On Technology

Tuesday, May 29, 2007

Google Toobar - Spyware???

In April, Internet users typed a staggering 3.77 billion searches into Google, according to statistics compiled by Nielsen/NetRatings. That total accounted for just over 55 percent of all searches; Yahoo was second with roughly 22 percent.

Unknown Fact
It is unknown to many of us, even some advance users, in exchange for rapid answers to Internet searches, Google collects and stores a range of information about each searcher, including the query, the date and time, and the physical location of the computer from which the query was made. Even more specific information is logged if the user has installed the Google Toolbar and enabled certain advanced features.

Is Google service or Spyware?

Wednesday, May 23, 2007

Google is thinking Partnership with Salesforce.com

For all the mergers and acquisitions the business world has seen in the past month, Google and Salesforce.com are reminding Wall Street that strategic alliances are still in style.
According to a Monday article in the Wall Street Journal, the two Internet companies are in talks about a partnership that would target Microsoft . The paper cited unnamed sources that claim the companies are working out details of a possible alliance that might be revealed within weeks.
Google is, of course, the Internet search king and online advertising titan. Salesforce.com is the fast-growth, on-demand CRM vendor. An alliance between the two could take the form of a Web-based offering that integrates some of Google's online services, such as Gmail and Google Talk, with Salesforce.com's CRM tools.

Dissecting the Rumor
Google and Salesforce.com could not immediately be reached for comment. But Wall Street liked the rumor. Sales of Salesforce.com stock rose about 5 percent on Monday morning, indicating that many are bullish about the impact of a partnership with Google. The deal would make plenty of sense from a public relations perspective. Microsoft is planning to release its CRM tool as a hosted application at the end of the second quarter. Both companies would love to steal some thunder from Redmond.
A partnership would get the attention of the market. We're talking about two of the biggest software-as-a-service companies -- and, oh, by the way, they have a common enemy in Microsoft. From a political standpoint, it makes a lot of sense for those two companies to be aligned.

Competing with Microsoft
Salesforce.com's emerging enemy is Microsoft Dynamics CRM Live. The software is powered by the upcoming release of Microsoft Dynamics CRM, codenamed "Titan," which uses the same code base to deliver both on-premise and hosted deployments. Dynamics CRM Live lets customers choose the deployment model that most closely matches their needs.
Microsoft is also boasting a partnership of its own with ExactTarget to offer a packaged integration of its on-demand e-mail software for e-mail marketing.
Salesforce.com's customers are no stranger to Google. Salesforce.com acquired a service last August that lets users create ads in Google AdWords and monitor their campaigns without leaving the Salesforce interface. That makes sense, because it gives Salesforce.com customers the opportunity to attract business, but he said he's not so sure how this extended alliance would work.
Though, thing to note is that, these companies have similar philosophies and enemies, but I don't see them having a common target audience yet. Everything Salesforce.com has done in the past year or two is concentrating on moving up to larger enterprises, where I think Google has a limited business impact today.

AVIS Announces In Car Broadband Wireless Internet

On Monday, car-rental company Avis started rolling out a new service that will give you the ability to take a wireless hotspot wherever you go. The service is called Avis Connect, and initially will be available from the Avis shop at the San Francisco International Airport.
Essentially, Avis Connect is a small book-sized device that allows travelers to have Wi-Fi connectivity in their car, at meetings, or in hotel rooms, at a rate of $10.95 per day.

Customers will not need cellular data cards or special software, and Avis Connect reportedly works with all Wi-Fi laptops, PDAs, and other wireless-enabled devices. The portable Wi-Fi hotspot device is powered through a wall outlet or a car's cigarette lighter port.
Avis Connect, first announced in January and developed by Autonet Mobile for the car-rental company, is simple to use. Anyone who has a Wi-Fi-enabled laptop or device can simply log on and surf.

Reasonable Option
Avis Connect seems like a reasonable option for travelers to get wireless broadband. If they don't have that capability via EVDO or HSDPA cellular access in a laptop a car-rental company seems a good fit for travelers' mobile Net needs. Avis already has been providing GPS navigation devices in its rental cars. Though it would be more economically sound to get a data card and pay a monthly fee if the portable Wi-Fi access is used frequently. For salespeople who are basically living in their car for days at a time, turning your car into a mobile hotspot can make sense.

