by default (without replicating all of their functions with toolbars), put the menu bar under the address window even when you do turn it on, and move the refresh button from its traditional location to the left of the address bar over to the right? I&#39;ve asked multiple Microsoft executives about these changes, and the answers, which have ranged from, essentially, &quot;I can&#39;t remember&quot; to &quot;For consistency with Windows Vista,&quot; have never been entirely satisfactory.&lt;br /&gt;Change for the sake of change is par for the course with a Microsoft upgrade. And there&#39;s a fair amount of it in IE 7, while things that cry out for fixing, like the browser&#39;s convoluted configuration settings, haven&#39;t gotten the attention they deserve.&lt;br /&gt;(Side note: If you use IE 6 and decide that you&#39;d prefer for menus to live under the address bar, it&#39;s easy to drag them there. But this customization feature, along with other interface-tweaking options, is gone in IE 7; there&#39;s no way to move the menus back to where they sit in 99.9% of the planet&#39;s other applications.)&lt;br /&gt;So do I have a personal answer to the question &quot;What&#39;s the best browser?&quot; Ultimately, I agree with Erik&#39;s take: Overall, Firefox maintains a lead, even though it&#39;s not gigantic and isn&#39;t there in every aspect of the browser. Like Erik, I think it&#39;s a good idea for anyone who&#39;s moving from IE 6 to try both IE 7 and Firefox 2.&lt;br /&gt;And I&#39;m still fascinated by one question: If Firefox had never cut sharply into IE’s market share, would Microsoft ever have gotten around to bringing its browser into the modern age?&lt;br /&gt;Comments&lt;br /&gt;You talk about how IE is for the user, but Nothing about if Microsoft has finally decided to follow internet standards of Cascading Style Sheets, HTML or just continue to bully the webdesigners to design for IE.&lt;br /&gt;Firefox follows standards and for that reason alone I chose FF. I truly despise Internet Explorer for the vulnerabilities and for it&#39;s interpretations of webpages.&lt;br /&gt;You say IE has a fighting chance? I doubt it. I&#39;m installing Firefox on every client PC I&#39;m selling and removing all traces of IE. When I tell my clients it&#39;s because IE causes too much problems (spyware etc) they are more then happy enough. And they also love the Tabbed browsing.&lt;br /&gt;Bye bye IE.&lt;br /&gt;Fable&lt;br /&gt;October 24, 2006&lt;br /&gt;10:42 PM PT&lt;br /&gt;I can think of one huge reason not to use IE 7: It has the worst implementation of tabs of ANY of the major browsers available (for any OS).&lt;br /&gt;1) They are huge in size (is MS officially endorsed by Fisher Price?). I use a browser to view web pages, not to view chrome.2) The bar is too small, not only are the tabs huge but the annoying buttons steal a quarter of the tab bar.3) You can not open multiple tabs from the tab tool bar (and I am not using the left panel and arrow).&lt;br /&gt;All in all, I feel that IE 7 has the worst user interface of any software that I have seen in years. I think that a lot of users will be mad when Windows Update automatically pulls this one down. I have recommended that my office hold off to deploy this so that we are prepared for the training issues. This GUI is just bad.&lt;br /&gt;jdawgnoonan&lt;br /&gt;October 24, 2006&lt;br /&gt;10:43 PM PT&lt;br /&gt;I think one of the key differences is that you can use IE7 ONLY on the most recent releases of Windows (XP Service pack 2, and some releases of Windows 2003). Surprisingly, Windows 2000 is not supported. As usual, if you want to use the latest Microsoft software, you need to upgrade your operating system (ie: spend some $$).&lt;br /&gt;pmundkur&lt;br /&gt;October 25, 2006&lt;br /&gt;2:11 AM PT&lt;br /&gt;I have abandoned IE on my entire network in favor of Firefox for about a year now with no regrets. My clients, after minimal training, appreciate the customization that Firefox provides them. I appreciate not having to logging in to find yet another IE vulnerability needing another patch. Slowly, Microsoft is losing it’s desirability as users become more technically savvy.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/116177285983096437/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/116177285983096437' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/116177285983096437'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/116177285983096437'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/10/firefox-2-internet-explorer-7.html' title='Firefox 2, Internet Explorer 7'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115970998362786923</id><published>2006-10-01T17:38:00.000+04:00</published><updated>2006-10-01T17:39:43.646+04:00</updated><title type='text'>IBM goes public to collect ideas</title><content type='html'>Company narrows 37,000 concepts from global brainstorming session to 30 marketable plansBY JON VANPublished October 1, 2006&lt;br /&gt;YORKTOWN HEIGHTS, N.Y. -- Don&#39;t tell Sam Palmisano that old saw about too many cooks spoiling the broth.Last spring, after having seen an array of IBM&#39;s cutting edge research, IBM&#39;s top executive ordered a high-tech brainstorming session stretching across 77 countries and involving 53,000 people.IBM employees are still analyzing the fruit of Palmisano&#39;s session, 37,000 ideas. But by November, they expect to launch some new products, businesses or services stemming from the exercise, which Palmisano dubbed InnovationJam.Over the next two years IBM expects to spend as much as $100 million taking InnovationJam ideas to market.&quot;Innovation today is changing radically,&quot; said Palmisano, who noted that using conventional methods IBM regularly wins more new patents than any other U.S.-based company. But even so, the company probably isn&#39;t keeping up with competitive pressures, Palmisano decided.&quot;So, I thought, let&#39;s expose these advanced projects to all of our employees around the world, and some clients and business partners, too--even our own families--and see what they come up with.&quot;IBM managers, scrambling to come up with a context for the discussion, built several Web sites to give participants information about technologies in the company&#39;s pipeline--things like supercomputing, real-time foreign language translation and advanced water filtration based on nanotechnology.Here they comeBy July, the jam&#39;s first phase was on. Ideas flowed in online from around the globe as well as from employees at 67 companies allied with IBM and some spouses and offspring of IBM employees.IBM managers then used automation to winnow the 37,000 offerings down to 300 defined ideas. Finally, more than 50 employees came to IBM&#39;s Watson Research Center to work in teams for most of a week to further combine and trim ideas to around 30.&quot;The majority of ideas contributed in any brainstorming situation aren&#39;t all that good,&quot; said Edward Bevan, IBM communications vice president and a jam leader. &quot;They&#39;re either naive or misinformed or they failed before with good reason.&quot;Without advanced technology to help toss out bad ideas, a global-scale project such as this would be impossible, said Cathy Lasser, IBM vice president for industry solutions and emerging technologies. &quot;Especially working in this time frame required automation,&quot; she said.In mid-September, the jam&#39;s second phase commenced. Participants scrutinized the 30 proposals, wrote business plans and suggested market strategies.&quot;It won&#39;t take long for them to declare this a success,&quot; said Marc Knez, a clinical professor of strategic management at the University of Chicago&#39;s graduate business school. &quot;How many products do you need to get to market to call it a success?&quot;IBM isn&#39;t alone in seeking to tap knowledge from workers throughout its sphere, said Knez. &quot;It&#39;s a common problem for large tech companies,&quot; he said. &quot;They want to leverage knowledge within and at the edge of the organization.&quot;Still, IBM&#39;s effort is unprecedented in its scope and scale, Knez said, and it has the support necessary to succeed since the firm&#39;s chief executive initiated it.A key part of the jam was that ideas came from people working at all levels and that the ideas stood on their own merits.&quot;There&#39;s no hierarchy to this kind of creative collaboration,&quot; said Palmisano. &quot;Whether you&#39;re a senior executive, a scientist, a business consultant or even a 13-year-old child of an IBMer, everyone gets to be heard.&quot;A veteran of corporate brainstorming agrees.