<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7050009308414540433</atom:id><lastBuildDate>Wed, 19 Mar 2014 08:48:33 +0000</lastBuildDate><category>Failures</category><category>Security</category><category>Tester</category><category>Self Improvement</category><category>Politics</category><category>Developer</category><category>H-1B</category><category>Education</category><category>Future</category><category>DBA</category><category>IBM</category><category>Outsourcing</category><category>Tips</category><category>Cloud</category><category>GREAT</category><category>Microsoft</category><category>Agile</category><category>Data  Center</category><category>Google</category><category>Immigration</category><category>Mainframe</category><category>Open Source</category><category>Apple</category><category>DRM</category><category>Exploratory</category><category>Goals</category><category>Oracle</category><category>Success</category><category>VMWare</category><category>Yahoo</category><title>I. T. Epistemology (Study Of Information Technology)</title><description>This Blog is dedicated to the study of Information Technology in it&#39;s many facets.  What is a developer? What is a tester?</description><link>http://www.itepistemology.com/</link><managingEditor>noreply@blogger.com (Steven Ashley)</managingEditor><generator>Blogger</generator><openSearch:totalResults>139</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-868728328762974183</guid><pubDate>Wed, 20 Feb 2008 06:15:00 +0000</pubDate><atom:updated>2008-02-20T00:44:21.131-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Education</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Microsoft&#39;s DreamSpark Sparks I.T. Students Worldwide</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.blogsmithmedia.com/www.downloadsquad.com/media/2008/02/dreamspark.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px;&quot; src=&quot;http://www.blogsmithmedia.com/www.downloadsquad.com/media/2008/02/dreamspark.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;I&#39;ve spent a lot of time saying that rather than pursuing additional H-1B visa&#39;s Microsoft which arguably hurts American educational competitiveness, they need to do more to just the opposite, improving American educational competitiveness.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;Looks like they may have listened they have just introduced the DreamSpark program aimed at fostering technology innovation worldwide.  Through the DreamSpark program, &lt;a href=&quot;http://www.pcworld.com/tags/Microsoft+Corporation.html&quot;&gt;Microsoft&lt;/a&gt; is giving away development and design software to university and high school students around the world, including those right here in the United States.&lt;/p&gt;   &lt;p&gt;Microsoft Chairman Bill Gates is expected to unveil the DreamSpark program Tuesday at Stanford University on the first stop of a U.S. and Canadian college tour. The program is now available to more than 35 million college students in Belgium, China, Finland, France, Germany, Spain, Sweden, Switzerland, the U.K. and the U.S. &lt;/p&gt;  &lt;p&gt;Software available to students through DreamSpark includes Microsoft&#39;s development environment, Visual Studio 2005 Professional Edition, and its Web and graphic design toolset, the Expression Studio, also available through the program is the XNA Game Studio 2.0, SQL Server Developer Edition, Windows Server Standard Edition and other software and resources.&lt;/p&gt;&lt;p&gt;The programs available include:&lt;br /&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/Visual_Studio_2008.aspx&quot;&gt;Visual Studio 2008 Professional Edition&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/Windows_Server_2003.aspx&quot;&gt;Windows Server 2003 Standard Edition&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/SQL_Server_2005_Express.aspx&quot;&gt;SQL Server 2005 Express Edition&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/Expression_Studio.aspx&quot;&gt;Expression Studio&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/XNA_Game_Studio.aspx&quot;&gt;XNA Game Studio 2.0&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://downloads.channel8.msdn.com/Products/XNA_Game_Studio.aspx&quot;&gt;XNA Creators Club Online&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://www.itepistemology.com/2008/02/microsofts-dreamspark-sparks-it.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-1333233025890728681</guid><pubDate>Wed, 13 Feb 2008 06:59:00 +0000</pubDate><atom:updated>2008-02-13T01:12:25.976-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tester</category><title>Testers Check Out uTest The New Pay Per Bug Testing Community</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.techcrunch.com/wp-content/utest-logo.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px;&quot; src=&quot;http://www.techcrunch.com/wp-content/utest-logo.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Testers,  looking for something to do in your spare time,  you might want to take a look at &lt;a href=&quot;http://www.utest.com/&quot;&gt;uTest &lt;/a&gt;a new pay per bug software testing community.&lt;br /&gt;&lt;br /&gt;Anyone can sign up be a software tester and make some cash. &lt;a href=&quot;http://www.utest.com/&quot;&gt;uTest &lt;/a&gt;estimates that its testers will be able to rake in anywhere from a few hundred to a few thousand dollars per month.&lt;br /&gt;&lt;br /&gt;I don&#39;t know about your but I could use an extra few thousand per month.  If your like me and want to find out more check out &lt;a href=&quot;http://www.techcrunch.com/2008/02/10/utest-now-open-for-business-get-paid-to-find-software-bugs/&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to uTest Now Open for Business: Get Paid to Find Software Bugs&quot;&gt;TechCrunch - uTest Now Open for Business: Get Paid to Find Software Bugs:&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;The startup is trying a crowdsourcing approach to testing software bugs. Anyone can sign up to test software and make some cash. uTest estimates that its testers will be able to rake in anywhere from a few hundred to a few thousand dollars per month, depending on tester-expertise and bug pricing. &lt;p&gt;It is important to note that bug prices will fluctuate in real-time based on a variety of parameters, including: Bug type (logical, GUI), type of application (Web, desktop), number of testers that fit the required profile for the testing environment, bugs left to find, and more.&lt;/p&gt; &lt;p&gt;Over 2000 testers from around the world have already &lt;a href=&quot;https://www.utest.com/utest/app/?wicket:bookmarkablePage=:com.utest.web.page.TesterRegistrationPage&quot; target=&quot;_blank&quot; onclick=&quot;javascript:urchinTracker (&#39;/outbound/www.utest.com&#39;);&quot;&gt;signed-up&lt;/a&gt;, so it seems the company’s pay-per-bug model is resonating well across testing professionals.&lt;/p&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2008/02/testers-check-out-utest-new-pay-per-bug.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-1867313971769665560</guid><pubDate>Wed, 13 Feb 2008 06:01:00 +0000</pubDate><atom:updated>2008-02-13T00:14:48.381-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Self Improvement</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Be Careful What You Post Online, The World Is Watching!</title><description>For year&#39;s I have told my teenagers and their friends to be careful what they post online in Facebook or on other such services because, I know that between Google making what amounts to a continuous  history and the retention polices of the sites themselves, there is really no such thing as deleting a post after it has been exposed for anytime online.  &lt;br /&gt;&lt;br /&gt;Proving my point, is an article in today&#39;s New York Times called &lt;a href=&quot;http://www.nytimes.com/2008/02/11/technology/11facebook.html?_r=1&amp;amp;oref=slogin&quot;&gt;How Sticky Is Membership on Facebook? Just Try Breaking Free.&lt;/a&gt; In it &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/people/a/maria_aspan/index.html?inline=nyt-per&quot; title=&quot;More Articles by Maria Aspan&quot;&gt;MARIA ASPAN&lt;/a&gt; states:&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Some users have discovered that it is nearly impossible to remove themselves entirely from Facebook, setting off a fresh round of concern over the popular social network’s use of personal data. &lt;/p&gt;&lt;p&gt;While the Web site offers users the option to deactivate their accounts, Facebook servers keep copies of the information in those accounts indefinitely. Indeed, many users who have contacted Facebook to request that their accounts be deleted have not succeeded in erasing their records from the network.&lt;/p&gt;&lt;p&gt;“It’s like the Hotel California,” said Nipon Das, 34, a director at a biotechnology consulting firm in Manhattan, who tried unsuccessfully to delete his account this fall. “You can check out any time you like, but you can never leave.” &lt;/p&gt;&lt;p&gt;It took Mr. Das about two months and several e-mail exchanges with Facebook’s customer service representatives to erase most of his information from the site, which finally occurred after he sent an e-mail threatening legal action. But even after that, a reporter was able to find Mr. Das’s empty profile on Facebook and successfully sent him an e-mail message through the network.&lt;/p&gt;&lt;p&gt;In response to difficulties faced by ex-Facebook members, a cottage industry of unofficial help pages devoted to escaping Facebook has sprung up online — both outside and inside the network.&lt;/p&gt;&lt;p&gt;“I thought it was kind of strange that they save your information without telling you in a really clear way,” said Magnus Wallin, a 26-year-old patent examiner in Stockholm who founded a Facebook group, “How to permanently delete your facebook account.” The group has almost 4,300 members and is steadily growing.&lt;/p&gt;&lt;p&gt;The technological hurdles set by Facebook have a business rationale: they allow ex-Facebookers who choose to return the ability to resurrect their accounts effortlessly. According to an e-mail message from Amy Sezak, a spokeswoman for Facebook, “Deactivated accounts mean that a user can reactivate at any time and their information will be available again just as they left it.” &lt;/p&gt;&lt;p&gt;But it also means that disenchanted users cannot disappear from the site without leaving footprints. Facebook’s terms of use state that “you may remove your user content from the site at any time,” but also that “you acknowledge that the company may retain archived copies of your user content.” &lt;/p&gt;&lt;p&gt;Its privacy policy says that after someone deactivates an account, “removed information may persist in backup copies for a reasonable period of time.” &lt;/p&gt;&lt;p&gt;Facebook’s Web site does not inform departing users that they must delete information from their account in order to close it fully — meaning that they may unwittingly leave anything from e-mail addresses to credit card numbers sitting on Facebook servers. &lt;/p&gt;&lt;p&gt;Only people who contact Facebook’s customer service department are informed that they must painstakingly delete, line by line, all of the profile information, “wall” messages and group memberships they may have created within Facebook. &lt;/p&gt;&lt;p&gt;“Users can also have their account completely removed by deleting all of the data associated with their account and then deactivating it,” Ms. Sezak said in her message. “Users can then write to Facebook to request their account be deleted and their e-mail will be completely erased from the database.”&lt;/p&gt;&lt;p&gt;But even users who try to delete every piece of information they have ever written, sent or received via the network have found their efforts to permanently leave stymied. Other social networking sites like &lt;a href=&quot;http://topics.nytimes.com/top/news/business/companies/myspace_com/index.html?inline=nyt-org&quot; title=&quot;More articles about MySpace.com.&quot;&gt;MySpace&lt;/a&gt; and Friendster, as well as online dating sites like eHarmony.com, may require departing users to confirm their wishes several times — but in the end they offer a delete option.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;So if you have MySpace or Facebook account, be careful what you post, as it can and very well may be retrieved by friends, family or even potential employers.&lt;br /&gt;&lt;a href=&quot;http://www.nytimes.com/2008/02/11/technology/11facebook.html?_r=1&amp;amp;oref=slogin&quot;&gt;&lt;/a&gt;</description><link>http://www.itepistemology.com/2008/02/be-careful-what-you-post-online-world.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-1218929011792093667</guid><pubDate>Tue, 12 Feb 2008 21:23:00 +0000</pubDate><atom:updated>2008-02-13T00:13:36.765-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IBM</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>IBM Releases 2007 X-Force Security Report, Hackers Are Gaining Sophistication</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.net-security.org/images/articles/vulndiscloprery.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px;&quot; src=&quot;http://www.net-security.org/images/articles/vulndiscloprery.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;I spend a lot of time speaking my mind on the security problems the Information Technology sector faces in today&#39;s world, but I&#39;m not alone, Help Net Security has a nice post detailing the findings of IBM&#39;s 2007 X-Force Security report.  Today&#39;s IBM report revealed a disturbing rise in the sophistication of attacks by criminals on Web.&lt;br /&gt;&lt;br /&gt;Check out this from &lt;a href=&quot;http://www.google.com/search?q=drupal+dynamic+forms+module&amp;amp;sourceid=navclient-ff&amp;amp;ie=UTF-8&amp;amp;rlz=1B3GGGL_enUS222US222&amp;amp;aq=t&quot;&gt;Help Net Security - Report -  Web browsers under siege from organized crime:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;The Storm Worm, the most pervasive Internet attack last year, continues to infect computers around the world through a culmination of the threats the X-Force tracks, including malicious software (malware), spam and phishing.  Last year, delivery of malware was at an all time high, as X-Force reported a 30 percent rise in the number of malcode samples identified. The Storm Worm comprised around 13 percent of the entire malcode set collected in 2007.&lt;br /&gt;&lt;br /&gt;In other findings, for the first time ever, the size of spam emails decreased sharply to pre-2005 levels. X-Force believes the decrease is linked to the drop off of image-based spam. This decrease can be counted as a win for the security industry - as anti-spam technologies became more efficient at detecting image-based spam, spammers were forced to turn to new techniques.&lt;br /&gt;&lt;br /&gt;The X-Force has been cataloguing, analysing and researching vulnerability disclosures since 1997. With more than 33,000 security vulnerabilities catalogued, it has the largest vulnerability database in the world. This unique database helps X-Force researchers to understand the dynamics that make up vulnerability discovery and disclosure.&lt;br /&gt;&lt;br /&gt;The new X-Force report from IBM also reveals that:&lt;ul&gt;&lt;li&gt;The number of critical computer security vulnerabilities disclosed increased by 28 percent, a substantial upswing from years past.&lt;/li&gt;&lt;li&gt;The overall number of vulnerabilities reported for the year went down for the first time in 10 years.&lt;/li&gt;&lt;li&gt;Out of all the vulnerabilities disclosed last year, only 50 percent can be corrected through vendor patches.&lt;/li&gt;&lt;li&gt;Nearly 90 percent of 2007 disclosed vulnerabilities are remotely exploitable.&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;br /&gt;IBM estimates the Storm worm is netting just under $2 million per day for its creators which is a major incentive for hackers to create more and more similar attacks. The Worm&#39;s financial success comes the  massive collection of autonomously running computers (botnet) which then launch profitable spam campaigns.&lt;br /&gt;&lt;br /&gt;I have to admit if I were a little less scrupulous I would be tempted!!</description><link>http://www.itepistemology.com/2008/02/ibm-releases-2007-x-force-security.