An In-Car ISP
Autonet Mobile, said on its Web site that its TRU technology runs over both 3G and 2.5G cellular data networks. The company said that its technology performs session, link, and content management on the network so users don't experience disconnects while in motion.
The connection works even through tunnels, over bridges, or between cities, the company claims, and covers some 95 percent of the United States. Download speeds range from 600 Kbps to 800 Kbps, with upload speeds of 200 Kbps. The service is compatible with Windows, Mac, Linux, and Solaris. Connection range is up to 100 feet from the device and no additional antenna is needed.
After San Francisco, the rollout will move to Avis locations at airports in San Jose, Oakland, Los Angeles, and Newark. In third quarter, the rollout will go to Atlanta, Chicago, Dallas, Miami, New York, San Diego, and Seattle.

Tuesday, May 08, 2007

Sun Micro Intros Ajax-Competitor JavaFX

Another contestant entered the race Tuesday for tools to build the next generation of multimedia on portable devices and other platforms. During the first day of the JavaOne developers conference in San Francisco, Sun Microsystems announced the launch of JavaFX.
The new JavaFX, a family of products that initially includes JavaFX Mobile for smartphones and JavaFX Script for development, will support all content and applications currently available across the billions of Java technology-based devices in the world today.
The Santa Clara, California-based company also said that JavaFX will deliver the ability to create interactive content, applications, and services from the desktop to mobile devices to the living room.

Outside the Browser
JavaFX Script is not a general purpose programming language like Java. It's more like writing HTML or JavaScript. It can run outside the browser, and is competing against Ajax, but it's competing more against Silverlight and Apollo.

Labels: , , ,

Black Berry - Reach me anywhere Phone

The BlackBerry, which for many companies has become an extension of office e-mail, might also become an extension of the office phone system, thanks to Research In Motion introducing the BlackBerry Mobile Voice System.
Describing the new offering as "the seamless convergence of a BlackBerry smartphone with an office desk phone," RIM said MVS allows BlackBerry users to be authenticated to an enterprise telephone system, and to gain access to those functions right from the BlackBerry's menu.
With MVS, a user can give out what RIM calls a "Reach Me Anywhere" phone number that rings both the owner's office desk phone and the BlackBerry. The user's corporate caller ID is displayed from the BlackBerry as well as the office phone, and the smartphone can access such deskphone functions as transfer, extension dialing, and voicemail.

Labels: , ,

Beware - Windows Reactivation Trojan Horse

A new Trojan Horse is making the rounds, impersonating Windows reactivation and antipiracy messages with the goal of duping users into divulging their credit card information.
According to computer security firm Symantec, the Trojan, dubbed Trojan.Kardphisher, creates a Windows look-alike screen, headlined "Microsoft piracy control, and indicates that the copy of Windows was activated by another user and needs to be reactivated". "To help reduce software piracy, please reactivate your copy of Windows now," it instructs. "You must activate Windows before you can continue to use it." The user is given two choices: reactivating Windows over the Internet immediately or doing it later. No other applications can be run, and Task Manager cannot be launched to force-quit the Trojan.

Yes or No?
If reactivation is deferred, the system is shut down. And if users proceed with the fake reactivation, a second screen appears, requesting private information that includes location, contact information, a credit card number, the card's expiration date and three-digit security number, and even an ATM PIN.
The Trojan informs the user that the credit card information will not be charged. But, once entered, the information is sent to the fraud's perpetrators to use as they wish. The initial screen even references an actual Microsoft antipiracy site: microsoft.com/piracy.
Per Symantec, Trojan affects Windows XP, Windows 2000, Windows Server 2003, and even earlier versions of Windows, including 95, 98, and NT.
Sometimes, Windows does indeed require reactivation, such as after substantial hardware upgrades, but Microsoft does not ask for financial information. The Trojan's request for reactivation and its close resemblance to actual Windows screens make it a potentially effective attack against some users.
While Symantec has posted detailed instructions on how to remove the Trojan, some observers have noted that fake information can be entered to "activate" an infected Windows machine when prompted, so that the Trojan could then be removed.

Trust No One
This Trojan teaches us all a good lesson - "Trust No One", Sometimes the creators of Trojans attempt to impersonate Microsoft, a bank, or even a government organization. Whatever the warning or message says, we must make very sure it is genuine before giving up any personal details, financial or otherwise.
It is far better to doubt a genuine request until proper verification is provided, than it is to blindly place your trust in a message simply because it appears to have come from a trusted source.
Sad though it may be, the days of leaving your front door unlocked are over. In these times, we not only need a lock on the door, we need a security guard watching the front door, the back door, and everywhere in between.