&quot;Our experience is that good ideas can come from just about anywhere within the organization,&quot; said Charles Holland, president of QualPro, a business consultancy based in Knoxville, Tenn., that regularly employs brainstorming. &quot;We keep coming up with instances where the best ideas come from people low in an organization, the ones doing the actual work.&quot;This can offend the graduate-level engineers and technical people, but we&#39;ve seen it again and again.&quot;`Great morale builder&#39;Another upside, Holland said, is that &quot;it&#39;s a great morale builder. People feel part of the team and support the work, even when their ideas don&#39;t get adopted, because they got to supply their ideas.&quot;There may be some downside to IBM&#39;s project, said Scott Stern an associate professor of management and strategy at Northwestern University&#39;s Kellogg School of Management.&quot;You can&#39;t get 53,000 people to sign nondisclosure agreements,&quot; Stern said. &quot;So there&#39;s a danger that by revealing your emerging technologies and possible applications to so many people, someone else could take the ideas and develop them.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115970998362786923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115970998362786923' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115970998362786923'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115970998362786923'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/10/ibm-goes-public-to-collect-ideas.html' title='IBM goes public to collect ideas'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115625704579060387</id><published>2006-08-22T18:29:00.000+04:00</published><updated>2006-08-22T18:30:45.803+04:00</updated><title type='text'>Press your lips to your cellphone, send your lover a kiss</title><content type='html'>Touch screen developer Synaptics and industrial design house Pilotfish have teamed up to demonstrate a new touch-sensitive cellphone user interface able to recognise pointing, tapping, complex gestures and proximity to the user&#39;s cheek.This, they say &quot;creates new possibilities such as assigning functions to two-finger taps, closing tasks by swiping an &#39;X&#39; over them, sending messages by swiping them off the screen, or answering a phone by holding it up to your cheek.&quot;They suggest that their &#39;concept device&#39;, dubbed Onyx, will enable cellphone manufacturers to &quot;visualise a fundamentally new form of user interface for mobile phones.&quot;For example, a phone using the technology could, they say, recognise rough shapes and be capable of sending &quot;an emoticon style kiss message&quot; in which the recipient would see an image of the sender&#39;s lips kissing the phone!The key to Onyx is Synaptics&#39; ClearPad, an optically clear, capacitive touch screen 0.5 m thick that would be overlaid above the display screen of the phone. This would completely replace mechanical input keys and, the developers claim, be &quot;more intelligent than conventional touch screens.&quot; According to Clark Foy, vice president of Synaptics, &quot;The Onyx phone is a breakthrough illustration of how advances in interface technology and collaborative design will drive the future of mobile interactions and services.&quot;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115625704579060387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115625704579060387' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115625704579060387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115625704579060387'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/08/press-your-lips-to-your-cellphone-send.html' title='Press your lips to your cellphone, send your lover a kiss'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115518353876058913</id><published>2006-08-10T08:16:00.000+04:00</published><updated>2006-08-10T08:18:58.776+04:00</updated><title type='text'>Microsoft Fixes 23 Security Flaws</title><content type='html'>Microsoft Corp. today released free software updates to fix &lt;a href=&quot;http://www.microsoft.com/athome/security/update/bulletins/200608.mspx&quot;&gt;nearly two dozen security holes&lt;/a&gt; in its Windows operating system and Microsoft Office products. At least 17 of the 23 flaws could be exploited by attackers to hijack vulnerable systems or to install malicious code, the company warned.&lt;br /&gt;Dig through the details of the advisories and you will see that instructions showing would-be attackers how to exploit at least nine of the flaws have already been posted online. Microsoft also said it has seen at least three of the flaws being actively exploited in the wild. As usual, updates are available via &lt;a href=&quot;http://update.microsoft.com/&quot;&gt;Microsoft Update&lt;/a&gt; (Internet Explorer required) or through &lt;a href=&quot;http://www.microsoft.com/athome/security/update/bulletins/automaticupdates.mspx&quot;&gt;automatic updates&lt;/a&gt;.&lt;br /&gt;Microsoft typically lists its security advisories each month in the order of most to least severe, and the first flaw detailed in today&#39;s patch bundle fixes a problem in the Windows &quot;server service,&quot; which facilitates file-sharing among Windows systems that reside on the same network. This highly &quot;wormable&quot; bug is mainly a big deal for businesses, since it is most severe on Windows 2000 systems (most common in corporate environments). Also, many Internet service providers filter file-sharing requests between customers, but file-sharing is almost always turned on inside corporate networks.&lt;br /&gt;The &lt;a href=&quot;http://isc.sans.org/&quot;&gt;SANS Internet Storm Center&lt;/a&gt;, which was credited in part with the discovery of this flaw, reported evidence of it being exploited publicly as early as June 30. According to SANS, Microsoft replied that it was already aware of the flaw at that time. I understand the &lt;a href=&quot;http://www.us-cert.gov/current/current_activity.html#msvuls&quot;&gt;Department of Homeland Security&#39;s Computer Emergency Readiness Team&lt;/a&gt; (US-CERT) is set to release more information about this flaw later today. Of course, Security Fix will update this blog in the event that the DHS advisory adds any new wrinkles.&lt;br /&gt;The &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-041.mspx&quot;&gt;next most serious advisory&lt;/a&gt; details two very dangerous vulnerabilities resident in Windows 2000, Windows XP and Windows Server 2003 that attackers could exploit merely by inducing a user to visit a malicious Web site. Microsoft said these flaws also could be exploited when a user opens a specially crafted e-mail or views one in the e-mail preview pane.&lt;br /&gt;It wouldn&#39;t be a Patch Tuesday without a huge rollup for Microsoft&#39;s default Web browser. The IE patch fixes a total of eight vulnerabilities, five of which are especially serious -- depending on which version of the browser you&#39;re using and which version of Windows. One of the IE glitches, a problem with the way file transfers work, was &lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1166&quot;&gt;originally reported to Microsoft in 2004&lt;/a&gt;.&lt;br /&gt;Microsoft also fixed three critical vulnerabilities in versions of its Office software, including two that are actively being exploited to break into and steal information from vulnerable computers. One fixes Office 2000, Office XP and Office 2003, as well Microsoft Office and Powerpoint versions for Mac OS X (see &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-048.mspx&quot;&gt;the advisory&lt;/a&gt; for Mac Office download links). The second update addresses flaws in Office 2000 and XP, as well as Microsoft Project, Visio, Works and Visual Basic (see &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-047.mspx&quot;&gt;the advisory&lt;/a&gt; for links to those individual products).&lt;br /&gt;Keep in mind that if you are using Office 2000 you will not be able to get those fixes through Microsoft Updates or through automatic updates. Office 2000 users will need to visit Microsoft&#39;s Office site and click on the &quot;check for updates&quot; link in the upper right corner of the screen. Office 2000 users who do not have their installation CD handy should be able to install the updates by choosing &quot;no&quot; at the &quot;Do you have your Office product CD?&quot; prompt.