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-1825998168531901530</guid><pubDate>Wed, 06 Feb 2008 05:12:00 +0000</pubDate><atom:updated>2008-02-20T00:41:50.921-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Education</category><category domain="http://www.blogger.com/atom/ns#">H-1B</category><category domain="http://www.blogger.com/atom/ns#">Outsourcing</category><category domain="http://www.blogger.com/atom/ns#">Politics</category><title>Programmers Guild: BusinessWeek exposes how Industry really uses H-1b workers</title><description>If you&#39;ve read my blog you know that I believe the H-1B program is the source of the decline of the I.T. profession in the United States and the destruction of the I.T education system in the United States, and I would be remiss if I didn&#39;t bring you the latest stories on the H-1b program and how is is used and abused by America&#39;s I.T. industry, so I submit for your reading two stories on the issue.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://programmersguild.blogspot.com/2008/02/businessweek-exposes-how-industry.html&quot;&gt;Programmers Guild: BusinessWeek exposes how Industry really uses H-1b workers&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;Listening to &lt;a href=&quot;http://www.competeamerica.us/&quot;&gt;Compete America&lt;/a&gt; one would think that H-1b workers are the &quot;best and brightest&quot; in the world, contributing to &quot;U.S. global competiveness.&quot; But as the 1/31/08 BusinessWeek article &quot;&lt;b&gt;&lt;a href=&quot;http://www.businessweek.com/magazine/content/08_06/b4070057782750.htm&quot;&gt;Are H-1B Workers Getting Bilked?&lt;/a&gt;&lt;/b&gt;&quot; exposes, H-1b are being used by Indian consulting firms to bring in cheap labor, driving American consulting firms out of business, and displacing highly-skilled U.S. workers.&lt;br /&gt;&lt;br /&gt;First, Indian consulting firm Patni undercut American workers when DOL approved the labor condition applications for a &quot;prevailing wage&quot; of $44,000 per year. This is far below the &lt;a href=&quot;http://www.yoh.com/yoh_about/yoh_news/press_releases/pr_54.htm&quot;&gt;&quot;$45 to $80 per hour&quot; that the Yoh study found to be the average for U.S. workers&lt;/a&gt; with &quot;high demand&quot; skills, such as &quot;Database Administrator&quot; and &quot;Application Developer.&quot;&lt;br /&gt;&lt;br /&gt;What Patni didn&#39;t disclose was that the $44,000 &quot;salary&quot; presumed that their workers put in lots of overtime. Their base pay was only $11.72 an hour - they were expected to reach their &quot;salary&quot; by working overtime. But even with 23 days of overtime, one H-1b&#39;s annual pay worked out to only $35,305 in 2004.&lt;br /&gt;&lt;br /&gt;As State Farm in Bloomington Illinois was laying off their American staff, the &lt;a href=&quot;http://tinyurl.com/3yk5ug&quot;&gt;LCA Database reveals that Patni Computer Systems was bringing in hundreds of Indians on H-1b visas&lt;/a&gt; - many placed at State Farm. As mandated by the U.S. Congress, the Department of Labor rubber-stamped these LCAs (labor condition applications) for wages as low as $27,000 for computer programmers. H-1b workers must have a minimum of a BS degree and specialized skills.&lt;br /&gt;&lt;br /&gt;Many of the LCAs were filed by Dayanand Allapur, Vice President HRD 617-914-8367. Patni&#39;s main number Cambridge, MA is 617-914-8000&lt;br /&gt;&lt;br /&gt;Among the Americans who lost their jobs was George Moraetes. He reports having &quot;seen 4 - 5 H1-b&#39;s living in a one bedroom apartment&quot; and that the same pattern of H-1b usage was employed by GE.&lt;br /&gt;&lt;br /&gt;Contrary to helping the U.S. remain &quot;globally competitive,&quot; the top users of the H-1b program are Indian consulting firms. They are transferring U.S. jobs and technology back to India and increasing the U.S. trade deficit. Without the H-1b and L-1 visa programs much of this loss of U.S. tech leadership would not be possible.&lt;br /&gt;&lt;br /&gt;Patni is headquartered in Mumbai, India. Their website provides roadmaps for transferring manufacturing offshore: &lt;a href=&quot;http://www.patni.com/&quot;&gt;http://www.patni.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;The U.S. Congress needs to wake up to the imminent threat posed to the U.S. economy by shipping our manufacturing to China and now services to India. Or economy cannot sustain this growing trade deficit and gutting of U.S. infrastructure.&lt;/i&gt;&lt;/blockquote&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;a href=&quot;http://www.businessweek.com/magazine/content/08_06/b4070057782750.htm&quot;&gt;Businessweek - Are H-1B Workers Getting Bilked?&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;   &lt;p&gt; A few years ago, Vishal Goel had high hopes of moving from his native India to the U.S. to work as a computer programmer. He approached Patni Computer Systems, a Mumbai company that provides tech services to many American businesses, and Patni agreed to apply for a U.S. work visa on his behalf. By 2004, Goel was in Bloomington, Ill., working for Patni at State Farm Mutual Automobile Insurance, the largest car insurer in the country.   &lt;/p&gt;    &lt;p&gt;But this was no dream job come true. Goel&#39;s base salary was $23,310, about half the $44,000 that Patni had said it would pay on the visa application, according to a lawsuit he has filed against the company. When Goel complained, one official said that Patni would brand him a &quot;troublemaker&quot; and that his parents in India would be harassed unless he stopped, the suit alleges. Goel, who left Patni in 2005, filed suit in November, 2007, in federal court in Illinois. He&#39;s suing along with a former colleague, Peeush Goyal, who alleges he was subjected to similar treatment. Patni declined to comment, though in court documents it denies the charges.   &lt;/p&gt;    &lt;p&gt;Goel&#39;s is not an isolated case. A number of the most active users of the work-visa program, for what are known as H-1B visas, have been accused of underpaying or otherwise mistreating workers. Last year, Patni paid $2.4 million to 607 H-1B visa workers after a Labor Dept. investigation uncovered systematic underpayment of wages. &quot;I highly suspect that these employment practices are widespread among the tech-outsourcing firms,&quot; says Ron Hira, assistant professor of public policy at Rochester Institute of Technology, who will testify as an expert witness in the Goel case.   &lt;/p&gt;    &lt;p&gt;The Goel lawsuit is one of the first filed in U.S. courts by a visa worker against his employer, perhaps because of the murky legal status of such workers. The estimated 500,000 people in the U.S. on H-1Bs are by definition citizens of other nations, and they&#39;re usually beholden to employers that can transfer them home at will. The Goel case provides rare insight into how one outfit allegedly has treated workers it brings into the U.S.   &lt;/p&gt;    &lt;h3&gt;SIMPLE GREED&lt;/h3&gt;    &lt;p&gt;In their case, Goel and Goyal say that Patni regularly underpays employees in the U.S. &quot;This forces the same financially strapped individuals ... to incur the expense of retaining an attorney to try and obtain the money to which they are entitled,&quot; the suit charges. If workers complain, the plaintiffs say, Patni threatens to sue them. They charge that Patni&#39;s motivation is simple greed. &quot;The more H-1B employees that Patni is underpaying, the more total profit that is made by Patni,&quot; the suit alleges.   &lt;/p&gt;    &lt;p&gt;Goel, Goyal, and their lawyer, Thomas J. Arkell, declined to comment for this article because the litigation is ongoing. Patni says in court papers it didn&#39;t promise Goel $44,000 and says he has no &quot;right to action&quot; because he has no claim under the laws cited in the case.   &lt;/p&gt;    &lt;p&gt;The Goel lawsuit raises questions for U.S. workers, too. The H-1B program requires companies that bring employees into the U.S. to pay the prevailing wage in that job, so as not to depress the salaries of Americans in similar occupations. Documents filed in the suit appear to show that Patni told the Labor Dept. it would pay Goel a base salary of $44,000, which it said was more than the $43,867 prevailing wage it determined for a midlevel programmer and analyst. Yet even after working the equivalent of 23 days of overtime at $11.72 an hour, Goel earned a total of $35,305 in 2004. &quot;Patni&#39;s underpayment of wages not only harms its H-1B employees but also harms the wages of U.S. employees,&quot; the lawsuit charges.   &lt;/p&gt;    &lt;p&gt;Many prominent U.S. companies use outsourcers, especially for tech services and support. Patni&#39;s largest client is General Electric (&lt;a href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?symbol=GE&quot; rel=&quot;ticker&quot;&gt;GE&lt;/a&gt;). Others include MetLife (&lt;a href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?symbol=MET&quot; rel=&quot;ticker&quot;&gt;MET&lt;/a&gt;) and St. Jude Medical. GE and MetLife declined to comment on Patni and whether they monitor how it manages its workers. St. Jude says it advocates for contract workers who file complaints, although no Patni workers have done so.   &lt;/p&gt;    &lt;p&gt;State Farm has turned increasingly to Patni and is now its No. 2 client. Dick Luedke, a State Farm spokesman, says that visa workers receive fair treatment. &quot;Working conditions at all our State Farm locations are monitored and maintained without distinction of State Farm or vendor employee,&quot; he says. &quot;We of course negotiate how much we pay the vendor; what the vendor does to get the work done is up to the vendor.&quot; According to the Goel suit, State Farm paid Patni &quot;in excess of&quot; $100,000 per worker.   &lt;/p&gt;    &lt;p&gt;State Farm has had layoffs as it has brought in Patni workers. Outplacement specialist Challenger, Gray &amp;amp; Christmas says the insurer has let go 10,000 workers nationwide since 1995, though Luedke says only one quarter of those were &quot;involuntary severances.&quot; He says Patni employees have not replaced staffers and the insurer&#39;s own IT staff has risen from 5,500 in 1995 to 5,900 in 2007. Luedke says State Farm doesn&#39;t track how many outsourced workers it uses.   &lt;/p&gt;    &lt;p&gt;George Moraetes is a U.S. worker who believes he was affected by the H1-B program. A specialist in info tech security, he worked at State Farm from 2002 to 2004, when the company declined to extend his contract. Now in Chicago, he&#39;s unable to find a staff position in his specialty. &quot;The whole industry is being outsourced and contracted,&quot; he says. &quot;The American IT worker is a dying breed.&quot;   &lt;/p&gt;    &lt;p&gt;Moraetes has empathy, not anger, for employees such as Goel who come to the U.S. on H-1Bs. &quot;The workers are living in squalor,&quot; he says. &quot;I feel sorry for them.&quot;   &lt;/p&gt;    &lt;p&gt;The H-1B program could get an overhaul later this year. Senators Richard J. Durbin (D-Ill.) and Charles E. Grassley (R-Iowa) have proposed reforms because of what they consider widespread abuse. &quot;There are simply too many loopholes that companies can use to get around the original intent of the H-1B visa,&quot; says Grassley in an e-mail.   &lt;/p&gt;    &lt;p&gt;As for Goel, he hasn&#39;t given up on his dream of living in the U.S. He&#39;s in California with another employer serving as his visa sponsor. His case is expected to go to trial later this year.   &lt;/p&gt;    &lt;p&gt;   &lt;/p&gt;   &lt;div class=&quot;magLinks&quot;&gt;&lt;h3&gt;Links&lt;/h3&gt;&lt;h4&gt;More Harm Than Good?&lt;/h4&gt;&lt;p&gt;In his paper &quot;Outsourcing America&#39;s Technology and Knowledge Jobs,&quot; Ron Hira, a Rochester Institute of Technology assistant professor, argues that U. S. visa programs for overseas workers hurt the wages and job security of U.S. tech workers. Expanding the number of visas, Hira contends, &quot;would directly lead to more offshore outsourcing of jobs, displacement of American technology workers, decreased wages and job opportunities, and the discouragement of young people from entering science and engineering fields.&quot;&lt;/p&gt;&lt;/div&gt; &lt;/blockquote&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;Wake up American, we cannot remain great if we have to depend on other countries to educate and supply people so critical to our economies wellbeing.&lt;/span&gt;</description><link>http://www.itepistemology.com/2008/02/programmers-guild-businessweek-exposes.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-4147021722270416754</guid><pubDate>Wed, 06 Feb 2008 02:47:00 +0000</pubDate><atom:updated>2008-02-07T00:27:53.774-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Politics</category><title>Presidential candidates positions on tech positions</title><description>As the presidential candidate pools shrinks their positions on issues important to us techies become more and more important.  To feed your need to know check out&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.infoworld.com/article/08/02/05/Presidential-candidates-stake-out-tech-positions_1.html?source=rss&amp;amp;url=http://www.infoworld.com/article/08/02/05/Presidential-candidates-stake-out-tech-positions_1.html&quot;&gt;InfoWorlds - Presidential candidates stake out tech positions:&lt;/a&gt;&lt;br /&gt;&lt;p page=&quot;1&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p page=&quot;1&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;Senator Hillary Clinton&lt;br /&gt;&lt;/strong&gt;New York Democrat Clinton, like other candidates, hasn&#39;t made tech issues a central part of her campaign, but she has championed an &quot; &lt;a href=&quot;http://www.hillaryclinton.com/feature/innovation/&quot;&gt;innovation agenda&lt;/a&gt;&quot; as one of her top issues. That agenda includes several policies that many large tech companies have embraced.&lt;/p&gt;&lt;p page=&quot;1&quot; class=&quot;ArticleBody&quot;&gt;Clinton wants to pump up the basic research budgets at the National Science Foundation, the Department of Energy&#39;s Office of Science, and the Department of Defense by 50 percent over 10 years.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;She also would require that federal research agencies set aside at least 8 percent of their research budgets for discretionary funding of high-risk research, and she would increase funding for research on Internet- and IT-based tools, including supercomputing and simulation software.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;&quot;Under the Bush administration, agencies like the Defense Advance Research Projects Agency (DARPA) have reduced support for truly revolutionary research,&quot; Clinton&#39;s Web site says. &quot;This is a problem because DARPA has played a major role in maintaining America&#39;s economic and military leadership. DARPA backed such projects as the Internet, stealth technology, and the Global Positioning System.&quot;&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;Clinton also wants tax incentives to encourage broadband providers to deploy services in underserved areas. She has called for federal support of state and local broadband programs, including municipal broadband projects. Clinton has also called for a research-and-development tax credit, extended temporarily multiple times since 1981, to be made permanent.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;Clinton has said she would support net neutrality regulations for U.S. broadband providers.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;Former Governor Mike Huckabee&lt;br /&gt;&lt;/strong&gt;Huckabee, an Arkansas Republican and ordained Baptist minister, has largely ignored tech issues during his campaign.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;He has, however, called for an increase in immigrant visas for highly skilled and highly educated workers, a position shared by many large tech companies. Otherwise, Huckabee would largely shut down U.S. borders to immigrants.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;Instead of technology, Huckabee has focused on social issues such as making abortion illegal and defining marriage as only between a man and a woman.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;Huckabee also wants the United States to achieve independence from oil-producing nations.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;Senator John McCain&lt;br /&gt;&lt;/strong&gt;The Arizona Republican is a longtime member of the Senate Commerce Committee. As such, he can argue that he has the most tech policy experience of any of the remaining major-party candidates.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;In recent years, McCain has pushed for a nationwide voice and data network for public safety agencies. He was one of the Senate&#39;s leading voices in the effort to get U.S. television stations to give up part of their analog spectrum for use by police and fire departments. The rest of that spectrum is being sold in the &lt;a href=&quot;http://www.infoworld.com/article/08/01/25/700MHz-auction-bids-total-3.2-billion_1.html&quot;&gt;FCC&#39;s auctions now under way&lt;/a&gt;.