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115518353876058913/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115518353876058913' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115518353876058913'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115518353876058913'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/08/microsoft-fixes-23-security-flaws.html' title='Microsoft Fixes 23 Security Flaws'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115518312497815299</id><published>2006-08-10T08:10:00.000+04:00</published><updated>2006-08-10T08:12:04.996+04:00</updated><title type='text'>Microsoft Patches Newest &#39;Dirty Dozen&#39;</title><content type='html'>Microsoft (&lt;a href=&quot;http://www.internetnews.com/stocks/quotes/quote.php/MSFT&quot;&gt;Quote&lt;/a&gt;, &lt;a href=&quot;http://www.internetnews.com/stocks/quotes/chart.php/MSFT/chart&quot;&gt;Chart&lt;/a&gt;)released &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms06-aug.mspx&quot;&gt;12 patches&lt;/a&gt; aimed at resolving multiple security risks discovered in its operating system and popular Office suite.&lt;br /&gt;Nine of the 12 security updates were deemed &quot;critical,&quot; affecting various Windows components, as well as two Office applications previously known to be vulnerable.&lt;br /&gt;The remaining three patches involved &quot;important&quot; security issues, such as remote code execution or elevated user privileges.&lt;br /&gt;Several critical patches revisited flaws previously discovered in applications, such as PowerPoint, Outlook Express and Internet Explorer.&lt;br /&gt;Another patch addressed flaws in a core Windows component already exploited in the &quot;wild,&quot; according to a security researcher.&lt;br /&gt;Steve Manzuik, research manager of eEye Digital Security, called &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-040.mspx&quot;&gt;MS06-40&lt;/a&gt; important because the flaw in the Windows Services could allow attackers to take control of systems running Windows XP, Windows Server 2003 and Windows 2000.&lt;br /&gt;Internet Explorer was the subject of a cumulative update answering eight critical flaws affecting IE 5.01 and IE 6 for Windows XP, Windows 2003 and Windows 2000.&lt;br /&gt;The vulnerabilities include remote code execution, raised user privileges and information disclosure.&lt;br /&gt;Today&#39;s patch &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-042.mspx&quot;&gt;MS06-42&lt;/a&gt; replaces the MS06-021 security bulletin issued April 11.&lt;br /&gt;The new patch re-enables ActiveX control handling &lt;a href=&quot;http://www.internetnews.com/security/article.php/3596461&quot;&gt;disabled&lt;/a&gt; by the previous security bulletin.&lt;br /&gt;A fix for a previously reported &lt;a href=&quot;http://www.internetnews.com/security/article.php/3620021&quot;&gt;PowerPoint vulnerability&lt;/a&gt; was also part of the dozen patches released today.&lt;br /&gt;Today&#39;s patch, &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-048.mspx?pf=true&quot;&gt;MS06-048&lt;/a&gt;, replaces MS06-38, a security bulletin released in July.&lt;br /&gt;The new patch is of critical importance for PowerPoint 2000 users, as well as for XP and 2003 PowerPoint systems.&lt;br /&gt;Those using PowerPoint for the Mac should also download the patch, according to Microsoft.&lt;br /&gt;A flaw in Outlook Express 6 for XP Pro and XP Service Pack 2, as well as Server 2003, could allow a remote attacker to run malicious code.&lt;br /&gt;The &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-043.mspx?pf=true&quot;&gt;MS06-043&lt;/a&gt; critical patch resolves the problem, according to the software maker.&lt;br /&gt;Rounding out Microsoft&#39;s &quot;Patch Tuesday&quot; event were two security updates ranked &quot;important&quot; for Windows users.&lt;br /&gt;This month&#39;s dozen patches follows &lt;a href=&quot;http://www.internetnews.com/security/article.php/3619331&quot;&gt;seven patches&lt;/a&gt; released in July to fix more than 10 security problems&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115518312497815299/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115518312497815299' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115518312497815299'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115518312497815299'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/08/microsoft-patches-newest-dirty-dozen.html' title='Microsoft Patches Newest &#39;Dirty Dozen&#39;'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115468910551127627</id><published>2006-08-04T14:57:00.000+04:00</published><updated>2006-08-04T14:58:25.523+04:00</updated><title type='text'>Microsoft Invites Hackers to Test Vista</title><content type='html'>LAS VEGAS (AP) - After suffering embarrassing security exploits over the past several years, Microsoft Corp. (&lt;a href=&quot;http://web.ask.com/web?q=quotation+for+MSFT+stock+price&quot;&gt;MSFT&lt;/a&gt;) is trying a new tactic: inviting some of the world&#39;s best-known computer experts to try to poke holes in Vista, the next generation of its Windows operating system.&lt;br /&gt;Microsoft made a test version of Vista available to about 3,000 security professionals Thursday as it detailed the steps it has taken to fortify the product against attacks that can compromise bank account numbers and other sensitive information.&lt;br /&gt;&quot;You need to touch it, feel it,&quot; Andrew Cushman, Microsoft&#39;s director of security outreach, said during a talk at the Black Hat computer-security conference. &quot;We&#39;re here to show our work.&quot;&lt;br /&gt;Microsoft has faced blistering criticism for security holes that have led to network outages and business disruptions for its customers. After being accused for not putting enough resources into shoring up its products, the software maker is trying to convince outsiders that it has changed.&lt;br /&gt;&quot;They&#39;re going directly to the bear in the bear&#39;s lair,&quot; says Jon Callas, the chief technology officer at PGP Corp., which makes encryption software and other security products. &quot;They are going to people who don&#39;t like them, say nasty things and have the incentive to find the things that are wrong.&quot;&lt;br /&gt;Due early next year, Vista is the first product to be designed from scratch under a Microsoft program dubbed secure development life cycle, which represents a sea change in the company&#39;s approach to bringing out new products. Instead of placing the addition of compelling new features at the top of engineers&#39; priority list, Microsoft now requires them to first consider how code might be misused.&lt;br /&gt;A security team with oversight of every Microsoft product - from its Xbox video game console to its Word program for creating documents - has broad authority to block shipments until they pass security tests. The company also hosts two internal conferences a year so some of the world&#39;s top security experts can share the latest research on computer attacks.&lt;br /&gt;Cushman said the presentations have already paid off. One talk, delivered in March by a security expert named Johnny Long, detailed a new way to identify security holes using Google. Shortly after the talk, a Microsoft manager applied the technique and discovered a customer was at risk because it hadn&#39;t properly set up a computer that was running SQL, a database program that competes with business programs sold by Oracle Corp. (&lt;a href=&quot;http://web.ask.com/web?q=quotation+for+ORCL+stock+price&quot;&gt;ORCL&lt;/a&gt;)&lt;br /&gt;But internal conferences are one matter. Taking Vista to Black Hat, where some of the world&#39;s foremost security gurus annually make sport of ripping through programming code to find bugs, is another.&lt;br /&gt;&quot;The fact that they&#39;re releasing it here is probably a bold statement,&quot; said Mike Janosko, a security expert with Ernst &amp;amp; Young who has been reviewing Vista for several months&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115468910551127627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115468910551127627' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115468910551127627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115468910551127627'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/08/microsoft-invites-hackers-to-test.html' title='Microsoft Invites Hackers to Test Vista'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-115417797480663330</id><published>2006-07-29T16:58:00.000+04:00</published><updated>2006-07-29T16:59:34.820+04:00</updated><title type='text'>Microsoft to charge for Office beta</title><content type='html'>Microsoft plans next week to charge a nominal fee for Office 2007 Beta 2 downloads, in a move that runs counter to the practice held by most software companies.&lt;br /&gt;Consumers who download the &lt;a href=&quot;http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.microsoft.com%2Foffice%2Fpreview%2Fbeta%2Fgetthebeta.mspx&amp;siteId=22&amp;amp;oId=2100-3513-6099987&amp;ontId=3513&amp;amp;lop=nl.ex&quot; target=&quot;_blank&quot;&gt;2007 Microsoft Office system Beta 2&lt;/a&gt; will be charged $1.50 per download, beginning next Wednesday at 6 p.m. PDT, a Microsoft spokeswoman said.&lt;br /&gt;&quot;Since the end of May, Beta 2 has been downloaded more than 3 million times...That&#39;s 500 percent more than what was expected,&quot; the spokeswoman said. &quot;The fee helps offset the cost of downloading from the servers.&quot;&lt;br /&gt;Although Microsoft&#39;s Information Worker Product Management Group decided to initiate a fee for new users of Beta 2, the &quot;technical refresh,&quot; or update, for current users of the software will remain free, the spokeswoman said.&lt;br /&gt;Those who want to &lt;a href=&quot;http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.microsoft.com%2Foffice%2Fpreview%2Fbeta%2Ftestdrive.mspx%3FshowIntro%3Dn&amp;siteId=22&amp;amp;oId=2100-3513-6099987&amp;ontId=3513&amp;amp;lop=nl.ex&quot; target=&quot;_blank&quot;&gt;test drive Beta 2 to review how it works&lt;/a&gt; can access the software for free. But if they need to test it against their internal systems, a download or the CD is required.&lt;br /&gt;&quot;This is the first time Microsoft has charged for an Office beta, and it&#39;s not something that is planned for on a repeat basis,&quot; the spokeswoman said.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/115417797480663330/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/115417797480663330' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115417797480663330'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/115417797480663330'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/07/microsoft-to-charge-for-office-beta.html' title='Microsoft to charge for Office beta'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114915597096353185</id><published>2006-06-01T13:56:00.000+04:00</published><updated>2006-06-01T13:59:30.976+04:00</updated><title type='text'>End in sight for Windows Vista</title><content type='html'>London, (GUARDIAN NEWS SERVICE): Microsoft has been through a bad patch, but with its Windows Vista finally nearing roll-out, there is light at the end of the tunnel.&lt;br /&gt;The moving train wreck that is Windows Vista finally began to approach itsdestination last week with the release of another major test version: beta2. This should mean it is ``feature complete&#39;&#39;, with only bug fixes,performance tuning and a final polish before it reaches businesses at theend of this year, and consumers at the start of next year.&lt;br /&gt;Looked at objectively, from a suitable distance, through half-closedeyes, it looks good. In particular, the graphics are often stunning whenrunning the new Aero Glass user interface.&lt;br /&gt;The white unpainted areas and jaggedy lines often visible in Windows XPseem to be a thing of the past. In fact, you get something closer to thegraphics performance of a good game, and for the same reason - the graphicscard is doing most of the work, instead of leaving it to the mainprocessor. As a result, Microsoft says going back to a ``lower&#39;&#39; version ofWindows can mean it slows down instead of speeding up, because the load isthrown back on to the CPU.&lt;br /&gt;The new transparency - the Glass that has been added to the Aerointerface - looks nice but may not last. At least it&#39;s controlled from asliding scale, so you can set how much transparency you want.&lt;br /&gt;But there is still a lot to do, and beta 2 desperately needs thecomputer equivalent of the house doctor Ann Maurice - a function Steve Jobsperforms at Apple - to get the dozens of programming teams to throw out thecrap, or at least get their corners, rules and spaces reasonablyconsistent.&lt;br /&gt;Still, Microsoft hauled more than one hundred journalists and analystsfrom 15 countries to a Vista reviewers&#39; workshop in Seattle, so we couldget our copies of the new beta from the fair hands of Jim Allchin, who hasrun Windows development for more than a decade. He duly appeared on stagewith the first box of beta 2&#39;s, so we got them before the PC makers atWinHEC, the Windows Hardware Engineering Conference. Not that they were anyuse until an access code appeared in our mailboxes later.&lt;br /&gt;Allchin then gave a memorable goodbye speech, using words such as``naive&#39;&#39;, ``hugely painful&#39;&#39; and ``humbled&#39;&#39; because once Vista ships,he&#39;s being replaced by Steve Sinofsky, the current head of MicrosoftOffice.&lt;br /&gt;Having taken Microsoft from zero market share to a market-leadingposition in the server operating system market, Allchin has earned hiscrust. But, as he admitted, ``I was naive about how big a deal the attacks[on Windows XP] were going to be&#39;&#39;. Being handed a PC that was so infestedwith malware, even he could not clean it up, was ``a humbling experience&#39;&#39;,he confessed.&lt;br /&gt;A lot of the work that has gone into Vista is invisible because it hasbeen devoted to cleaning out insecurities, hardening services andsandboxing applications such as Internet Explorer 7+. Vista now seems muchbetter than XP SP2, which was dramatically better than XP. Whether it&#39;senough, only time and the attentions of thousands of criminal, commercialmalware writers will tell.&lt;br /&gt;A lot more work is equally invisible, because it caters for the needs ofVista&#39;s biggest and most important market: businesses. For example, Vistanow installs as a single image, which is simply copied across, rather thanas a sequence of separate files. Big companies like to construct and deploytheir own operating system image - typically including Windows and theirmain applications - but Microsoft&#39;s system is novel in that it can installan image on an existing hard drive without destroying applications anddata. These can be picked up later.&lt;br /&gt;This also explains why all the versions of Vista, from Home Basic to theUltimate kitchen sink version, appear to take up the same 15GB of harddrive space. You get the whole thing, and can upgrade from one version toanother just by entering a code, without doing another installation or along download.&lt;br /&gt;It&#39;s clever, but risky. Decisions have not been taken, but I was givento understand Microsoft was unlikely to ship the full image in countrieswith a high incidence of software piracy.&lt;br /&gt;Vista also uses Windows PE (pre-installation environment) and, accordingto Windows&#39; client group product manager Stella Chernyak, it canself-repair an otherwise unbootable system about 80% of the time. Since themain costs of an enterprise operating system are installation and support,Chernyak argued, Vista could save companies money.&lt;br /&gt;And from a corporate point of view, it is extremely important Microsoftis launching new versions of Windows and Office at the same time, then anew version of Windows Server. After years without a significant upgrade infunctionality, companies will be able to make one great leap forward. Thiswill obviously be very convenient, and money could pour into Microsoft&#39;salready overflowing coffers.&lt;br /&gt;For those of us who have been following this particular development fromthe storage principles that appeared in the 1990s (Cairo) through to theLonghorn ideas that Microsoft showed even before the release of Windows XP,Vista looks a bit of a disaster. If Microsoft had delivered what itpromised in, say, 2004, it would have led the market. Instead, it&#39;soffering much less, and delivering it much later - probably after three oreven more versions of, say, Mac OS X.&lt;br /&gt;But, of course, we&#39;re an insignificant number of people with littlemoney and even less influence. Vista is probably going to ship about 500mcopies in 2007-08, with more than 10,000 PC manufacturers pre-installing iton almost every machine they make, across the four corners of the earth.And paying Microsoft about $25bn in cash.&lt;br /&gt;I suspect most of these naive users will find a lot to like in Vista.They will like the clean interface and the speed of Windows Media Player11, the extra security and enhanced features of Internet Explorer 7+ (quicktabs, RSS feed detection, page zooming, print-to-fit), and the vastlyimproved Start menu. They will love the way little screen images pop upfrom the taskbar, and the way they can mouse-wheel rapidly through screensin Flip 3D mode - with videos still running. Some less jaded users willenjoy the gadgets - clock, slide show, weather information etc - that showin the Vista Sidebar, as per Konfabulator, or on accessory screens.