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;McCain has been noncommittal about net neutrality laws. He&#39;s said he&#39;d be concerned if Internet users&#39; access is blocked, but he&#39;s also suggested broadband carriers need to recoup their investments.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;McCain last year also called for an increase in government research and development spending, and he&#39;s said he&#39;d draft &quot;the best and the brightest&quot; of American CEOs to work in his administration if he were elected, including Cisco Systems&#39; John Chambers and Microsoft&#39;s Steve Ballmer.&lt;/p&gt;&lt;p page=&quot;2&quot; class=&quot;ArticleBody&quot;&gt;He has also supported efforts to make an Internet tax moratorium permanent, recently calling the Internet &quot;likely the most popular invention since the light bulb.&quot; In 2004, he urged the Federal Trade Commission to focus more of its efforts on fighting spam.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;In 2005, McCain split from many other Republicans by authoring legislation that would prohibit states from outlawing municipal broadband projects. McCain said then he was concerned that the United States has fallen behind more than a dozen other countries on broadband adoption.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;Senator Barack Obama&lt;br /&gt;&lt;/strong&gt;The Illinois Democrat in November released an extensive &lt;a href=&quot;http://obama.3cdn.net/780e0e91ccb6cdbf6e_6udymvin7.pdf&quot;&gt;tech policy paper&lt;/a&gt;, earning him praise from several tech groups.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Obama gets technology, said Julius Genachowski, co-founder of Rock Creek Ventures and a longtime friend. &quot;He will be a true 21st-century president, using technology to improve the lives of all Americans,&quot; Genachowski said at a tech forum last week.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;In the tech agenda, Obama called for net neutrality regulations for broadband carriers. &quot;Users must be free to access content, to use applications, and to attach personal devices,&quot; he said in his tech policy.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Parents need better tools and information to control what their children see on the Internet and television, he said.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;He called for greater privacy protections for all U.S. residents, including Internet users, and he said government and businesses should be held accountable for privacy violations. He wants an update of government surveillance laws that allow intelligence-gathering on U.S. citizens to be done &quot;only under the rule of law.&quot;&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Obama would also increase the Federal Trade Commission&#39;s enforcement budget and focus increased international cooperation to track down cybercriminals.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Obama also wants to make government data more available online. He would revamp a number of existing programs and create some new ones to help roll out broadband in the United States. He called for a review of wireless spectrum use in the United States and said he would &quot;confront the entrenched Washington interests that have kept our public airwaves from being maximized for the public&#39;s interest.&quot;&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;He has pledged to make the research-and-development tax credit permanent. He also called for patent reform, primarily by giving the U.S. Patent and Trademark Office more resources to improve patent quality.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;&lt;strong&gt;Former Governor Mitt Romney&lt;br /&gt;&lt;/strong&gt;Romney, a Massachusetts Republican, hasn&#39;t made many tech issues a central part of his campaign, but he has focused on U.S. competitiveness, a popular issue for many IT companies.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Romney&#39;s competitiveness initiative would seek to improve U.S. schools and at the same time cut individual and corporate tax rates. He wants to improve worker retraining programs by consolidating and streamlining numerous federal programs.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;He has taken positions on a couple of other tech-related issues as well. In interviews Romney has expressed support for a permanent Internet tax ban, and he&#39;s said he supports free trade, a position echoed by many large tech vendors.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;Romney has also said he would support an increase in H-1B visas for high-skilled workers.&lt;/p&gt;&lt;p page=&quot;3&quot; class=&quot;ArticleBody&quot;&gt;&quot;I like the idea of the best and brightest in the world coming here,&quot; he told the &lt;a href=&quot;http://www.techcrunch.com/2007/11/01/mitt-romney/&quot;&gt;TechCrunch blog&lt;/a&gt; in November. &quot;I&#39;d rather have them come here permanently rather than come and go, but I believe our visa program is designed to help us solve gaps in our employment pool. Where there are individuals who have skills that we do not have in abundance here, I&#39;d like to bring them here and contribute to our economy.&quot;&lt;/p&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2008/02/presidential-candidates-positions-on.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3932358402174525676</guid><pubDate>Wed, 06 Feb 2008 02:30:00 +0000</pubDate><atom:updated>2008-02-05T20:37:29.705-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Politics</category><title>Where Are I.T. Budgets Increasing? The Federal Government Of Course</title><description>In todays I.T. environment of &lt;a href=&quot;http://www.itepistemology.com/2008/01/times-is-predicting-it-belt-tightening.html&quot;&gt;shrinking budgets&lt;/a&gt;, it might be a good time to look around at where I.T. budgets might actually be growing and the guys at ZDNet have done at least some of our work for us,  and guess what they found in the new federal budget released yesterday.  There are branches within the government with big boosts in spending check out &lt;a href=&quot;http://blogs.zdnet.com/BTL/?p=7888&quot;&gt;ZDNet -  Parsing the federal budget: The tech highlights&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;President Bush unveiled his $3.1 trillion–yes trillion–fiscal 2009 budget and there are a lot of technology highlights to go around. &lt;p&gt;Whether this budget ever gets approved anywhere near its current state remains to be seen (fiscal 2008’s budget isn’t official), but directionally there are some key highlights. Among the items that may warrant further inspection.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The National Science Foundation&lt;/strong&gt; is recommended to receive $397 million for nanotechnology research and facilities to understand “those devices and materials with revolutionary properties.”&lt;/p&gt; &lt;p&gt;The budget also recommends that the NSF gets:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;$1.1 billion for fundamental information technology research and cutting-edge supercomputing and networking resources, including: $100 million, an 110-percent increase, for an NSF-wide effort to develop radically new computational concepts and tools; and $30 million for a new targeted cyber-security research effort in privacy, fundamental theory, and usability.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Overall, the &lt;a href=&quot;http://www.whitehouse.gov/omb/budget/fy2009/nsf.html&quot;&gt;NSF’s 2009 budget&lt;/a&gt; is an estimated $6.85 billion, up from $6 billion estimated for 2008.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The Department of Veteran Affairs&lt;/strong&gt; is getting a major IT spending bump. The VA’s IT spending was $1.2 billion in 2007 and is slated to jump to $1.98 billion in 2008. In fiscal 2009, &lt;a href=&quot;http://www.whitehouse.gov/omb/budget/fy2009/veterans.html&quot;&gt;the VA is slated for $2.44 billion&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;NASA&lt;/strong&gt; has a $1 billion &lt;a href=&quot;http://www.whitehouse.gov/omb/budget/fy2009/nasa.html&quot;&gt;fiscal 2009 budget&lt;/a&gt; for the Orion Crew Exploration Vehicle, a piloted spacecraft to land anywhere on the Moon. Another $1 billion is for the Ares I Crew Launch Vehicle–the rocket that will launch Orion. NASA is expected to blow $5.1 billion on operating the International Space Station and flying the Space Shuttle to the station in 2009.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The Department of Commerce budget&lt;/strong&gt; “provides $634 million for investments in quantum and neutron research, nanotechnology, and related scientific work at the National Institute of Standards and Technology, a 20-percent increase over the 2008 enacted level, excluding earmarks and unrequested grants.”&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://blogs.zdnet.com/security/?p=851&quot;&gt;And as previously noted&lt;/a&gt;, US-CERT is getting $242 million to better monitor cyberattacks.&lt;/p&gt;&lt;br /&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2008/02/where-are-it-budgets-increasing-federal.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3602237527201427513</guid><pubDate>Sun, 27 Jan 2008 04:35:00 +0000</pubDate><atom:updated>2008-02-05T20:34:50.152-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>&quot;Work From Home&quot; Generation Lists Good And Bad</title><description>The ReadWriteWeb blog has come up with their lists of both good things and bad thinks about working at home, It&#39;s a good read for any one currently working from home or wishing they were.&lt;br /&gt;&lt;br /&gt;It might just strike a nerve, here are the highlights, &lt;a href=&quot;http://www.readwriteweb.com/archives/the_work_from_home_generation.php&quot;&gt;each explained in detail in their post&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The Good things About Working from Home&lt;br /&gt;&lt;blockquote&gt;1. No commute&lt;br /&gt;2. Flexibility&lt;br /&gt;3. Saving money and the environment&lt;br /&gt;4. Increased productivity&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;The Bad Things About Working from Home&lt;br /&gt;&lt;blockquote&gt;1. Brainstorming is difficult&lt;br /&gt;2. You never leave work&lt;br /&gt;3. Entropy is after you&lt;/blockquote&gt;For more read, &lt;a href=&quot;http://www.readwriteweb.com/archives/the_work_from_home_generation.php&quot;&gt;The &quot;Work From Home&quot; Generation - ReadWriteWeb&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;For decades in American households the most dreaded morning sound was that of an alarm clock. Sometime between 6 and 7am a beep or radio music signaled that it was time to get up and head to work. But in the early 21st century two things have begun to change. First, the alarm clock is going off a little bit later. And second, instead of putting on suits and driving to work, people are heading to the basement in their pajamas and turning on their personal computers. These are the early days of the new &lt;em&gt;Work From Home&lt;/em&gt; generation.     &lt;div id=&quot;more&quot; class=&quot;asset-more&quot;&gt; &lt;p&gt;With the invention of modern laptops, ubiqity of broadband Internet access, and advances in communication software, there is no longer a need to be in the office. At least not everyday. Thousands of companies are rolling out work from home policies and hundreds of thousands of people are starting to take advantage of them. What are the pros and cons of working from home? In this post we take a close look, as well as discuss what lies ahead for this new, rapidly growing generation.&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div id=&quot;more&quot; class=&quot;asset-more&quot;&gt;....&lt;br /&gt;&lt;blockquote&gt;&lt;h2&gt;What&#39;s Next?&lt;/h2&gt;  &lt;p&gt;There are certainly challenges to working from home, but the benefits out-weigh them for many people. More companies and people are beginning to discover that working from home does more good than bad, as it introduces flexibility into people&#39;s schedule without impacting their productivity. The bottom line is that things get done and people are happier.&lt;/p&gt;  &lt;p&gt;In terms of innovation and the technologies that are likely to evolve to help support work from home environments, there are several areas. We have previously written about basic &lt;a href=&quot;http://www.readwriteweb.com/archives/software_for_virtual_teams.php&quot;&gt;software for virtual teams&lt;/a&gt;, as well as how to &lt;a href=&quot;http://www.readwriteweb.com/archives/rolling_your_own_online_office.php&quot;&gt;assemble an online office&lt;/a&gt;. But there is still certainly a lot of room for better tools for the at home workforce. From better brainstorming tools to video conferencing there are opportunities to innovate to make virtual collaboration smooth and painless.&lt;/p&gt;  &lt;p&gt;And now, as always, we&#39;d love to hear your input. Are you working from home now? If not, would you like to? What do you think are the pros and cons of working from home?&lt;/p&gt;  &lt;/blockquote&gt;&lt;/div&gt;</description><link>http://www.itepistemology.com/2008/01/work-from-home-generation-lists-good.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-2204834497137562013</guid><pubDate>Sun, 27 Jan 2008 03:46:00 +0000</pubDate><atom:updated>2008-02-05T20:37:51.748-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Politics</category><title>The Over 50 Worker, Is Their Room In Information Technology?</title><description>I&#39;m a big fan of Diane Stafford, and what she has to say about the value of the older worker, maybe because I&#39;m resembling one more and more every day.  The older worker has a lot to offer, especially in the information technology field, but I.T employers are more interested in the current training of employee, not their experience. &lt;br /&gt;&lt;br /&gt;Talk a look at her post &lt;a href=&quot;http://workspacekc.typepad.com/workspace_by_diane_staffo/2008/01/seeking-the-ove.html&quot;&gt;Workspace by Diane Stafford: Seeking the over-50 worker&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;A couple of weeks ago I wrote a careers column for &lt;em&gt;The Kansas City Star&lt;/em&gt; about the AARP program that lists employers deemed to be open to hiring older workers.  &lt;p&gt;Judging from followup calls and e-mails, there are plenty of over-50 workers in frustrating job searches. I heard quite a bit of skepticism that the companies would actually hire them. &lt;/p&gt;  &lt;p&gt;That may be the case, but here&#39;s my take on the list: No employer would set itself up as an older-worker-friendly company if it didn&#39;t actually intend to spend the time and money following through with considering applications fairly.&lt;/p&gt;  &lt;p&gt;What&#39;s in it for them by saying they&#39;re open to hiring the over-50s if they&#39;re really not? They&#39;re just setting themselves to get a bucketload of resumes, and most companies, thanks to the internet, already are suffering from an excess of applicants. Why invite more, especially when they know they&#39;re appealing to a job-hunting group that feels shut out in the broad job market.&lt;/p&gt;  &lt;p&gt;So, I&#39;ll take the list at its promised face value -- as a resource tool for the older job hunter. And I&#39;ll share the latest news about the AARP list: They&#39;ve added some more employers.&lt;/p&gt;  &lt;p&gt;Three of the new entries are federal government agencies: The Peace Corps, the Internal Revenue Service, and the U.S. Small Business Administration&#39;s Office of Disaster Relief. (Federal job openings are listed and searchable at &lt;a href=&quot;http://www.usajobs.gov/&quot;&gt;www.usajobs.gov&lt;/a&gt;.)&lt;/p&gt;  &lt;p&gt;New private-sector employers on the AARP list are: AnswerNet, Bright Horizons Family Solutions, Home Instead Senior Care, Scripps Health, Synergy HomeCare, and Vedior North America.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://www.aarp.org/money/careers/findingajob/featuredemployers/info.html&quot;&gt;http://www.aarp.org/money/careers/findingajob/featuredemployers/info.html&lt;/a&gt; is the site for the AARP list.&lt;/p&gt;&lt;br /&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2008/01/over-50-worker-is-their-room-in.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-7133449870815254843</guid><pubDate>Sun, 27 Jan 2008 03:35:00 +0000</pubDate><atom:updated>2008-02-05T20:36:00.786-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Politics</category><title>Times Is Predicting a I.T. Belt Tightening This Year</title><description>Well, Looks like it&#39;s Belt Tightening time again, the New York Times is reporting that Tech spending won&#39;t grow at the rate that it has the past few years,  about 7% and will instead be held to a much more modest increase of about 4%.