&lt;br /&gt;At least the geekier ones may discover other little features, such asthe ability to link two PCs via Wi-Fi, in Vista&#39;s MeetingSpace, the abilityto use plug-in USB thumb drives to add to their PC&#39;s memory (ReadyBoost),hard drives with built in Flash memory (ReadyDrives), and support forthings like 802.11i networking and Internet Protocol IPv6.&lt;br /&gt;Vista will not get people dancing in the streets - except maybe Allchin- but it will probably keep the Windows market rolling for a few moreyears. Microsoft has certainly been through a bad patch, but the worst maybe over.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114915597096353185/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114915597096353185' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114915597096353185'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114915597096353185'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/06/end-in-sight-for-windows-vista.html' title='End in sight for Windows Vista'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114848509809670371</id><published>2006-05-24T19:35:00.000+04:00</published><updated>2006-05-24T19:38:18.120+04:00</updated><title type='text'>Experts Offer Advice to Prevent ID Theft</title><content type='html'>SAN JOSE, Calif. (AP) - Consumer advocates have some advice for the 26.5 million veterans whose personal information was stolen from the home of a Veterans Affairs employee: Don&#39;t panic.&lt;br /&gt;&lt;br /&gt;Identity theft may be a growing problem that affected 9.3 million Americans last year, according to Javelin Strategy and Research. But consumer advocates say a few precautions can lessen the chances of becoming a victim, even for people whose personal information has been stolen.&lt;br /&gt;The first thing to do if you think your Social Security number, birth date or other sensitive data has fallen into the wrong hands is to place an initial fraud alert on your credit reports. There are three major credit reporting agencies, but a call to one - for instance, Equifax at 800-525-6285 - will ensure the other two are notified.&lt;br /&gt;&lt;br /&gt;A fraud alert entitles you to a free copy of your credit report from each of the three companies. Order one from each and scrutinize them carefully for accounts you didn&#39;t open or debts you don&#39;t recognize. Also, make sure that information such as your Social Security number and employer are correct on each report.&lt;br /&gt;&lt;a href=&quot;http://story.news.ask.com/image/20060523/IDENTITY_THEFT_PREVENTION.sff_GFX938_20060523140343.html?date=20060523&amp;docid=D8HPMQUO2&quot;&gt;&lt;/a&gt;&lt;br /&gt;(AP) RETRANSMISSION; graphic shows tips on avoiding identity theft; two versions. (AP Graphic)&lt;a href=&quot;http://story.news.ask.com/image/20060523/IDENTITY_THEFT_PREVENTION.sff_GFX938_20060523140343.html?date=20060523&amp;docid=D8HPMQUO2&quot;&gt;Full Image&lt;/a&gt;If you discover accounts or transactions you didn&#39;t authorize, call and speak with someone in the fraud department of each company involved. Keep a log of each person contacted, along with the date, time and topics discussed on each call.&lt;br /&gt;&lt;br /&gt;An initial fraud alert also requires businesses to take additional steps to confirm your identity before issuing loans or opening accounts in your name. Be prepared for loan and credit card applications to take slightly longer to be processed.&lt;br /&gt;&lt;br /&gt;It&#39;s important to understand that an initial fraud alert, as the name implies, is only a temporary fix. That&#39;s because it remains in effect for only 90 days. To prevent becoming a victim after the three months are up, you&#39;ll need to take additional steps.&lt;br /&gt;&lt;br /&gt;Next, fill out an identity theft report with your local, state or federal law enforcement agency. It&#39;s unclear if the mere loss or theft of personal information constitutes identity theft, but filing a report may offer additional protections. The FTC makes an affidavit available at .&lt;a href=&quot;http://www.consumer.gov/idtheft/pdf/affidavit.pdf&quot;&gt;http://www.consumer.gov/idtheft/pdf/affidavit.pdf&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Ask each of the three credit reporting companies to place a freeze or extended alert on your account. Seventeen states have enacted laws that require the reporting companies to block access to your files in most instances. Check with the Consumers Union Web site or attorney general in your state to see if this is available where you live.&lt;br /&gt;&lt;a href=&quot;http://story.news.ask.com/image/20060523/IDENTITY_THEFT_PREVENTION.sff_GFX937_20060523135638.html?date=20060523&amp;amp;docid=D8HPMQUO2&quot;&gt;&lt;/a&gt;&lt;br /&gt;(AP) RETRANSMISSON; graphic shows tips on avoiding identity theft; two versions. (AP Graphic)&lt;a href=&quot;http://story.news.ask.com/image/20060523/IDENTITY_THEFT_PREVENTION.sff_GFX937_20060523135638.html?date=20060523&amp;amp;docid=D8HPMQUO2&quot;&gt;Full Image&lt;/a&gt;Even if your state doesn&#39;t offer this protection, ask Equifax, TransUnion and Experian to give you an extended alert anyway. This option will entitle you to two free credit reports per year, and it will also require the credit reporting companies to remove you from lists marketers use to send prescreened credit offers for five years.&lt;br /&gt;&lt;br /&gt;To qualify for an extended alert, the reporting companies will require you to prove you&#39;ve been the victim of identity theft, even though it is not always clear how the law defines a victim in this case. Be sure to include the FTC affidavit or other law enforcement report you filed. It is legal documentation that your personal identification has been stolen.&lt;br /&gt;&lt;br /&gt;Finally, recognize that safeguarding your privacy is a never-ending task, even for people who have no reason to believe their personal information has been stolen. A little education and prevention, say consumer advocates, can go a long way.&lt;br /&gt;&lt;br /&gt;&quot;You need an ongoing vigilance,&quot; says Paul Stephens, a policy analyst with the Privacy Rights Clearinghouse in San Diego. &quot;We want people to be proactive, to be vigilant, but we also don&#39;t want&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114848509809670371/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114848509809670371' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114848509809670371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114848509809670371'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/05/experts-offer-advice-to-prevent-id.html' title='Experts Offer Advice to Prevent ID Theft'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114813678831729434</id><published>2006-05-20T18:49:00.000+04:00</published><updated>2006-05-20T18:53:08.330+04:00</updated><title type='text'>Be Careful Where You Point And Click</title><content type='html'>Data Proves That Certain Web Sites Contain Viruses, Spyware, Popups&lt;br /&gt;&lt;br /&gt;(CBS) You’ve said it a thousand times: be careful where you point your browser and what you type if you’re on an untrustworthy Web site. Some sites contain nasty stuff like spyware, viruses and malicious code. In some cases, you’ll get spam if you give them your e-mail address.&lt;br /&gt;&lt;br /&gt;Now there’s data to back that up, albeit commissioned by a company that makes its money selling products to protect you against the Internet’s dark side. Self interest aside, the data from a study co-led by Internet anti-spyware expert Ben Edelman and commissioned by McAfee confirms what experts have been saying for years: Be careful about sites that come up in searches. In addition to selling security software and services, McAfee, this April, acquired &lt;a class=&quot;link&quot; href=&quot;http://www.cbsnews.com/stories/2006/05/19/tech/www.siteadvisor.com&quot; target=&quot;new&quot;&gt;SiteAdvisor&lt;/a&gt;, which helps consumers analyze the safety of sites. The researchers analyzed results of searches on Google, Yahoo, MSN, AOL, Ask.com and found that &quot;all of the major search engines returned risky sites in their search results for popular keywords&quot; and that &quot;dangerous sites soared to as much as 72 percent of results for certain popular keywords, such as &#39;free screensavers,&#39; &#39;digital music,&#39; &#39;popular software,&#39; and &#39;singers.&#39;&lt;br /&gt;&lt;br /&gt;The &lt;a class=&quot;link&quot; href=&quot;http://www.siteadvisor.com/studies/search_safety_may2006.html&quot; target=&quot;new&quot;&gt;report&lt;/a&gt; warns users to be especially cautious about sites that come up as sponsored (paid) results; these &quot;contain two to four times as many dangerous sites&quot; as the non-paid results, the report said. Sometimes you have to look carefully to figure it out, but the reputable search engines label sponsored results so users can distinguish them from the ones that come up based on the search engine’s actual criteria that establishes a site’s relevancy to a search term.&lt;br /&gt;&lt;br /&gt;A Google search for &quot;free iPods,&quot; for example, gives you a number of paid results which, according to SiteAdvisor, are potentially unsafe. The report found that &quot;MSN search results had the lowest percentage (3.9%) of dangerous sites while Ask search results had the highest percentage (6.1%). Google was in between (5.3%).&quot; The authors concluded that, &quot;on the whole, we see little basis to conclude that any search engine is much safer than any other; safety rankings vary too much from search to search.&quot; The report’s authors estimated that each month consumers click on an estimated 285 million &quot;hostile sites.&quot;&lt;br /&gt;&lt;br /&gt;The researchers compiled 1,394 popular keywords using lists of common searches. &quot;Adult search terms&quot; were excluded. The results were analyzed using the database from McAfee’s SiteAdvisor Web safety database which is based on &quot;automated tests that analyze Web sites for exploits, downloads containing spyware, adware, or other unwanted programs, pop-ups, links to dangerous sites, and e-mail submission forms,&quot; according to the report.&lt;br /&gt;&lt;br /&gt;In addition to pop-ups, spam and adware, some sites use what are called &quot;browser exploits&quot; to install unwanted code on a user’s PC. In theory, these exploits can do serious damage to a PC or jeopardize a user’s privacy and safety by exploiting information for malicious or criminal purposes. The report was released to draw attention to a free McAfee product that helps consumers analyze a site before they click on it or before they submit any data to the site.&lt;br /&gt;&lt;br /&gt;SiteAdvisor works with both Internet Explorer and Mozilla Firefox to show you a site’s rating from within Google, MSN or Yahoo even before you click on it. With SiteAdvisor installed, when you search for a term in one of those search engines, you’ll see a &quot;safety button&quot; next to the listing. A green check mark means that the site was tested and there were no significant problems found.&lt;br /&gt;&lt;br /&gt;A yellow exclamation point means that &quot;tests revealed some issues you should know about. (Example: a site tried to change our browser defaults, or sent a lot of &quot;non-spammy&quot; e-mail)&quot; and a red X means that the site found &quot;serious issues that you&#39;ll want to carefully consider before using this site at all. (Example: The site sent us lots of spammy e-mail or bundled adware with a download.)&quot; Once you get to a site, regardless of how you got there, there is an icon in the lower right-hand corner that gives you a color-coded assessment of that site — which, if you click on it, reports with details as to why the site was given its rating, along with rating of some sites linked from the site you’re on.&lt;br /&gt;&lt;br /&gt;In my tests, I found the SiteAdvisor results to be pretty helpful, but it wasn’t perfect. For example, it gave a green light to the greeting card site, 123Greetings.com. While I don’t have any evidence that the site puts any malicious code on your system, I do know that it pops up a lot of ads not only when you use it to send a card, but also when you click on a card that someone else sends you. Flaws aside, SiteAdvisor generally does give users some pretty good advice when it comes to sites that should be avoided. It’s not the end-all, but it is one more tool is users’ arsenal to help protect us from online bad guys.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114813678831729434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114813678831729434' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114813678831729434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114813678831729434'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/05/be-careful-where-you-point-and-click.html' title='Be Careful Where You Point And Click'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114662819591363548</id><published>2006-05-03T07:48:00.000+04:00</published><updated>2006-05-03T07:49:55.926+04:00</updated><title type='text'>VoIP Device Launch: New NETGEAR Skype WiFi Phone</title><content type='html'>&lt;a href=&quot;http://www.netgear.com/&quot;&gt;NETGEAR&lt;/a&gt; today announced pricing information and pre-order availability for the new NETGEAR Skype (&lt;a href=&quot;http://www.tmcnet.com/tmcnet/snapshots/snapshots.aspx?Company=Skype&quot;&gt;News&lt;/a&gt; - &lt;a href=&quot;http://www.tmcnet.com/scripts/newsalerts/?k1=Skype&amp;k2=+Zennstr%c3%b6m&amp;amp;k3=+Friis&quot;&gt;Alert&lt;/a&gt;) WiFi (&lt;a href=&quot;http://www.tmcnet.com/tmcnet/snapshots/snapshots.aspx?Company=WiFi&quot;&gt;News&lt;/a&gt; - &lt;a href=&quot;http://www.tmcnet.com/scripts/newsalerts/?k1=WiFi&amp;k2=+802.11&amp;amp;k3=+WLAN&quot;&gt;Alert&lt;/a&gt;) phone (model SPH101). This will be the first device said to be certified to make mobile Internet telephony a reality for Skype users worldwide. The phone can be pre-ordered now &lt;a href=&quot;http://tools.netgear.com/skype/&quot;&gt;exclusively online&lt;/a&gt; at an MSRP of $249.99.&lt;br /&gt;&lt;br /&gt;The SPH101 is the first Skype-Certified device to allow consumers to make unlimited free domestic and international calls to other Skype users over a wireless network without having to be tied to a PC. The WiFi phone will work anywhere in the world where a user has a secured or open access to a WiFi network.&lt;br /&gt;&lt;br /&gt;The device comes pre-loaded with Skype software and ready out-of-the-box to use with a wireless network. The device&#39;s intuitive on-screen color menu shows saved Skype contacts and their online availability for easy communications, similar to the PC experience.&lt;br /&gt;&lt;br /&gt;&quot;We are pleased to announce pre-order availability of NETGEAR&#39;s Skype WiFi phone to those who have been anxiously awaiting the product launch since we unveiled a prototype at the Consumer Electronics Show,&quot; said Patrick Lo, NETGEAR&#39;s chairman and chief executive officer in a statement. &quot;Our phone combines NETGEAR&#39;s innovative wireless networking technology with the simplicity of the Skype experience, while freeing users from the PC. With tens of thousands of customers already registered for more information on the NETGEAR Skype WiFi phone via our Web site and millions of registered Skype users, we&#39;re thrilled to bring forth this market-defining product to meet the pent-up demand of such an enthusiastic user community around the globe.&quot;&lt;br /&gt;&lt;br /&gt;The new NETGEAR Skype WiFi phone is currently available for online pre-ordering at an MSRP of $249.99, and is backed by a one-year warranty and 24/7 technical support. All customers placing pre-orders will get 30 free SkypeOut minutes to many phones worldwide as well as 30 days of free Skype Voicemail, compliments of NETGEAR and Skype, for being the first to own the phone.&lt;br /&gt;&lt;br /&gt;&quot;By offering NETGEAR&#39;s unique WiFi phone to our global users, we are enabling them to enjoy the same Skype experience they love, but with the freedom of mobility,&quot; said Saul Klein, vice president of global marketing for Skype. &quot;We are committed to working with industry leaders like NETGEAR who share our dedication to connecting the world through easy-to-use, innovative technologies.&quot;&lt;br /&gt;&lt;br /&gt;Skype announced today that it also joined forces with Polycom (&lt;a href=&quot;http://www.tmcnet.com/tmcnet/snapshots/snapshots.aspx?Company=Polycom&quot;&gt;News&lt;/a&gt; - &lt;a href=&quot;http://www.tmcnet.com/scripts/newsalerts/?k1=Polycom&amp;k2=+VSX&amp;amp;k3=+ViewStation&quot;&gt;Alert&lt;/a&gt;) to introduce the &lt;a href=&quot;http://news.tmcnet.com/news/-polycom-skype-pc-voip-speakerphone-/2006/05/01/1627423.htm&quot;&gt;Polycom Communicator&lt;/a&gt;, a Skype-certified, co-branded USB speakerphone that integrates Polycom&#39;s Acoustic Clarity Technology to deliver hands-free, natural, two-way voice communication for Skype voice and video conversations, without echoes or feedback.&lt;br /&gt;&lt;br /&gt;The device complements the new Skype for Business offering, providing a portable, personal speakerphone system that delivers high-fidelity wideband voice communications for individuals or small groups. In addition to the core speakerphone capabilities, the Polycom Communicator also offers a high-quality audio output for playing music and games from a laptop or desktop PC.