&lt;br /&gt;&lt;br /&gt;I wonder what clued them in, perhaps last weeks global stock drop?&lt;br /&gt;&lt;br /&gt;I personally think that as time goes on this year, the movement to cloud computing, which means massive consolidation of computing resources with make up most if not all of the missing 3%.  So I for one don&#39;t believe that hard times are coming through out the industry.&lt;br /&gt;&lt;br /&gt;Check out the story in &lt;a href=&quot;http://www.nytimes.com/2008/01/26/technology/26spend.html&quot;&gt;New York Times - &lt;/a&gt;&lt;a href=&quot;http://www.nytimes.com/2008/01/26/technology/26spend.html&quot;&gt;Belt-Tightening, but No Collapse, Is Forecast in Technology Spending:&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;In the consumer economy, the Main Street  shopper leads the way. In the corporate economy, big technology buyers like Monte &lt;a href=&quot;http://topics.nytimes.com/top/news/business/companies/ford_motor_company/index.html?inline=nyt-org&quot; title=&quot;More information about Ford Motor Company&quot;&gt;Ford&lt;/a&gt; will determine the arc of business spending in the coming months. &lt;/p&gt; &lt;p&gt;The decisions of Mr. Ford, the chief information officer of American Airlines, and his peers across corporate America matter a lot, because information technology looms so large in the modern economy. Today, purchases of computer hardware and software account for half of all capital spending by businesses.&lt;/p&gt; &lt;p&gt;Will falling corporate investment be the next shoe to drop on the way to a recession, or will it hold up enough to help steady the economy?&lt;/p&gt; &lt;p&gt;The outlook is encouraging, according to corporate technology buyers and industry analysts. There will surely be belt-tightening, and cuts may be sharp in some industries, especially the financial sector. Overall growth in technology spending may fall from 7 percent last year to 4 percent or less this year, according to estimates by IDC, a research firm. &lt;/p&gt; &lt;p&gt;That would be in sharp contrast to the experience of the 2001 recession, when technology spending fell 11 percent over two years in the aftermath of the dot-com collapse. During the boom years, the mentality was to spend on technology and hope for a payoff. But in recent years, corporate technology managers have been far more disciplined spenders, measuring results to prove that investments in technology really can cut costs, increase productivity and lift sales.&lt;/p&gt; &lt;p&gt;So the cutbacks in this downturn, analysts say, should be modest — reassuring news for the economy. “This is a reason for optimism that if there is a recession, it will be a mild one,” said Mark Zandi, chief economist at &lt;a href=&quot;http://topics.nytimes.com/top/news/business/companies/moodys_corporation/index.html?inline=nyt-org&quot; title=&quot;More information about Moody&#39;s Corporation.&quot;&gt;Moody’s&lt;/a&gt; &lt;a href=&quot;http://economy.com/&quot; target=&quot;_&quot;&gt;Economy.com&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;At American Airlines, a unit of &lt;a href=&quot;http://www.nytimes.com/mem/MWredirect.html?MW=http://custom.marketwatch.com/custom/nyt-com/html-companyprofile.asp&amp;amp;symb=AMR&quot; title=&quot;AMR&quot;&gt;AMR&lt;/a&gt;, Mr. Ford doubts that the current downturn could be worse for the airlines than the falloff after the 9/11 terrorist attacks — “a gigantic economic crack for our industry,” he said. The company decided then that despite cutbacks elsewhere, it would not sharply pare its technology budget. This year, he plans to spend modestly more — a few percent — than last year. &lt;/p&gt; &lt;p&gt;To explain, Mr. Ford points to three major costs for an airline: people, planes and fuel. “Technology remains the best lever for getting more value from all those, making your employees more productive, making better use of your fleet and increasing your fuel efficiency,” he said.&lt;/p&gt; &lt;p&gt;That view, Mr. Ford said, is supported by results. A fuel efficiency drive begun in 2005, including software to tailor routes, flight paths, even baggage loading, has reduced fuel consumption by an estimated 96 million gallons a year.&lt;/p&gt; &lt;p&gt;At &lt;a href=&quot;http://topics.nytimes.com/top/news/business/companies/pitney_bowes_inc/index.html?inline=nyt-org&quot; title=&quot;More information about Pitney Bowes Inc.&quot;&gt;Pitney Bowes&lt;/a&gt;, a maker of mail handling equipment and marketing services, Gregory E. Buoncontri, the chief information officer, expects his budget this year to be roughly $180 million, about the same as last year. Despite the economic slowdown, Pitney Bowes will make some targeted new investments that the senior management team has agreed are priorities to help the company become more competitive. The priority projects, Mr. Buoncontri said, include analytics programs that sort through customer data to predict promising sales opportunities and to improve customer service.&lt;/p&gt; &lt;p&gt;“You only want to start projects you are dead-serious about,” he said. “A downturn really heightens that discipline.”&lt;/p&gt; &lt;p&gt;To make room for spending on new things, managers must make cuts in the spending for basic operations. The preferred way to do that is to trim the budget for routine things like replacing personal computers, issuing employees mobile devices like BlackBerrys and putting off upgrades to new desktop software like &lt;a href=&quot;http://topics.nytimes.com/top/news/business/companies/microsoft_corporation/index.html?inline=nyt-org&quot; title=&quot;More information about Microsoft Corporation&quot;&gt;Microsoft&lt;/a&gt;’s Windows Vista operating system or Office 2007 programs.&lt;/p&gt; &lt;p&gt;“You adopt the mentality of a small-business owner for those kinds of things — you just want to avoid writing a check,” said Jack Santos, an analyst at the &lt;a href=&quot;http://www.nytimes.com/mem/MWredirect.html?MW=http://custom.marketwatch.com/custom/nyt-com/html-companyprofile.asp&amp;amp;symb=BURUY&quot; title=&quot;Burton Group&quot;&gt;Burton Group&lt;/a&gt;, a technology research firm.&lt;/p&gt; &lt;p&gt;In a survey of 300 chief information officers last month, IDC found that personal computers and mobile devices were the hardware products that would face spending cuts first, said Stephen Minton, an IDC analyst. The software products at the top of the budget-cutting list were office programs and desktop operating systems.&lt;/p&gt; &lt;p&gt;Microsoft this week reported strong quarterly results, led by its big desktop software businesses. But the C.I.O. survey suggests a slowdown in sales, especially in the United States, if the economy falters. &lt;/p&gt; &lt;p&gt;Technology spending, if managed prudently, can also deliver new abilities and productivity without more dollars, executives say. With processing speeds and storage capacity doubling every 18 months or so, each generation of technology is faster, cheaper and smaller than its predecessor.&lt;/p&gt; &lt;p&gt;So, according to Frank Modruson, chief information officer for  &lt;a href=&quot;http://www.nytimes.com/mem/MWredirect.html?MW=http://custom.marketwatch.com/custom/nyt-com/html-companyprofile.asp&amp;amp;symb=ACN&quot; title=&quot;Accenture&quot;&gt;Accenture&lt;/a&gt;, a real danger during an economic downturn is adopting a rigid austerity that saddles a company with technology that is behind the curve. Steady investment, he said, can save money fairly quickly because of the rapid pace of improvement in computing technology.&lt;/p&gt; &lt;p&gt;Accenture, a technology services company, spends less on technology today than it did in 2001, even though its payroll has more than doubled to 175,000 employees worldwide. “The reason we could do that is that we invested during the last downturn,” Mr. Modruson said.&lt;/p&gt; &lt;p&gt;Companies are likely to find that it is smart to make new investments as long as their overall technology spending is under control. In a recent survey of large companies, Gartner found that technology budgets have increased an average of 2.8 percent annually in the last three years. By contrast, spending at those companies in the three years leading up to the 2001 recession had grown 12.9 percent a year.&lt;/p&gt; &lt;p&gt;“Information technology spending,” said Mark McDonald, an analyst at Gartner, “is not the rich target for cuts that it was in 2001.”&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;</description><link>http://www.itepistemology.com/2008/01/times-is-predicting-it-belt-tightening.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-5667088508938590247</guid><pubDate>Mon, 21 Jan 2008 22:08:00 +0000</pubDate><atom:updated>2008-02-05T20:35:17.751-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>The Stocks Are Falling! The Stocks Are Falling! What Can You Do?</title><description>Have you seen what has been going on in the &lt;a href=&quot;http://news.yahoo.com/s/ap/20080122/ap_on_bi_ge/world_markets&quot;&gt;overseas stock markets today&lt;/a&gt;, wow, 6 to 10% drops across the board.   I don&#39;t know about you but I starting to think 2008 might be a tough year everywhere, and maybe we should start looking to Recession Proof ourselves as much as possible.&lt;br /&gt;&lt;br /&gt;So I took a quick look around and I found this at Web Worker Daily, one of my favorite sources for helpful tips.   Take a look at what they had to say in &lt;a href=&quot;http://webworkerdaily.com/2008/01/21/recession-proof-your-career/&quot;&gt;Web Worker Daily - Archive 5 Ways to Recession-Proof Your Career &lt;/a&gt;:&lt;br /&gt;&lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;We could &lt;a href=&quot;http://www.marketwatch.com/news/story/odds-us-recession/story.aspx?guid=%7B80BE41BE%2DBCF3%2D4EFB%2D82F7%2DD2649FB6B67A%7D&quot;&gt;already be suffering a recession in the U.S.&lt;/a&gt;, and the tech industry is not immune, as &lt;a href=&quot;http://www.alleyinsider.com/2008/01/yahoo-yhoo-more-on-layoffs-jerry-and-turnaround.html&quot;&gt;potential Yahoo! layoffs&lt;/a&gt; show. What should you be doing now to protect yourself?&lt;/p&gt; &lt;p&gt;&lt;b&gt;Keep building that &lt;a href=&quot;http://webworkerdaily.com/2007/03/28/why-you-may-need-an-online-persona/&quot;&gt;online persona&lt;/a&gt;&lt;/b&gt;. Share who you are and what you’re about online — through a blog or other means. &lt;a href=&quot;http://webworkerdaily.com/2007/01/31/ask-wwd-how-do-i-find-customers/&quot;&gt;Raising your professional profile online&lt;/a&gt; is one of the best ways to attract new job and business opportunities your way. Don’t just create an online version of a resume; get active and connected online.&lt;/p&gt; &lt;p&gt;&lt;span id=&quot;more-1658&quot;&gt;&lt;/span&gt;&lt;b&gt;Create additional income streams, even if you are an employee&lt;/b&gt;. Or perhaps especially if you are an employee — because your salary is vulnerable to disappearing all at once, while freelancers and business owners usually have multiple clients.&lt;/p&gt; &lt;p&gt;How can you create additional streams of income? Find a side job as a freelancer (be careful not to break any of your employer’s noncompete policies by doing so), start an ad-supported blog, sell products online, or offer consulting services in your field of expertise. While none of these things will — at least initially — make enough money to replace a full-time-with-bennies job, they can cushion the pain of income loss while teaching you new skills and growing your professional network.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Stay aware of what the market wants&lt;/b&gt;. Even during a recession, jobs go begging when employers can’t find people with the right skills. Even if you’re not looking for a job or more contract work right now, subscribe to Craigslist job listing feeds using searches that match what kind of positions might interest you. You’ll keep yourself informed as to what skills you might need to add to your arsenal, what companies are hiring in your area, and whether hires in your field are trending up or down.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Invest in human capital&lt;/b&gt;. In other words, beef up your skills. You don’t have to spend money on classes to do so, though that might be the easiest way to learn the basics of something unfamiliar to you. You can spend your time: find an unpaid internship with training as your compensation, do volunteer work for a nonprofit, get involved in an open source effort, or start your own just-for-learning-purposes project.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Create social capital too&lt;/b&gt;. If you do lose your job or a major client, your next one may very well come through your online network of friends and associates. Your online social network can not only help find new opportunities just when you need them, it can also provide emotional support when you go through tough times. Not sure exactly how to go about creating social capital? Here are &lt;a href=&quot;http://webworkerdaily.com/2007/08/06/how-to-network-like-a-human-not-a-computer/&quot;&gt;some tips for networking like a human&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;i&gt;For more tips on recession-proofing your career, see Robert Scoble’s article from December “&lt;a href=&quot;http://scobleizer.com/2007/12/15/surviving-the-2008-recession/&quot;&gt;Surviving the 2008 recession&lt;/a&gt;” and Penelope Trunk’s article posted today “&lt;a href=&quot;http://blog.penelopetrunk.com/2008/01/21/maybe-there-will-be-a-recession-heres-what-to-do-just-in-case/&quot;&gt;Maybe there will be a recession. Here’s what to do just in case&lt;/a&gt;.”&lt;/i&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt; &lt;/div&gt;I really hope that in a week/month/year and remember this post and think how wrong I was, but as for what I see today, I don&#39;t think so.</description><link>http://www.itepistemology.com/2008/01/stocks-are-falling-stocks-are-falling.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3616644413912245724</guid><pubDate>Mon, 21 Jan 2008 04:53:00 +0000</pubDate><atom:updated>2008-02-05T20:38:08.274-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><title>FOXNews.com - Personal Information Lost on 650,000 Credit Card Holders After Computer Tape Goes Missing - Science News | Science &amp; Technology | Techno</title><description>It&#39;s an Data Breach epidemic!!  From Fox News,  650,000 J.C. Penney customers have their Credit records stolen.  Some 150,000 records included Social Security Numbers.  When will the government step up and take a proactive stance in fixing these leaks.&lt;br /&gt;&lt;br /&gt;Check out &lt;a href=&quot;http://www.foxnews.com/story/0,2933,323712,00.html&quot;&gt;FOXNews.com - Personal Information Lost on 650,000 Credit Card Holders After Computer Tape Goes Missing&lt;/a&gt;:&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;blockquote&gt;&lt;strong&gt;Personal information on about 650,000 customers of J.C. Penney and up to 100 other retailers could be compromised after a computer tape went missing.&lt;/strong&gt;                 &lt;p&gt;GE Money, which handles credit card operations for Penney and many other retailers, said Thursday night that the missing information includes Social Security numbers for about 150,000 people.&lt;/p&gt;              &lt;p&gt;The information was on a backup computer tape that was discovered missing last October. It was being stored at a warehouse run by Iron Mountain Inc., a data storage company, and was never checked out but can&#39;t be found either, said Richard C. Jones, a spokesman for GE Money, part of General Electric Capital Corp.&lt;/p&gt;              &lt;p&gt;Jones said there was &quot;no indication of theft or anything of that sort,&quot; and no evidence of fraudulent activity on the accounts involved.&lt;/p&gt;              &lt;p&gt;Iron Mountain spokesman Dan O&#39;Neill said it would take specialized skills for someone to glean the personal data from the tape. He said the company regretted losing the tape, &quot;but because of the volume of information we handle and the fact people are involved, we have occasionally made mistakes.&quot;&lt;/p&gt;              &lt;p&gt;Penney said it had been told of the situation and referred further inquiries to GE Money.&lt;/p&gt;            &lt;p&gt;Jones declined to identify the other retailers whose customers&#39; information is missing but said &quot;it includes many of the large retail organizations.&quot;&lt;/p&gt;              &lt;p&gt;Jones said GE Money was paying for 12 months of credit-monitoring service for customers whose Social Security numbers were on the tape.&lt;/p&gt;              &lt;p&gt;Incidents like this add to consumer concern about fraud. The Identity Theft Resource Center says there was a six-fold increase last year in the number of records reported compromised in the United States — to 125 million.