&lt;br /&gt;&lt;br /&gt;NETGEAR, Inc.&lt;br /&gt;&lt;a href=&quot;http://www.netgear.com/&quot;&gt;http://www.netgear.com&lt;/a&gt;&lt;br /&gt;Skype&lt;br /&gt;&lt;a href=&quot;http://www.skype.com/&quot;&gt;http://www.skype.com&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114662819591363548/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114662819591363548' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114662819591363548'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114662819591363548'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/05/voip-device-launch-new-netgear-skype.html' title='VoIP Device Launch: New NETGEAR Skype WiFi Phone'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114251795402216184</id><published>2006-03-16T18:04:00.000+04:00</published><updated>2006-03-16T18:05:54.043+04:00</updated><title type='text'>Computer Researchers Warn of Net Attacks</title><content type='html'>WASHINGTON (AP) - A new variety of unusually powerful Internet attacks can overwhelm popular Web sites and disrupt e-mails by exploiting the computers that help manage global Internet traffic, according to security researchers.&lt;br /&gt;&lt;br /&gt;First detected late last year, the new attacks direct such massive amounts of spurious data against victim computers that even flagship technology companies could not cope. In one of the early cases examined, the unknown assailant apparently seized control of an Internet name server in South Africa and deliberately corrupted its contents.&lt;br /&gt;&lt;br /&gt;Name servers are specialized computers that help direct Internet traffic to its destinations.&lt;br /&gt;&lt;br /&gt;The attacker then sent falsified requests to the compromised directory computer, which unleashed overwhelming floods of amplified data aimed wherever the attacker wanted.&lt;br /&gt;&lt;br /&gt;Experts traced at least 1,500 attacks that briefly shut down commercial Web sites, large Internet providers and leading Internet infrastructure companies during a period of weeks. The attacks were so targeted that most Internet users did not notice widespread effects.&lt;br /&gt;&lt;br /&gt;Ken Silva, the chief security officer for VeriSign Inc., compared the scale of attacks to the damage caused in October 2002 when nine of the 13 computer &quot;root&quot; servers that manage global Internet traffic were crippled by a powerful electronic attack. VeriSign operates two of the 13 root server computers, but its machines were unaffected.&lt;br /&gt;&lt;br /&gt;&quot;This is significantly larger than what we saw in 2002, by an order of magnitude,&quot; Silva said.&lt;br /&gt;Silva said the attacks earlier this year used only about 6 percent of the more than 1 million name servers across the Internet to flood victim networks. Still, the attacks in some cases exceeded 8 gigabits per second, indicating a remarkably powerful electronic assault.&lt;br /&gt;&lt;br /&gt;&quot;This would be the Katrina of Internet storms,&quot; Silva said.&lt;br /&gt;The U.S. Computer Emergency Readiness Team, a partnership with the Homeland Security Department, warned network engineers in December to properly configure their name servers to prevent hackers from using them in attacks. It called the attacks &quot;troublesome&quot; because name servers must operate to help direct Internet traffic.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114251795402216184/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114251795402216184' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114251795402216184'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114251795402216184'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/03/computer-researchers-warn-of-net.html' title='Computer Researchers Warn of Net Attacks'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114017038953043424</id><published>2006-02-17T13:56:00.000+04:00</published><updated>2006-02-17T13:59:49.546+04:00</updated><title type='text'>New Google Desktop Grabs More Of Microsoft‘s Turf</title><content type='html'>New Google Desktop Grabs More Of Microsoft‘s Turf &lt;br /&gt;Staff and agencies&lt;br /&gt;14 February, 2006&lt;br /&gt;&lt;br /&gt;By Reuters&lt;br /&gt;InternetWeek Thu Feb 9, 6:49 PM ET &lt;br /&gt;&lt;br /&gt;SAN FRANCISCO - Web search leader Google Inc. is introducing an upgraded version of its software for users to organize and find information on any computer and to share it with friends, the company said on Thursday. &lt;br /&gt;&lt;br /&gt;Google Desktop 3 poses new challenges to Microsoft Corp.‘s dominance of the way people interact with computers, but also demands users place far greater trust in Google‘s capacity to protect their privacy. &lt;br /&gt;&lt;br /&gt;Google Desktop vacuums up data stored on a user‘s PC and makes it accessible on any other computer in regular use by the customer at home or work or even on an airplane trip, assuming users consent to storing data on Google‘s central computers. &lt;br /&gt;&lt;br /&gt;In addition, Google said it is turning &quot;Sidebar,&quot; a system introduced six months ago for viewing live updates of personal information, into a way to share quick notes, news, photos or other tidbits of data with friends or colleagues. &lt;br /&gt;&lt;br /&gt;&quot;This is starting to amount to a new operating system, though Google would never describe it as such,&quot; Gartner Inc. analyst Allen Weiner said. &quot;It is going to be Microsoft‘s challenge to offer the same level of flexibility and power for both consumers and content creators.&quot; &lt;br /&gt;&lt;br /&gt;Google also is opening up its mini information panels to encourage independent developers to build applications for users, borrowing a strategy first popularized by Apple Computer Inc. and Yahoo Inc. (Nasdaq:YHOO - news), and which Microsoft plans to introduce in the next version of Windows for consumers. &lt;br /&gt;&lt;br /&gt;These mini-programs can be shared in a few clicks with any user of Google Talk, which operates as a kind of background communications system. &lt;br /&gt;&lt;br /&gt;Google has built 100 such &quot;applets&quot; so far -- from games such as online chess or tick-tack-toe to monitors for checking airline flight times or eBay auctions in progress, said Sundar Pichai, Google‘s director of product management. &lt;br /&gt;&lt;br /&gt;Outside developers will be encouraged to contribute many more starting from Thursday. Customers would download these from Google‘s site at http://desktop.google.com/. &lt;br /&gt;&lt;br /&gt;These instant-information panels are perfect also for small-screen mobile phones and other devices -- making good on its goal of giving access to information anywhere. &lt;br /&gt;&lt;br /&gt;Still, Rob Helm, an analyst with &quot;Directions on Microsoft,&quot; said that the world‘s largest software company had both technical and business defenses against Google. &lt;br /&gt;&lt;br /&gt;Microsoft has far more diverse businesses than Google including not just its Windows operating system, but Office applications, server and database software and Web services. Google basically depends on advertising alone, Helm noted. &lt;br /&gt;&lt;br /&gt;&quot;It is a race where Google is trying to get into Microsoft‘s business before Microsoft cuts off Google‘s advertising business,&quot; Helm said. &lt;br /&gt;&lt;br /&gt;Many Google Desktop users report a shock of realization when they become aware how much personal information about themselves is contained on their machines. &lt;br /&gt;&lt;br /&gt;But by giving users the ability to search for text documents across their computers, Google risks angering corporate security managers who may fear the loss of corporate secrets through the openness of such systems. &lt;br /&gt;&lt;br /&gt;Google officials said the company already offers an &quot;enterprise&quot; version of Google Desktop that gives network administrators control over the level of freedom users have to share files within or outside their organizations. &lt;br /&gt;&lt;br /&gt;Individual users also have the ability to select which documents or folders are excluded from document sharing. &lt;br /&gt;&lt;br /&gt;Another security feature allows users to lock out anyone but themselves from using Google Desktop search on their computers in order to protect PC data from prying colleagues. &lt;br /&gt;&lt;br /&gt;Weiner said the computer industry‘s drive to deliver a wide array of personally relevant information to consumers on PCs, phones, TVs or in their cars increasingly demand trade-offs between personal privacy and convenience and personalization. &lt;br /&gt;&lt;br /&gt;&quot;Google is willing to proceed...even if a significant percentage of people will not use these features, at least immediately,&quot; Weiner said. Yahoo faces some of the same issues with its push to run its services on phones and TVs, he said. &lt;br /&gt;&lt;br /&gt;By: Eric Auchard&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114017038953043424/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114017038953043424' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114017038953043424'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114017038953043424'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/02/new-google-desktop-grabs-more-of.html' title='New Google Desktop Grabs More Of Microsoft‘s Turf'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-114016702969083222</id><published>2006-02-17T12:58:00.000+04:00</published><updated>2006-02-17T13:03:49.703+04:00</updated><title type='text'>Microsoft Releases Office 2007 Details</title><content type='html'>Office 2007 to be released late 2006&lt;br /&gt;Tom Sanders in California, &lt;a href=&quot;http://www.vnunet.com/&quot;&gt;vnunet.com&lt;/a&gt; 17 Feb 2006&lt;br /&gt;&lt;br /&gt;Microsoft&#39;s forthcoming Office suite has shed its Office 12 codename and official received its new &quot;2007 Microsoft Office&quot; moniker.