&lt;/p&gt;              &lt;p&gt;Data breaches can stem from hacking, as well as the physical loss or theft of computers of data storage equipment.&lt;/p&gt;              &lt;p&gt;TJX Cos., owner of the T.J. Maxx and Marshalls retail chains, reported last year that tens of millions of credit and debit card owners were exposed to fraud when hackers stole data while it was being transmitted wirelessly.&lt;/p&gt;              &lt;p&gt;It took GE Money two months to reconstruct the missing tape and identify the people whose information was lost. Since December, the company has been notifying consumers in batches of several thousand and telling them to phone a call center set up to deal with the breach. The notification is expected to be completed next week.&lt;/p&gt;              &lt;p&gt;Penney&#39;s card holder Elizabeth Rich of Everett, Wash., got one of the GE Money letters saying her name, address and account number may have been compromised. She was told her Social Security number was not on the tape.&lt;/p&gt;              &lt;p&gt;The letter, signed by GE Money President Brent P. Wallace, read in part, &quot;We have no reason to believe that anyone has accessed or misused your information. The pieces of information on the tape would not be enough to open new accounts in your name, and we have implemented internal monitoring to protect your account number from misuse due to this incident.&quot;&lt;/p&gt;              &lt;p&gt;Wallace said in the letter that Penney &quot;was in no way responsible for this incident.&quot;&lt;/p&gt;              &lt;p&gt;The Penney name didn&#39;t appear on the envelope Rich received, and she thought it was a credit solicitation when she saw the GE Money return address.&lt;/p&gt;              &lt;p&gt;&quot;I think the average consumer has thrown away that GE Money letter because they don&#39;t know it&#39;s about J.C. Penney,&quot; Rich said. &quot;Not everybody opens junk mail.&quot;&lt;/p&gt;              &lt;p&gt;Rich said she canceled her Penney card immediately&lt;/p&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2008/01/foxnewscom-personal-information-lost-on.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3537311604876463098</guid><pubDate>Mon, 21 Jan 2008 03:29:00 +0000</pubDate><atom:updated>2008-01-20T21:32:11.943-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IBM</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Save Your Fuel System, Don&#39;t Fill Up If You See A Tanker</title><description>Readers Digest  has just updated their list of tips you can to do keep your car running in optimal condition and I really like Number 4, &lt;blockquote&gt;&quot; Don&#39;t fill up if you see the tanker&lt;br /&gt;&lt;br /&gt;If you happen to see a gasoline tanker filling the tanks at your local gas station, come back another day or go to a different station. As the station&#39;s underground tanks are being filled, the turbulence can stir up sediment. Sediment in your gas can clog fuel filters and fuel injectors, causing poor forward to reverse repeatedly, as well as spinning tires at high speeds, can generate lots of heat and spell trouble for transmissions, clutches, and differentials. It may be cheaper in the long run to call the tow truck rather than risk big repair bills down the road. It&#39;s a good idea to carry a traction aid in the trunk, such as sand, gravel, or cat litter. performance and possibly necessitating repairs.&quot;&lt;/blockquote&gt;It makes a lot of sense, I know those tanks have to be filled with all kinds of stuff, and none of it would be good for your car&#39;s fuel system.&lt;br /&gt;&lt;br /&gt;They have a lot more, check out &lt;a href=&quot;http://www.rd.com/content/75-tips-to-keep-your-car-in-top-notch-condition/&quot;&gt;Reader&#39;s Digest - 75 Tips to Keep Your Car in Top-Notch Condition: Operating Your Car&lt;/a&gt;</description><link>http://www.itepistemology.com/2008/01/save-your-fuel-system-dont-fill-up-if.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-225439839660169808</guid><pubDate>Mon, 21 Jan 2008 01:29:00 +0000</pubDate><atom:updated>2008-01-20T19:31:41.455-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>British Navy Misplaces Laptop with personal information of 600,000</title><description>Looks like the Brits are picking up where they left off last year, losing the personal information of their citizens.   If anything I think the British are as bad or worse that our government at carelessly disregarding the importance of maintaining security of  it&#39;s citizens private information.  &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.pcworld.com/article/id,141565-pg,1/article.html&quot;&gt;PC World - British Navy Loses Laptop Containing Personnel Data&lt;/a&gt;:&lt;br /&gt;&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;A laptop containing personal information on about 600,000 people was stolen from an officer in the Royal Navy, the &lt;a href=&quot;http://www.pcworld.com/tags/U.K.%27s+Ministry+of+Defense.html&quot;&gt;U.K.&#39;s Ministry of Defense&lt;/a&gt; said on Friday.&lt;/p&gt;&lt;p&gt;The laptop contained information about new and potential recruits to the &lt;a href=&quot;http://www.pcworld.com/tags/Royal+Navy+of+the+United+Kingdom.html&quot;&gt;Royal Marines&lt;/a&gt;, the Royal Navy and the &lt;a href=&quot;http://www.pcworld.com/tags/Royal+Air+Force+of+the+United+Kingdom.html&quot;&gt;Royal Air Force&lt;/a&gt;, and was stolen in Birmingham last week, the ministry said.&lt;/p&gt;&lt;p&gt;The stolen data includes passport details, national insurance numbers, family details and doctors&#39; addresses for people who submitted an application to the forces, the ministry said. The laptop also contained bank details for at least 3,500 people.&lt;/p&gt;&lt;p&gt;&quot;The Ministry of Defence is treating the loss of this data with the utmost seriousness,&quot; it said in a &lt;a href=&quot;http://www.mod.uk/DefenceInternet/DefenceNews/DefencePolicyAndBusiness/ModConfirmsLossOfRecruitmentData.htm&quot; target=&quot;_blank&quot;&gt;statement&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;It is writing to people whose bank details were on the laptop and has notified the &lt;a href=&quot;http://www.pcworld.com/tags/Association+for+Payment+Clearing+Services.html&quot;&gt;Association for Payment Clearing Services&lt;/a&gt; to watch for unauthorized access, it said.&lt;/p&gt;&lt;p&gt;The ministry is investigating the theft with the &lt;a href=&quot;http://www.pcworld.com/tags/West+Midlands+Police.html&quot;&gt;West Midlands Police&lt;/a&gt;. The laptop was stolen Jan. 10, but the ministry said it didn&#39;t disclose the incident immediately for fear of compromising the investigation. It decided to go public with the loss after media reports surfaced about it on Friday, it said.&lt;span id=&quot;toolbar&quot;&gt;&lt;span style=&quot;display: inline;&quot; id=&quot;richeditToolbar&quot;&gt;&lt;span id=&quot;blockquote_tt&quot; onmouseover=&quot;EditorButtonHoverOn(this);&quot; onmouseout=&quot;EditorButtonHoverOff(this);&quot; onclick=&quot;CheckFormatting(event);RichEdit.Blockquote();EditorButtonClick(this);&quot; title=&quot;Blockquote&quot;&gt;&lt;img src=&quot;img/gl.quote.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;The laptop was stolen during the night from the car of a junior Royal Navy officer, who now faces a possible court martial, according to a report in the &lt;a href=&quot;http://www.pcworld.com/tags/The+Times+of+London.html&quot;&gt;London Times&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;This is the latest in a string of data security lapses in Britain that have embarrassed the government and called into question its plan to create a central database of patient records for the National Health Service.&lt;/p&gt;&lt;p&gt;In November, Her Majesty&#39;s Revenue &amp;amp; Customs lost two CDs containing personal data on about 25 million Britons. The discs, which were encrypted and password-protected, were sent via interoffice mail and never arrived.&lt;/p&gt;&lt;p&gt;The following month, the &lt;a href=&quot;http://www.pcworld.com/tags/Driving+Standards+Agency.html&quot;&gt;Driving Standards Agency&lt;/a&gt; said it lost a disc containing the records of 3 million learner drivers, and soon after that the Department of Health said that nine of its regional NHS trusts had lost patient data, including medical records for about 160,000 children in East London. &lt;/p&gt;&lt;p&gt;Des Brown, the U.K. defense secretary, will make a statement to Parliament about the latest incident early next week, the Defense Ministry said. It did not say if the information on the Navy&#39;s laptop was encrypted or protected by password.&lt;/p&gt;&lt;p&gt;People who think they have been affected can send an e-mail to recruitdata@check.mod.uk from Saturday at 10 a.m. U.K. time onward, the ministry said.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://www.itepistemology.com/2008/01/british-navy-misplaces-laptop-with.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-5537925588236023175</guid><pubDate>Mon, 21 Jan 2008 01:19:00 +0000</pubDate><atom:updated>2008-01-20T19:33:27.556-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">H-1B</category><title>Programmers Guild Discusses H-1B policy at Sloan West</title><description>The Programmers Guild gave a presentation at Sloan West Coast Program, outlining the industry problems directly traceable to the countries current &lt;a href=&quot;http://www.itepistemology.com/search/label/H-1B&quot;&gt;H-1B&lt;/a&gt; policy.   I have noted my beliefs here &lt;a href=&quot;http://www.itepistemology.com/search/label/H-1B&quot;&gt;repeatedly&lt;/a&gt; and have talked about how dangerous the current policies are to both our profession and our  country.   I applaud Kim Berry and the Programmer&#39;s Guild for attempting to raise awareness of this very important topic, I only wish had been in attendance to provide my support.&lt;br /&gt;&lt;br /&gt;Check out &lt;a href=&quot;http://www.programmersguild.org/docs/norm_matloff_newsletter_sloan_west_jan2008.htm&quot;&gt;Norm Matloff&#39;s newsletter&lt;/a&gt;:&lt;blockquote&gt;Kim Berry of the Programmer&#39;s Guild gave a really outstanding talk. I had seen his slides earlier, and they were fine, but his delivery greatly enhanced the content. Here was a real victim, speaking calmly yet with contained anger at the fact that all our respected institutions--both major political parties, the business community and academia--are complicit in maintaining that sham known as H-1B. His account of hiring decision meetings in which he participated, in which qualified American applicants were repeatedly rejected in favor of H-1Bs, ought to have been videotaped; his speech would have been just as effective the Cohen &amp;amp; Grigsby &quot;TubeGate&quot; videos.&lt;/blockquote&gt;&lt;a href=&quot;http://programmersguild.blogspot.com/2008/01/programmers-guild-presents-at-sloan.html&quot;&gt;In summary their presentation made these points and suggestions concerning the H-1B policy:&lt;/a&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;True prevailing wage of at least what average Americans earn within the same job classifications. &lt;/li&gt;&lt;li&gt;H-1b and L-1 LCAs only approved after the employer has conducted good faith, transparent recruitment, and was unable to find any qualified U.S. candidates, at any price. &lt;/li&gt;&lt;li&gt;H-1b only granted to U.S. business entities with as direct hires - not to consulting firms (Indian or otherwise) to be re-shopped against American job seekers. &lt;/li&gt;&lt;li&gt;H-1b to include a $1,200 annual fee that would be used to fund $15,000 scholarships for American college students in STEM programs - consistent with legislation that Senator Sanders has introduced twice.&lt;/li&gt;&lt;/ul&gt;</description><link>http://www.itepistemology.com/2008/01/programmers-guild-discusses-h-1b-policy.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-7605768012786331937</guid><pubDate>Mon, 14 Jan 2008 01:34:00 +0000</pubDate><atom:updated>2008-01-20T21:34:38.176-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>7 Rules For Avoiding Online Data Breaches</title><description>I spend a lot of time detailing the failings of the Information Technology Industry including to &lt;a href=&quot;http://www.itepistemology.com/2008/01/security-still-problem-at-tsa.html&quot;&gt;today&#39;s entry on potential problems at the TSA&lt;/a&gt; and not nearly enough discussing how to avoid falling into the Breach so to speak. Thanks to eWeek for giving me a chance to hop on their bandwagon by posting their 7 ways to avoid being the data breach. So please take the time and read &lt;a href=&quot;http://www.eweek.com/article2/0,1759,2239403,00.asp?kc=EWRSS03119TX1K0000594&quot;&gt;eWeek - How to Avoid the Next Data Breach&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;&lt;b&gt;1.      Have a viable, up-to-date security policy:&lt;/b&gt; Make sure your security policy takes into account what data assets need protecting, the threat landscape and the potential consequences of a breach. Have procedures in place for quick response so that if the worst happens, the organization can react rapidly and minimize damage. Too many companies have policies that address yesterday&#39;s threats, or ones that are up to date but are hidden from the employees who should know them by heart. Communicate your policy to employees, and revise it periodically. &lt;p&gt;&lt;b&gt;2.      Know your sensitive data and safeguard it:&lt;/b&gt; Determine where your sensitive data assets are – by &quot;sensitive&quot;, we mean data that if stolen or exposed would cause serious damage to the business, its employees, shareholders, customers or partners. Control access to this data, preventing unauthorized copying, printing and backups. When reading about lost laptops with sensitive data (encrypted or not), one often wonders what such data was doing on a laptop in the first place – start there. &lt;/p&gt;&lt;p&gt;&lt;b&gt;3.      Apply the least privilege principle:&lt;/b&gt; Give users and applications the minimum required access, especially as regards sensitive data. Do not grant privileges based on future needs but current ones, and regularly review existing privileges and revoke the ones that are no longer required. In today&#39;s enterprise, with so many consultants, outsourced developers and partners gaining access to internal systems, it is easy to disregard just how many external elements have access to systems for which they no longer need it. &lt;/p&gt;&lt;p&gt;&lt;b&gt;4.      Encrypt data in motion:&lt;/b&gt; Choose the right solution for your environment, using strong encryption standards and algorithms, coupled with authentication and key exchange mechanisms that make sense. There are no &quot;one size fits all&quot;, and a heterogeneous environment may require the use of various standards including IPSec, WPA2, SSL and SSH. TJX, for example, used weak encryption (WEP) on its point-of-sale WiFi devices, giving criminals the opening through which they began stealing credit card numbers. &lt;/p&gt;&lt;p&gt;&lt;b&gt;5.      Encrypt data at rest:&lt;/b&gt; When done right, this ensures that only those who need to see sensitive data see it. However, it is important to choose the right kind of encryption and do it judiciously, covering only sensitive data. Key management is crucial, because if encryption keys are distributed to too many users, applications and devices, it will render itself useless in terms of security. &lt;/p&gt;&lt;p&gt;&lt;b&gt;6.      Monitor database activity:&lt;/b&gt; Nowhere would you find more useful sensitive data than in enterprise databases, yet most enterprises have zero visibility into who is doing what in the database. Real-time monitoring and auditing gives you the ability to enforce usage policy and provides an additional and necessary layer of security in the place most likely to be the source of a major breach. Apply automatic prevention where appropriate (e.g., obvious SQL injection attacks). The hackers that pilfered almost 100 million credit card records from TJX could not have done so without unfettered access to the database – monitoring would have certainly caught this early on. It is not for naught that database activity monitoring is considered a premier &quot;compensating control&quot; in PCI DSS, being a viable alternative to encryption. &lt;/p&gt;&lt;p&gt;&lt;b&gt;7.      Regularly check and harden configuration of components:&lt;/b&gt; Use automated tools to find bad configurations, weak passwords and vendor defaults in databases, application servers, routers and other devices. For example, a certain system has a default privileged user account that comes with the password &quot;change_on_install&quot;, which of course needs to be changed after installation but sometimes is not. A surprising number of breaches are due to weak passwords – those are practically &quot;X marks the spot&quot; signs for potential intruders. &lt;/p&gt;&lt;/blockquote&gt;2008 will be year that either the industry and government really get serious about solving this growing problem or the data breaches will become so bad that the public will force their action on the problem. It pays to be proactive and take eWeek&#39;s seven suggestions to heart.</description><link>http://www.itepistemology.com/2008/01/7-rules-for-avoiding-online-data.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-5194049018053119199</guid><pubDate>Mon, 14 Jan 2008 01:31:00 +0000</pubDate><atom:updated>2008-01-13T19:31:43.227-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Security Still A Problem At TSA (Transportation Security Administration) Per House Oversight Committee</title><description>&lt;div class=&quot;Body&quot;&gt;Doesn&#39;t look like much has changed over at the TSA. Thats right the people that are resposible for keeping us save and secure on our airline flights are doing a rotten job keeping our identities secure online.&lt;br /&gt;&lt;br /&gt;Less than a year ago the TSA &lt;a href=&quot;http://arstechnica.com/news.ars/post/20070507-tsa-removes-shoes-belt-still-cant-find-hard-drive-with-air-marshal-data.html&quot;&gt;lost a hard drive&lt;/a&gt; with names, Social Security numbers, salary information, and other personal information for 100,000 TSA employees. And their bosses, the DHS has also suffered &lt;a href=&quot;http://arstechnica.com/news.ars/post/20070621-congress-grills-homeland-security-cio-over-repeated-security-breaches.html&quot;&gt;serious security breaches&lt;/a&gt; over the past year.&lt;br /&gt;&lt;br /&gt;Now in a House Oversight and Government Reform Committee report issued Friday, the TSA traveler redress web site was found to have numberous security flaws which exposed it&#39;s users while attempting to get removed from TSA watch lists to potential identity theft. So if you are on their list mistakenly and you try to get off, by using their website, then the bad guys can potentially get your personal information so they can use it, and then you really should be watched. How ironic.&lt;br /&gt;&lt;br /&gt;Check out more one the story at &lt;a href=&quot;http://arstechnica.com/news.ars/post/20080113-tsa-security-flaws-exposed-users-to-risk-of-identity-theft.html&quot;&gt;Arstechnica.com - TSA security flaws exposed users to risk of identity theft:&lt;/a&gt;&lt;blockquote&gt;&lt;p&gt; The chairman of the House Oversight and Government Reform Committee published a report Friday with details about the committee&#39;s investigation into security flaws found in the Transportation Security Administration&#39;s (TSA) traveler redress web site. TSA is a division of the Department of Homeland Security (DHS) and is responsible for baggage inspection and airport security. The site—which enables travelers to seek removal from airline watch lists by providing personal identification information—operated for four months before the vulnerabilities were detected.&lt;/p&gt;The web site was hosted on a commercial domain by a contractor and did not use SSL encryption for submission forms that transmit sensitive identification information. The few pages of the site that did use SSL used an expired certificate that had been self-signed by the contractor. The lack of proper encryption was brought to the attention of TSA last year by security researcher Chris Soghoian, who noted that such &quot;major incompetence&quot; could have been avoided by basic oversight. &lt;p&gt;&quot;At the request of Chairman Henry Waxman, Committee staff have been investigating how TSA could have launched a web site that violated basic operating standards of web security and failed to protect travelers&#39; sensitive personal information,&quot; says the report summary. &quot;These deficiencies exposed thousands of American travelers to potential identity theft.&quot; &lt;/p&gt; &lt;p&gt;According to the report, the TSA was completely unaware of the security issues while the site was in operation. During that time, thousands of travelers submitted personal information through the website and a TSA administrator claimed in congressional testimony that the agency had assured &quot;the privacy of users and the security of the system.&quot; &lt;/p&gt; &lt;p&gt;The web site was created by Desyne Web Services, a web marketing firm from northern Virginia whose clientèle includes the FBI, USA Today, and George Foreman. TSA awarded Desyne a no-bid contract valued at $48,816 for development of the redress system. According to the report, the Request for Quote (RFQ) issued by TSA prior to making the deal stated that Desyne was &quot;the only vendor that could meet the program requirements.&quot; The report notes that Nicholas Panuzio, the TSA employee and technical lead who authored the RFQ, had previously worked for Desyne and had known the owner of the web design company since high school—a serious conflict of interest. &lt;/p&gt; &lt;p&gt;Following the revelation of security vulnerabilities in the system, TSA transferred the site to a Department of Homeland (DHS) Security domain and notified users who submitted information through the unencrypted form that they had been exposed to risk of identity theft. The committee&#39;s report notes, however, that TSA never reprimanded Panuzio or imposed sanctions on Desyne. In fact, the report says that Desyne continues to operate several major TSA web sites and has received over $500,000 of no-bid contracts web services from TSA and DHS. &lt;/p&gt; &lt;p&gt; This isn&#39;t the first time that TSA has gotten itself into trouble for exposing sensitive identification information. Last year, the agency &lt;a href=&quot;http://arstechnica.com/news.ars/post/20070507-tsa-removes-shoes-belt-still-cant-find-hard-drive-with-air-marshal-data.html&quot;&gt;lost a hard drive&lt;/a&gt; with names, Social Security numbers, salary information, and bank routing numbers for 100,000 TSA employees, including air marshals. The DHS has also suffered &lt;a href=&quot;http://arstechnica.com/news.ars/post/20070621-congress-grills-homeland-security-cio-over-repeated-security-breaches.html&quot;&gt;serious security breaches&lt;/a&gt; in the past year. &lt;/p&gt; &lt;p&gt; As we have &lt;a href=&quot;http://arstechnica.com/news.ars/post/20071026-report-terrorist-watch-list-swells.html&quot;&gt;noted in the past&lt;/a&gt;, the TSA terror watch list has very little efficacy and may actually contribute to security problems. The creation of the TSA redress system was precipitated in the first place by a study conducted by the Government Accountability Office (GAO) which found that approximately half of the individuals on the watch lists were false positives. The GAO has also reported ongoing problems with people on the no-fly list accidentally being permitted to fly. Additionally, TSA reported last year that screeners &lt;a href=&quot;http://www.usatoday.com/news/nation/2007-10-17-airport-security_N.htm&quot;&gt;missed approximately 75 percent&lt;/a&gt; of simulated explosives and bomb components that testers hid in their clothing and carry-on bags at Los Angeles International Airport during a review of airport security procedures. &lt;/p&gt; &lt;p&gt; In light of TSA&#39;s steady litany of serious failures, perhaps it&#39;s time for Congress to reconsider the agency&#39;s role in airport security.&lt;/p&gt;&lt;/blockquote&gt;I have to agree, it our own security agencies can&#39;t manage to keep our information save then we either need to radically change the agencies internal policies or eliminate their role from our lives.&lt;br /&gt;&lt;/div&gt;</description><link>http://www.itepistemology.com/2008/01/security-still-problem-at-tsa.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-4933401159810381326</guid><pubDate>Wed, 09 Jan 2008 21:42:00 +0000</pubDate><atom:updated>2008-01-20T19:31:41.455-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Massive SQL-based Web Attack Last Weekend On SQL Server based Websites</title><description>In what has to be one of the largest SQL based Web attacks on record, last weekend Google says over 70,000 domains were affected by a massive attack.  This time it wasn&#39;t Oracle that was affected it was Microsoft SQL and IIS  that were hacked.  And here I was giving Oracle grief for not patching their errors, guess I should have been looking toward Microsoft instead. &lt;br /&gt;&lt;br /&gt;Using a MDAC vulnerably that was supposed to have been patched in September of 2006 they used SQL injection to infect the sites.  For those unfamiliar with SQL injection, the hackers insert SQL commands in what the website thinks is data, and instead of performing its normal processes, the hacked server performs the hackers inserted SQL commands.&lt;br /&gt;&lt;br /&gt;Check out what CNET has to say in &lt;a href=&quot;http://www.news.com/8301-10784_3-9847139-7.html?part=rss&amp;amp;tag=feed&amp;amp;subj=NewsBlog&quot;&gt;Massive SQL-based Web attack decoded&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;&lt;p&gt;On Wednesday, the SANS Internet Storm Center and others &lt;a class=&quot;external-link&quot; href=&quot;http://isc.incidents.org/diary.html?storyid=3823&quot;&gt;published details&lt;/a&gt; about the massive SQL-based Web attack that occurred over the weekend. The attack, says SANS, is similar to a smaller SQL-injection attack seen last November. At least 70,000 sites were compromised in short period of time, leading some speculate this was an automated attack.. &lt;/p&gt;&lt;p&gt; From logs files, the attack code appears to exploit a variety of SQL injection vulnerabilities existing on Web sites using Microsoft SQL or Microsoft IIS. On the vulnerable sites, malicous javascript is injected into all varchar and text fields in the SQL database such that when a visitor hits the site, their browsers, if vulnerable, are then redirected to another domain--in this case, us8010.com. &lt;/p&gt;&lt;p&gt; &lt;a class=&quot;external-link&quot; href=&quot;http://explabs.blogspot.com/2008/01/so-this-is-kind-of-interesting.html&quot;&gt;Roger Thompson, chief research officer at Grisoft&lt;/a&gt;, identified one exploits served at the malicious server as taking advantage of MS06-014, a MDAC vulnerability that Microsoft patched in September 2006. He also noted that &quot;this domain uc8010(dot)com was registered just a few days ago (Dec 28), and yet, at one point Google showed script injections pointing to it were showing up on over 70k domains.&quot; Yet by January 5, 2008, most of these domains had already been cleaned.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;</description><link>http://www.itepistemology.com/2008/01/massive-sql-based-web-attack-last.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-2020384542657371598</guid><pubDate>Tue, 08 Jan 2008 01:04:00 +0000</pubDate><atom:updated>2008-01-20T19:48:56.272-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">DRM</category><title>Has Sony Just Ended The DRM War?</title><description>The last holdout in the DRM war between Record Companies and Consumers may have just thrown in the towel and began selling DRM free music, even if they are making you go to a record store to buy it.  Techcrunch is reporting in their blog post that starting mid month, you will be able to buy a “Platinum Music Pass” for the album you want and then redeem the pass for DRM free music on a internet website.&lt;br /&gt;&lt;br /&gt;I&#39;ll bet that the in store requirement is just a face saving move that will fade within a month or two, and then all the major recording companies will be offering DRM free music over the internet, and no doubt where the recording companies go today the  movie studios will follow soon after.&lt;br /&gt;&lt;br /&gt;I for one won&#39;t miss looking over my shoulder when playing my MP3&#39;s on my Smart Phone.    DRM was a bad idea when it started and will remain a bad idea in the future.&lt;br /&gt;&lt;br /&gt;Check out what Techcrunch has to say in &lt;a href=&quot;http://www.techcrunch.com/2008/01/07/sony-bmg-confirms-drm-free-music-but-will-force-customers-to-visit-a-record-store-to-buy-it/trackback/&quot;&gt;Sony BMG Confirms DRM Free Music, But Will Force Customers to Visit A Store To Buy It:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;p&gt;As we reported &lt;a href=&quot;http://www.techcrunch.com/2008/01/04/ding-dong-sony-bmg-to-drop-drm/&quot;&gt;January 4&lt;/a&gt;, Sony BMG will become the last of the big four record companies to sell DRM free music, but with one very stupid catch. DRM free music from Sony BMG will be available from January 15 to those who purchase a plastic card called the “Platinum Music Pass” for the album they want from a retail store for $12.99. Buyers will then have to visit MusicPass.com and enter a code to download the DRM free album they selected in the store.&lt;/p&gt; &lt;p&gt;According to a &lt;a href=&quot;http://www.usatoday.com/money/media/2008-01-07-sony-music_N.htm&quot; onclick=&quot;javascript:urchinTracker (&#39;/outbound/www.usatoday.com&#39;);&quot;&gt;USA Today report&lt;/a&gt;, Best Buy, Target and Fred’s will be first stores to offer the cards, with Winn-Dixie, Coconuts, FYE, Spec’s and Wherehouse to follow.&lt;/p&gt; &lt;p&gt;When we first wrote about Sony BMG offering DRM free music we were positive on the move, and it still is a step forward, but forcing customers who want to buy digital music into a physical store where they will be forced to pick the album then and there, then go home to download it…WTF?. It’s nearly like Sony BMG is setting this up to fail, so they can then go back to only selling DRM infested music whilst saying that there wasn’t demand for DRM free music because this experiment failed.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://www.itepistemology.com/2008/01/has-sony-just-ended-drm-war.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-8069492600279962074</guid><pubDate>Tue, 08 Jan 2008 00:46:00 +0000</pubDate><atom:updated>2008-01-07T18:48:14.034-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Agile</category><title>What is Scrum and Why Would I Want To Implement It?</title><description>If you ever wondered what all the buzz about agile programming is about I recommend that you take some time and take a look at All About Agile&#39;s post &quot;How to implement Scrum in 10 easy steps.&quot;   Scrum is one of Agile programmings more popular methodologies, and Kelly has done a fine job of explaining just what you need do to to get started and best of all it done in a clear and easy to understand style.&lt;br /&gt;&lt;br /&gt;So if your wishing that your development team was more efficient take the time to read and consider &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/09/how-to-implement-scrum-in-10-easy-steps.html&quot;&gt;All About Agile: How to implement Scrum in 10 easy steps&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;When I first encountered &lt;strong&gt;agile software development&lt;/strong&gt;, I found it hard to understand. Okay, I might not be the brightest person you&#39;ve ever met! But I&#39;m not stupid either, I think :-)&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;There&#39;s a myriad of different approaches, principles, methods and terms, all of which are characterised as &#39;Agile&#39;. And from my perspective, all this &#39;noise&#39; makes &lt;strong&gt;agile development &lt;/strong&gt;sound far harder, far more scientic, and far more confusing than it really needs to be.&lt;br /&gt;&lt;br /&gt;For this reason, I favour the &lt;strong&gt;&lt;a href=&quot;http://www.controlchaos.com/about/index.php&quot; target=&quot;_blank&quot;&gt;Scrum&lt;/a&gt; methodology&lt;/strong&gt;. Admittedly there&#39;s a bit of jargon to learn. But otherwise Scrum provides what is fundamentally a very simple way of &lt;strong&gt;managing software development &lt;/strong&gt;more effectively.&lt;br /&gt;&lt;br /&gt;Sure, it&#39;s great to have a deep understanding of the underlying values and &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/02/10-things-you-need-to-know-about-agile.html&quot;&gt;principles of agile development&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Sure, it&#39;s great to have a thorough understanding of &lt;strong&gt;why Scrum works&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;Sure, it&#39;s great to know lots of case studies where Scrum has been applied and try to relate them to your own individual situation.&lt;br /&gt;&lt;br /&gt;But, fundamentally, I believe you can implement Scrum without all this knowledge. And still find &lt;strong&gt;many benefits &lt;/strong&gt;and have a very positive experience of agile development.