&lt;br /&gt;&lt;br /&gt;The productivity suite is currently in &lt;a href=&quot;http://www.vnunet.com/2146291&quot;&gt;beta&lt;/a&gt; and is slated for release by the end of this year. A second beta has been promised before June.&lt;br /&gt;&lt;br /&gt;The most visible enhancement to the suite is the new user interface that the company &lt;a href=&quot;http://www.vnunet.com/2142256&quot;&gt;first demonstrated&lt;/a&gt; at the Professional Developer Conference last year in Los Angeles. Menu buttons are set to change according to the task that the user is performing, eliminating the need to dive into pull down menus when searching for the appropriate item.&lt;br /&gt;&lt;br /&gt;The launch will also see the introduction of the first major release of the Groove Virtual Office collaboration suite since the application was acquired by Microsoft last April. Since the acquisition, the Groove&#39;s founder &lt;a href=&quot;http://www.vnunet.com/2145852&quot;&gt;Ray Ozzie&lt;/a&gt; has been appointed Chief Technical Officer and is the architect of Microsoft&#39;s &lt;a href=&quot;http://www.vnunet.com/2145303&quot;&gt;Live Software initiative&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Microsoft plans to make available seven editions of the suite. Consumer and small business will see few if any changes, but the software maker has created a new version catering to enterprises called Microsoft Office Enterprise 2007.&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/114016702969083222/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/114016702969083222' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114016702969083222'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/114016702969083222'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/02/microsoft-releases-office-2007-details.html' title='Microsoft Releases Office 2007 Details'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-10202443.post-113874773049724177</id><published>2006-02-01T02:38:00.000+04:00</published><updated>2006-02-01T02:48:50.536+04:00</updated><title type='text'>Microsoft Amends Blog Shutdown Policies</title><content type='html'>Microsoft Amends Blog Shutdown PoliciesJan&lt;br /&gt;&lt;br /&gt;31, 4:52 PM (ET)&lt;br /&gt;By ALLISON LINN&lt;br /&gt;&lt;br /&gt;SEATTLE (AP) - Microsoft Corp. (&lt;a href=&quot;http://web.ask.com/web?q=quotation+for+MSFT+stock+price&quot;&gt;MSFT&lt;/a&gt;) says it is setting new policies on shutting down Web journals after its much-publicized squelching of a well-known Chinese blogger at the request of Chinese officials.&lt;br /&gt;&lt;br /&gt;The Redmond software company, operator of a popular blogging technology called MSN Spaces, said Tuesday that it will endeavor to make blogs available to users elsewhere even if Microsoft decides it is legally obliged to block them in a particular country.&lt;br /&gt;&lt;br /&gt;The company also pledged to provide users with a clear notice that it has shut down a Web site when the decision to do so stemmed from a legal mandate. Previously, it has simply said the content was unavailable.&lt;br /&gt;&lt;br /&gt;Brad Smith, Microsoft&#39;s top lawyer, said in an interview that the circumstances of a shutdown will dictate whether a blog&#39;s archived content alone will continue to be available elsewhere, or whether the person can continue posting information to users outside the country that ordered the blockage.&lt;br /&gt;&lt;br /&gt;&quot;Some of this, I think, we just have to recognize is evolving technology and changing law,&quot; said Smith, speaking by phone from a Microsoft-sponsored government conference in Lisbon, Portugal.&lt;br /&gt;&lt;br /&gt;MSN Spaces, which allows users to post journals, pictures and other content on the Internet, boasts 35 million users, including 3.3 million in China.&lt;br /&gt;&lt;br /&gt;The company has maintained that it is important to be able to provide users across the globe with such tools even if local laws constrain what it can make viewable in specific countries.&lt;br /&gt;&quot;We think that blogging and similar tools are powerful vehicles for economic development and for creativity and free expression. They are tools that do good,&quot; Smith said. &quot;We believe that it&#39;s better to make these tools available than not, but that isn&#39;t the end of the discussion, either.&quot;&lt;br /&gt;Late last year, Microsoft shut down the site of a popular Chinese blogger at Beijing&#39;s request. The blog, written under the pen name An Ti by Zhao Jing, touch on sensitive topics such as China&#39;s relations with Taiwan and press freedoms in China.&lt;br /&gt;&lt;br /&gt;Microsoft rivals, including Google Inc. (&lt;a href=&quot;http://web.ask.com/web?q=quotation+for+GOOG+stock+price&quot;&gt;GOOG&lt;/a&gt;) and Yahoo Inc. (&lt;a href=&quot;http://web.ask.com/web?q=quotation+for+YHOO+stock+price&quot;&gt;YHOO&lt;/a&gt;), also have grappled with - and received criticism surrounding - how they censor their offerings in foreign countries.&lt;br /&gt;Google said last week that it would filter sensitive topics from Web searches in China. Yahoo came under fire last year after it provided the government with e-mail account information for a&lt;br /&gt;&lt;br /&gt;Chinese journalist who was later convicted for violating state secrecy laws.&lt;br /&gt;Smith said Tuesday that Microsoft hopes to build industry and government support for more formal policies on dealing with content censorship requests from foreign governments, but he wouldn&#39;t say whether he had spoken with competitors such as Google and Yahoo directly.&lt;br /&gt;John Palfrey, executive director of Harvard Law School&#39;s Berkman Center for Internet and Society, lauded Microsoft&#39;s moves as an important first step.&lt;br /&gt;&lt;br /&gt;But he expected Microsoft to face considerable government pressure if it does start disclosing government censorship and makes good on its pledge to show censored data outside the country in question.&lt;br /&gt;&lt;br /&gt;&quot;Where we&#39;ll see whether the policy is meaningful or not is the first time the state comes to Microsoft ... and says, &quot;So you&#39;re publishing to the world the subversive political statements of somebody online. Who is it?&#39;&quot; he said. &quot;Does Microsoft fold or stand pat?&quot;&lt;div class=&quot;blogger-post-footer&quot;&gt;&quot;IF YOU HAVE AN APPLE AND I HAVE AN APPLE AND WE EXCHANGE APPLES THEN YOU AND I WILL STILL EACH HAVE ONE APPLE. BUT IF YOU HAVE AN IDEA AND I HAVE AN IDEA AND WE EXCHANGE THESE IDEAS, THEN EACH OF US WILL HAVE TWO IDEAS.&quot; -- George Bernard Shaw (1856-1950))&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerconsultantonline.blogspot.com/feeds/113874773049724177/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/10202443/113874773049724177' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/113874773049724177'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/10202443/posts/default/113874773049724177'/><link rel='alternate' type='text/html' href='http://computerconsultantonline.blogspot.com/2006/02/microsoft-amends-blog-shutdown.html' title='Microsoft Amends Blog Shutdown Policies'/><author><name>saleem™</name><uri>http://www.blogger.com/profile/10989151533951798474</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Gvzl5699KDdtgdctgODfW8aYMCXglm8qRFjves1YcOky5gVt_VAafmDlEDpxaxbkq3m2apDW8m0tlX8hEWFOJd4Fk21zxQ4RG_sJyEQB1aDTjHV0MnoAdWej-Isa6Ak/s220/blg.jpg'/></author><thr:total>0</thr:total></entry></feed>