&lt;br /&gt;&lt;br /&gt;In these 10 posts, I outline specifically &lt;strong&gt;how to implement Scrum in 10 easy steps&lt;/strong&gt;:&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/09/how-to-implement-scrum-in-10-easy-steps_20.html&quot;&gt;Step #1: Get your backlog in order!&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/09/how-to-implement-scrum-in-10-easy-steps_28.html&quot;&gt;Step #2: How to estimate your product backlog&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/10/how-to-implement-scrum-in-10-easy-steps.html&quot;&gt;Step #3: Sprint Planning/clarify requirements&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/10/how-to-implement-scrum-in-10-easy-steps_11.html&quot;&gt;Step #4: Sprint Planning/estimate tasks&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/10/how-to-implement-scrum-in-10-easy-steps_16.html&quot;&gt;Step #5: Create a collaborative workspace&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/10/how-to-implement-scrum-in-10-easy-steps_19.html&quot;&gt;Step #6: Sprint!&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/10/how-to-implement-scrum-in-10-easy-steps_30.html&quot;&gt;Step #7: Stand up and be counted!&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/11/how-to-implement-scrum-in-10-easy-steps.html&quot;&gt;Step #8: Track progress with a daily burndown chart&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/11/how-to-implement-scrum-in-10-easy-steps_13.html&quot;&gt;Step #9: Finish when you said you would&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/11/how-to-implement-scrum-in-10-easy-steps_20.html&quot;&gt;Step #10: Review, reflect, repeat...&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;See also:&lt;/em&gt;&lt;br /&gt;&lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/12/implementing-scrum-powerpoint.html&quot;&gt;&#39;Implementing Scrum&#39; PowerPoint Presentation&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/02/10-things-you-need-to-know-about-agile.html&quot;&gt;10 Key Principles of Agile Software Development&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://kw-agiledevelopment.blogspot.com/2007/02/10-things-you-need-to-know-about-agile.html&quot;&gt;&lt;/a&gt;&lt;/span&gt;</description><link>http://www.itepistemology.com/2008/01/all-about-agile-how-to-implement-scrum.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3820851560445967468</guid><pubDate>Mon, 07 Jan 2008 22:59:00 +0000</pubDate><atom:updated>2008-01-20T19:54:23.116-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cloud</category><category domain="http://www.blogger.com/atom/ns#">Future</category><title>Nicholas Carr Agrees, The IT Department Is On It&#39;s Way Out</title><description>I have long lamented about the future of American I.T. professionals, with the rise of the H-1B imports, the outsourcing our jobs overseas and the rise of cloud computing.  Now author &lt;a href=&quot;http://www.networkworld.com/news/2005/061305widernetcarr.html&quot;&gt;Nicholas Carr&lt;/a&gt; predicts a similar fate in his new book, &lt;a href=&quot;http://www.amazon.com/exec/obidos/ASIN/0393062287/ref=nosim/fusion0e&quot;&gt;&lt;i&gt;The Big Switch: Rewiring the World from Edison to Google&lt;/i&gt;.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The book makes a case for the continued commoditization of the I.T. environment, first with outsourcing menial tasks, then entire projects, in the future he sees entire I.T. departments becoming part of the I.T. cloud.&lt;br /&gt;&lt;br /&gt;Take a look at what Network World has to say about &lt;a href=&quot;http://www.networkworld.com/news/2005/061305widernetcarr.html&quot;&gt;Nicholas Carr&lt;/a&gt; and his latest book in &lt;a href=&quot;http://www.networkworld.com/news/2008/010708-carr-it-dead.html&quot;&gt;Network World - The IT department is dead:&lt;/a&gt;&lt;br /&gt;&lt;p class=&quot;first&quot;&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p class=&quot;first&quot;&gt;The IT department is dead, and it is a shift to utility computing that will kill this corporate career path. So predicts &lt;a href=&quot;http://www.networkworld.com/news/2005/061305widernetcarr.html&quot;&gt;Nicholas Carr&lt;/a&gt; in his new book,&lt;a href=&quot;http://www.amazon.com/exec/obidos/ASIN/0393062287/ref=nosim/fusion0e&quot;&gt; &lt;i&gt;The Big Switch: Rewiring the World from Edison to Google&lt;/i&gt;.&lt;/a&gt;&lt;/p&gt;                                          &lt;p&gt;Carr is best known for a provocative Harvard Business Review article entitled &quot;Does IT Matter?&quot; Published in 2003, the article asserted that IT investments didn&#39;t provide companies with strategic advantages because when one company adopted a new technology, its competitors did the same. &lt;/p&gt;                      &lt;p&gt;The Harvard Business Review article made Carr the sworn enemy of hardware and &lt;a href=&quot;http://www.networkworld.com/topics/software.html&quot;&gt;software&lt;/a&gt; vendors including &lt;a href=&quot;http://www.networkworld.com/subnets/microsoft/&quot;&gt;Microsoft&lt;/a&gt;, &lt;a href=&quot;http://www.networkworld.com/news/financial/intel.html&quot;&gt;Intel&lt;/a&gt; and &lt;a href=&quot;http://www.networkworld.com/news/financial/hp.html&quot;&gt;HP&lt;/a&gt;, as well as of CIOs and other IT professionals.                      &lt;/p&gt;                      &lt;p&gt;With his new book, Carr is likely to engender even more wrath among CIOs and other IT pros.&lt;/p&gt;                      &lt;p&gt;&quot;In the long run, the IT department is unlikely to survive, at least not in its familiar form,&quot; Carr writes. &quot;It will have                         little left to do once the bulk of business computing shifts out of private &lt;a href=&quot;http://www.networkworld.com/topics/data-center.html&quot;&gt;data centers&lt;/a&gt; and into the cloud. Business units and even individual employees will be able to control the processing of information directly, without the need for legions of technical people.&quot;&lt;/p&gt;&lt;p&gt;Carr&#39;s rationale is that utility computing companies will replace corporate IT departments much as electric utilities replaced                         company-run power plants in the early 1900s.                      &lt;/p&gt;                      &lt;p&gt;Carr explains that factory owners originally operated their own power plants. But as electric utilities became more reliable and offered better economies of scale, companies stopped running their own electric generators and instead outsourced that critical function to electric utilities. &lt;/p&gt;                      &lt;p&gt;Carr predicts that the same shift will happen with utility computing. He admits that utility computing companies need to make                         improvements in &lt;a href=&quot;http://www.networkworld.com/topics/security.html&quot;&gt;security,&lt;/a&gt; reliability and efficiency. But he argues that the Internet, combined with computer hardware and software that has become                         commoditized, will enable the utility computing model to replace today’s client/&lt;a href=&quot;http://www.networkworld.com/topics/servers.html&quot;&gt;server&lt;/a&gt; model.                      &lt;/p&gt;                      &lt;p&gt;&quot;It has always been understood that, in theory, computing power, like electric power, could be provided over a grid from large-scale utilities — and that such centralized dynamos would be able to operate much more efficiently and flexibly than scattered, private data centers,&quot; Carr writes. &lt;/p&gt;                      &lt;p&gt;Carr cites several drivers for the move to utility computing. One is that computers, &lt;a href=&quot;http://www.networkworld.com/topics/storage-management.html&quot;&gt;storage systems,&lt;/a&gt; networking gear and most widely used &lt;a href=&quot;http://www.networkworld.com/topics/applications.html&quot;&gt;applications&lt;/a&gt; have become commodities.                      &lt;/p&gt;                      &lt;p&gt;He says even IT professionals are indistinguishable from one company to the next. &quot;Most perform routine maintenance chores                         — exactly the same tasks that their counterparts in other companies carry out,&quot; he says.                      &lt;/p&gt;                      &lt;p&gt;Carr points out that most data centers have excess capacity, with utilization ranging from 25% to 50%. Another driver to utility computing is the huge amount of electricity consumed by data centers, which can use 100 times more energy than other commercial office buildings. &lt;/p&gt;                      &lt;p&gt;&quot;The replication of tens of thousands of independent data centers, all using similar hardware, running similar software, and employing similar kinds of workers, has imposed severe economic penalties on the economy,&quot; he writes. &quot;It has led to the overbuilding of IT assets in every sector of the economy, dampening the productivity gains that can spring from computer automation.&quot; &lt;/p&gt;                      &lt;p&gt;Carr embraces &lt;a href=&quot;http://www.networkworld.com/news/financial/google.html&quot;&gt;Google&lt;/a&gt; as the &lt;a href=&quot;http://www.networkworld.com/news/2007/041107-google-building-data-centers-at.html&quot;&gt;leader in utility computing.&lt;/a&gt; He says Google runs the largest and most sophisticated data centers on the planet, and is using them to provide services such as Google Apps that compete directly with traditional client/server software from vendors such as Microsoft. &lt;/p&gt;                      &lt;p&gt;&quot;If companies can rely on central stations like Google&#39;s to fulfill all or most of their computing requirements, they&#39;ll be able to slash the money they spend on their own hardware and software — and all the dollars saved are ones that would have gone into the coffers of Microsoft and the other tech giants,&quot; Carr says. &lt;/p&gt;                      &lt;p&gt;Other IT companies that Carr highlights in the book for their innovative approaches to utility computing are: &lt;a href=&quot;http://www.networkworld.com/news/2007/060507-salesforcecom-google-release-first-joint.html&quot;&gt;Salesforce.com&lt;/a&gt;, which provides CRM software as a service; &lt;a href=&quot;http://www.networkworld.com/news/2007/072507-vogel-q-and-a.html&quot;&gt;Amazon&lt;/a&gt;, which offers utility computing services called Simple Storage Solution (S3) and Elastic Compute Cloud (EC2) with its excess                         capacity; &lt;a href=&quot;http://www.networkworld.com/news/2007/120307-savvis-data-center-upgrade.html&quot;&gt;Savvis,&lt;/a&gt; which is a leader in automating the deployment of IT;&lt;br /&gt;and 3Tera, which sells a software program called &lt;a href=&quot;http://www.networkworld.com/columnists/2007/021207gearhead.html&quot;&gt;AppLogic&lt;/a&gt; that automates the creation and management of complex corporate systems.                         &lt;!--#include virtual=&quot;/cgi-bin/pgnav.pl?cont=yes&amp;pages=${pages}&amp;${compare}&quot;--&gt;                      &lt;/p&gt; &lt;!--#endif --&gt; &lt;!--#if expr=&quot;${compare} = /^page\=2$/ || ${compare} = /^page\=full/&quot; --&gt;                      &lt;p&gt;Carr points out that many leading software and hardware companies — Microsoft, &lt;a href=&quot;http://www.networkworld.com/news/financial/oracle.html&quot;&gt;Oracle,&lt;/a&gt; SAP, IBM, HP, &lt;a href=&quot;http://www.networkworld.com/news/financial/sun.html&quot;&gt;Sun&lt;/a&gt; and &lt;a href=&quot;http://www.networkworld.com/news/financial/emc.html&quot;&gt;EMC&lt;/a&gt; — are adapting their client/server products to the utility age.                      &lt;/p&gt;                                          &lt;p&gt;&quot;Some of the old-line companies will succeed in making the switch to the new model of computing; others will fail,&quot; Carr writes. &quot;But all of them would be wise to study the examples of General Electric and Westinghouse. A hundred years ago, both these companies were making a lot of money selling electricity-production components and systems to individual companies. That business disappeared as big utilities took over electricity supply. But GE and Westinghouse were able to reinvent themselves.&quot; &lt;/p&gt;&lt;!--#if expr=&quot;${compare} != /^page\=full/&quot; --&gt;&lt;!--#endif --&gt;                      &lt;p&gt;Carr offers a grimmer future for IT professionals. He envisions a utility computing era where &quot;managing an entire corporate computing operation would require just one person sitting at a PC and issuing simple commands over the Internet to a distant utility.&quot; &lt;/p&gt;                      &lt;p&gt;He not only refers to the demise of the PC, which he says will be a museum piece in 20 years, but to the demise of the software                         programmer, whose time has come to an end.                      &lt;/p&gt;                      &lt;p&gt;Carr gives several examples of successful Internet companies including YouTube, Craigslist, Skype and Plenty of Fish that run their operations with minimal IT professionals. YouTube had just 60 employees when it was bought by Google in 2006 for $1.65 billion. Craigslist has a staff of 22 to run a Web site with billions of pages of content. Internet telephony vendor Skype supports 53 million customers with only 200 employees. Meanwhile, Internet dating site Plenty of Fish is a one-man shop. &lt;/p&gt;                      &lt;p&gt;&quot;Given the economic advantages of online firms — advantages that will grow as the maturation of utility computing drives the costs of data processing and communication even lower —traditional firms may have no choice but to refashion their own businesses along similar lines, firing many millions of employees in the process,&quot; Carr says. &lt;/p&gt;                      &lt;p&gt;IT professionals aren&#39;t the only ones to suffer demise in Carr&#39;s eyes. He saves his most dire predictions for the fate of                         journalists.                         &lt;!--#include virtual=&quot;/cgi-bin/pgnav.pl?cont=yes&amp;pages=${pages}&amp;${compare}&quot;--&gt;                      &lt;/p&gt; &lt;!--#endif --&gt; &lt;!--#if expr=&quot;${compare} = /^page\=3$/ || ${compare} = /^page\=full/&quot; --&gt;                      &lt;p&gt;&quot;As user-generated content continues to be commercialized, it seems likely that the largest threat posed by social production won&#39;t be to big corporations but to individual professionals — to the journalists, editors, photographers, researchers, analysts, librarians and other information workers who can be replaced by . . . people not on the payroll.&quot; &lt;/p&gt;                                           &lt;p&gt;Carr&#39;s argument about the future of utility computing is logical and well written. He offers a solid comparison between the evolution of electrical utilities in the early 1900s and the development of utility computing that&#39;s happening today. &lt;/p&gt;&lt;!--#if expr=&quot;${compare} != /^page\=full/&quot; --&gt;&lt;!--#endif --&gt;                      &lt;p&gt;Carr&#39;s later chapters — about the future of artificial intelligence and the many downsides of the Internet — seem less integral to his utility computing argument. And his discussion of Google&#39;s vision of a direct link between the brain and the Internet seems far-fetched. &lt;/p&gt;                      &lt;p&gt;Nonetheless, &lt;i&gt;The Big Switch&lt;/i&gt; is a recommended read for any up-and-coming IT professional looking to make a career out of providing computing services to corporations. If Carr&#39;s predictions come true, strong technical skills will still be valued by service providers.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;I really hate it when I right and I have little doubt that both my and &lt;a href=&quot;http://www.networkworld.com/news/2005/061305widernetcarr.html&quot;&gt;Nicholas Carr&lt;/a&gt; predictions will be proven for the most part correct over time.  Take the time to read his book and see if you don&#39;t agree.  If Congress will wake up and recognize the value of a strong I.T. industry to this countries future security and position in the world, there is still time to reverse the trends seen in his book and predicted here in this blog..</description><link>http://www.itepistemology.com/2008/01/nicholas-carr-agrees-it-department-is.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-6316958166784680763</guid><pubDate>Thu, 03 Jan 2008 04:09:00 +0000</pubDate><atom:updated>2008-01-02T22:12:40.414-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Failures</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>More than 120 million affected by data security problems in 2007</title><description>I blogged about this incessantly during the last year but it looks like the final toll of personal data breechs for 2007 exceeded an unbelievable 120 million records.  Nearly 10 times as many as was reported in 2006 , but as data has continued to be concentrated and made available online, little has been done to force the industry to face the growing problem so I have little doubt that this years total will exceed even last years.&lt;br /&gt;&lt;br /&gt;But at least someone besides myself is noticing, lets hope they have more success pointing out the problem than I have.  Check out &lt;a href=&quot;http://www.pcworld.com/article/id,140927-pg,1/article.html&quot;&gt;PC World - Leaks of Personal Data Swell to a Deluge&lt;/a&gt;: &quot;&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;More than 120 million people in the U.S. had personal data exposed in 2007 as identity theft reached record heights. That&#39;s according to research from the nonprofit organization the &lt;a href=&quot;http://www.pcworld.com/tags/Identity+Theft+Resource+Center.html&quot;&gt;Identity Theft Resource Center&lt;/a&gt; (ITRC) which reported 446 separate breaches exposing 128 million records.&lt;/p&gt;&lt;p&gt;The data shows a more-than sixfold increase over its 2006 figures, when 312 incidents were recorded, involving more than 19 million individuals.&lt;/p&gt;&lt;p&gt;Another group, Attrition.org, shows 319 personal information data loss incidents in 2007 in its database, both in the U.S. and other countries.&lt;/p&gt;&lt;p&gt;Criminals can fraudulently use other another person&#39;s identity data to buy goods, take out loans, take money from savings accounts, and hire cars. That person has to recover from the loss and endure badgering by debt-recovery organizations and bailiffs.&lt;/p&gt;&lt;h2 class=&quot;artSubtitle&quot;&gt;British Incidents Increase&lt;/h2&gt;&lt;p&gt;The U.K. also grappled with numerous incidents of personal data loss, leaving millions vulnerable to potential identity theft.  U.K. government agencies alone lost over 28 million people&#39;s identity data in 2007. Additional medical data records were lost due to NHS errors. Among the most infamous incidents in 2007 were: &lt;/p&gt;&lt;p&gt;- HMRC and Standard Life - 15,000 records exposed&lt;/p&gt;&lt;p&gt;- HMRC child benefit database - 25 million records lost&lt;/p&gt;&lt;p&gt;- HMRC and Countrywide Assured - 6,500 records leaked&lt;/p&gt;&lt;p&gt;- Northern Ireland Driving Agency - 6,500 records exposed&lt;/p&gt;&lt;p&gt;- Driving Standards Agency - 3 million records lost.&lt;/p&gt;&lt;h2 class=&quot;artSubtitle&quot;&gt;Credit Agencies Note Fraud&lt;/h2&gt;&lt;p&gt;The number of new identity fraud victims contacting credit reference checking agency &lt;a href=&quot;http://www.pcworld.com/tags/Experian+Group+Ltd..html&quot;&gt;Experian&lt;/a&gt; continues to grow: 2,570 victims of identity fraud contacted it for assistance in the first half of 2007; a 68 percent year-on-year increase.&lt;/p&gt;&lt;p&gt;Helen Lord, Experian&#39;s fraud and regulatory compliance director at Experian, said: &quot;The rate of identity fraud growth continues to be scary.&quot;&lt;/p&gt;&lt;p&gt;Identity theft criminals are being caught and punished. However, ITRC founder, Linda Foley, herself an identity theft victim, said: &quot;Identity theft is like the never-ending story. It acts like an oil spill that spreads in yet another direction with the ocean currents and wind despite best efforts to contain it.&quot;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://www.itepistemology.com/2008/01/more-than-120-million-affected-by-data.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-1124412177835441005</guid><pubDate>Fri, 21 Dec 2007 19:55:00 +0000</pubDate><atom:updated>2008-01-20T21:32:11.944-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IBM</category><title>Workplace of the Future?  IBM&#39;s Virtual World is one possiblity.</title><description>I know its been tried before, I participated in a similar experiment in the early 90&#39;s while working for AT&amp;amp;T with limited success.  Now IBM is taking a stab at designing the work place of the future,  in it  workers from all over the world would meet and interact in a Virtual Environment similar to &lt;a href=&quot;http://www.networkworld.com/news/2007/051507-ibm-second-life.html&quot; target=&quot;_blank&quot;&gt;Second Life&lt;/a&gt;,  called the Metaverse but with the security features that IBM expects already in place. &lt;br /&gt;&lt;br /&gt;This time communications may have advanced enough to actually pull it off.  The primary complaints of Telecommuting experiments in the past is that managers cannot verify that their charges are actually on the job.  A Virtual Environment solves the problem because the managers will see their charges at work in the virtual environment, or at least a virtual representation of their charges.&lt;br /&gt;&lt;br /&gt;If this type of work environment were to take hold, the only limitation a Virtually Enabled company employee would be high speed network access and a suitable PC.  Think of the savings in time, office space and last but not least travel expenses, not a minimal amount given oil hitting $100 a barrel these days. &lt;br /&gt;&lt;br /&gt;I hope their experiment or another similar experiment solves the Virtual Worker problem once and for all, and we&#39;ll all be able to live and work where we really want to in the near future.&lt;br /&gt;&lt;br /&gt;For more on IBM&#39;s Virtual World experiment check out &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/140756/ibm_virtual_world_defies_laws_of_physics.html&quot;&gt;PC World - Business Center: IBM Virtual World Defies Laws of Physics:&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.networkworld.com/news/financial/ibm.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;blockquote&gt;&lt;a href=&quot;http://www.networkworld.com/news/financial/ibm.html&quot; target=&quot;_blank&quot;&gt;IBM&#39;s&lt;/a&gt; uptight, starched-shirt image has survived for many decades, but the stereotype may finally meet its demise at the hands of a giant boulder and a meeting room up in the sky.&lt;p&gt;&lt;a href=&quot;http://www.pcworld.com/tags/IBM+Corporation.html&quot;&gt;IBM&lt;/a&gt; is building a &lt;a href=&quot;http://www.networkworld.com/news/2007/061807-businesses-experimenting-with-virtual.html&quot; target=&quot;_blank&quot;&gt;virtual world&lt;/a&gt; to help its employees collaborate, and while it&#39;s &lt;a href=&quot;http://www.networkworld.com/news/2007/103107-sun-virtual-teleworkers.html&quot; target=&quot;_blank&quot;&gt;not the first&lt;/a&gt; big technology company to do so, Big Blue may be unusual in that it decided not to mess with those silly laws of physics in its own virtual environment.&lt;/p&gt;&lt;p&gt;&quot;Why do we need walls and ceilings to do a meeting?&quot; asks &lt;a href=&quot;http://www.pcworld.com/tags/Michael+Ackerbauer.html&quot;&gt;Michael Ackerbauer&lt;/a&gt; of IBM, who is building the company&#39;s virtual world, called the Metaverse. &quot;We&#39;ve had meetings under water and up in the air. Meetings are where you want them to be.&quot;&lt;/p&gt;&lt;p&gt;There have been some mixed reactions to the unconventional model, Ackerbauer admits.&lt;/p&gt;&lt;p&gt;&quot;Some are saying &#39;wow, this is great, I&#39;m ready to go.&#39; Others are scratching their heads,&quot; he says.&lt;/p&gt;&lt;p&gt;Ackerbauer described the Metaverse project this week at Big Blue&#39;s Manhattan offices, where IBM &lt;a href=&quot;http://www.networkworld.com/news/2007/122007-ibm-qna-cio.html&quot; target=&quot;_blank&quot;&gt;CIO Mark Hennessy&lt;/a&gt; was meeting with analysts and journalists to show off a range of technologies IBM uses to help its employees collaborate.&lt;/p&gt;&lt;p&gt;IBM&#39;s two-year-old Metaverse project is in its early stages and it&#39;s not clear just how extensively it will be used throughout the company, which has 372,000 employees worldwide. While a small subset of IBMers do real work in the Metaverse, some of Ackerbauer&#39;s initiatives are simply experiments to see what&#39;s possible.&lt;/p&gt;&lt;p&gt;That&#39;s where the giant boulder comes in. The greenish rock is several times the height of the virtual world&#39;s human inhabitants, who gather around the boulder like office workers chatting by a water cooler.&lt;/p&gt;&lt;p&gt;&quot;You can kick this boulder about 1,400 kilometers,&quot; Ackerbauer says. &quot;We&#39;re just coming up with goofy games on the fly. Let&#39;s see how far we can kick it ... what would it be like in zero gravity?&quot;&lt;/p&gt;&lt;p&gt;Something useful will come out of this, Ackerbauer believes. If a few people from different countries gather around the boulder, they&#39;re more likely to work together in the future, he says.&lt;/p&gt;&lt;p&gt;&quot;There&#39;s business value to making work fun and making them want to come in every day,&quot; he says.&lt;/p&gt;&lt;p&gt;Ackerbauer and his team of 10 employees have learned both from massively multiplayer &lt;a href=&quot;http://www.networkworld.com/news/2005/121905-widernet-side.html&quot; target=&quot;_blank&quot;&gt;online games&lt;/a&gt; as well as Second Life. IBM interacts with customers in &lt;a href=&quot;http://www.networkworld.com/news/2007/051507-ibm-second-life.html&quot; target=&quot;_blank&quot;&gt;Second Life&lt;/a&gt; already, and owns plenty of virtual Second Life real estate.&lt;/p&gt;&lt;br /&gt;&lt;/blockquote&gt;</description><link>http://www.itepistemology.com/2007/12/workplace-of-future-ibms-virtual-world.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-3030363460440573798</guid><pubDate>Fri, 21 Dec 2007 19:18:00 +0000</pubDate><atom:updated>2008-01-20T21:34:38.176-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IBM</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>IOPES the Free Smart E-Mail Search Tool, Including Fuzzy Searches Available From IBM</title><description>For all of you who use your email systems as Personal Information repositories (databases) and I&#39;m one of them, but miss the ability to really miss the ability to quick search them for life&#39;s important facts, that you could do it they were a real database, guess what, IBM has launched a Smart E-Mail Search Tool designed to do just that, quickly search your email repository for just what your looking for.   In fact in case you not quite sure what your looking for, it even does fuzzy searches and best of all its FREE.   Initially developed for &lt;a href=&quot;http://www.pcworld.com/tags/Lotus+Notes.html&quot;&gt;Lotus Notes&lt;/a&gt;, there is a plug-in for &lt;a href=&quot;http://www.pcworld.com/tags/Microsoft+Outlook.html&quot;&gt;Microsoft Outlook&lt;/a&gt; as well.  I wonder if I can get them to write one for Thunderbird as well.&lt;br /&gt;&lt;br /&gt;Any way take a look at  &lt;a href=&quot;http://www.pcworld.com/article/id,140763-pg,1/article.html&quot;&gt;PC World - IBM Launches Free E-Mail Search Tool&lt;/a&gt;:&lt;br /&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;http://www.pcworld.com/tags/IBM+Corporation.html&quot;&gt;&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&lt;a href=&quot;http://www.pcworld.com/tags/IBM+Corporation.html&quot;&gt;IBM&lt;/a&gt; has launched an email search engine that does fuzzy searches. IBM said it used &quot;advanced algorithms that can interpret incomplete queries and find information such as phone numbers, people, meetings, presentations, documents, images and more.&quot;&lt;/p&gt;&lt;p&gt;The idea, according to Big Blue, is to help people find information in their &lt;a href=&quot;http://www.pcworld.com/tags/Lotus+Notes.html&quot;&gt;Lotus Notes&lt;/a&gt; email databases by identifying the most relevant information in a search query and extrapolating what the user is trying to find. There is also a plug-in for &lt;a href=&quot;http://www.pcworld.com/tags/Microsoft+Outlook.html&quot;&gt;Microsoft Outlook&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;It&#39;s free, is called IBM OmniFind Personal Email Search (IOPES), and emanates from the company&#39;s research labs. According to IBM, it can find information such as a person&#39;s phone number even if the email database does not have the words &quot;phone&quot; and &quot;number&quot; in the text. IOPES also allows users to create, save and share personalized searches for future use.&lt;/p&gt;&lt;p&gt;The company reckoned that the tool improves on standard search tools because you don&#39;t get irrelevant search results as with a simple text or keyword search. Common search concepts, such as dates, times and phone numbers, are built into the software; additional search parameters, such as meeting requests or specific locations, can be defined and used on the fly without any programming expertise. Such user-defined concepts can be shared between individuals and used to build a more personalized search system, said IBM.&lt;/p&gt;&lt;p&gt;IOPES was created through a collaborative effort spanning IBM labs in Almaden in California, Haifa and Delhi. The software uses the Unstructured Information Management Architecture (UIMA), an open source software framework that helps organizations build new analysis technologies to realize more value from their unstructured information by discovering relationships, identifying patterns, and predicting outcomes.&lt;/p&gt;&lt;p&gt;Originally developed by IBM, UIMA is now an open source project at the &lt;a href=&quot;http://www.pcworld.com/tags/Apache+Software+Foundation.html&quot;&gt;Apache Software Foundation&lt;/a&gt; (ASF), according to IBM. The company claimed that UIMA was used to enable text analysis, extraction and concept search capabilities in other parts of the IBM OmniFind enterprise search portfolio, including OmniFind Enterprise Edition, OmniFind Analytics Edition, and OmniFind &lt;a href=&quot;http://www.pcworld.com/tags/Yahoo%21+Inc..html&quot;&gt;Yahoo!&lt;/a&gt; Edition.&lt;/p&gt;&lt;p&gt;&quot;With gigabytes of email storage readily available to nearly everyone, email has evolved from a simple communication tool into a personal database where we retain vast amounts of valuable information,&quot; said Lotus distinguished engineer and chief technology officer &lt;a href=&quot;http://www.pcworld.com/tags/Doug+Wilson.html&quot;&gt;Douglas Wilson&lt;/a&gt;. &quot;We continue to deliver better tools to speed and improve personal mailbox search, and OmniFind Personal Email Search illustrates how IBM&#39;s advanced technology delivers the ability to quickly and easily access the precise information we need, exactly when we need it.&quot;&lt;/p&gt;&lt;p&gt;Prior to release on alphaWorks, IOPES was tested inside IBM by early adopters who participate in the company&#39;s internal technology adoption program, reckoned IBM. AlphaWorks opens up some of the work being done by IBM labs and provides it free.&lt;/p&gt;&lt;/blockquote&gt;&lt;/div&gt;One by One my excuses for being unorganized are bitting the dust, looks like 2008 might be the year I actually become organized.</description><link>http://www.itepistemology.com/2007/12/iopes-free-smart-e-mail-search-tool.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7050009308414540433.post-8622509922350511366</guid><pubDate>Fri, 14 Dec 2007 05:54:00 +0000</pubDate><atom:updated>2007-12-13T23:54:42.815-06:00</atom:updated><title>Has Artificial Intelligence Arrived? Russians Claim Smart Chatroom Bot</title><description>If as some have theorized the criteria for achieving Artificial Intelligence is creating a program significantly sophisticated enough to be able to converse with humans without the humans being able to distinguish between it and other humans, then that day may have arrived. &lt;br /&gt;&lt;br /&gt;I4UNews is reporting that a Russian website says it has a software tool designed to troll  online chat forums  and posing as a man collect personal information from unexpecting women including names, and phone numbers.   They claim that it can chat with up to 10 different women at a time. &lt;br /&gt;&lt;br /&gt;While the claims sound fantastic,  PC Tools &lt;span id=&quot;intelliTXT&quot;&gt;who previewed the software&lt;/span&gt;, has warned that the software could be used to harvest personal details online for nefarious uses.&lt;br /&gt;&lt;br /&gt;Whether or not the claims are true will become clear when the software goes on sale &lt;span id=&quot;intelliTXT&quot;&gt;around February  15.&lt;br /&gt;&lt;br /&gt;To find out more, check out &lt;/span&gt;&lt;a href=&quot;http://www.i4u.com/article13506.html&quot;&gt;I4U News - Russian Computer Program fakes Chatroom Flirting&lt;/a&gt;&lt;br /&gt;&lt;span id=&quot;intelliTXT&quot;&gt;&lt;/span&gt;&lt;br /&gt;So before you give out personal information to someone in a chat room, think twice, you might be talking to a nefarious bot.</description><link>http://www.itepistemology.com/2007/12/has-artificial-intelligence-arrived.html</link><author>noreply@blogger.com (Steven Ashley)</author><thr:total>0</thr:total></item></channel></rss>