Saturday, July 16, 2005
As Firefox approaches the 10 percent market share milestone, it is expected to gain "significant traction" once its acceptance grows among corporations, according to NetApplications.com.
I'm a diehard Internet Explorer person and I have to admit, at least half the time now I use Firefox instead of IE.
Friday, July 15, 2005
Am I the only one who sees a problem with this business model? Just as Podcasts fill the free and legal audio void, free and legal video will also fill that void, thereby enabling those who don't want to be bound by DRM and such to stay entertained.
Except for the PATRIOT Act, the public library is looking more and more entertaining. In other words, there is one way not to be held captive by the content providers with their onorous DRM -- don't buy their content. Just like digital TV, they may be selling but the masses may not be buying.
Thursday, July 14, 2005
They further report that "Rosetta", the virtual machine that allows native PPC Mac OS X applications to run on the Intel hardware is "seamless" and fast.
Those of you who worried about the new Mac's performance might rest a little easier after reading this.
Read it and judge for yourselves.
For your continued enlightenment...
MissM at home, finally.
Wednesday, July 13, 2005
- Microprocessor sales were up 38% year-over-year.
- Opteron server microprocessor sales were up 89% as enterprises feel more comfortable with AMD at the heart of corporate systems.
- Mobile microprocessor sales were at record levels. There are 60 design wins for the Turion mobile chip.
- Microprocessor selling prices were up 6% in the quarter, which certainly helped gross margins.
- Memory sales were down 31%, a sign of the brutal competitive market for semi-conductor memory.
AMD was forecast by analysts to show a loss for the quarter, so being profitable is a positive sign.
Apple shipped 1,182,000 Macintosh® units and 6,155,000 iPods during the quarter (up over a million units sequentially from the previous quarter), representing 35 percent growth in Macs and 616 percent growth in iPods over the year-ago quarter.
- iTunes Store now represents about 5% of the U.S. music market. Almost 500 million songs sold.
- Over a million podcast subscriptions in first two days
- Apple store retail sales are up 56% with 12.2 million visitors last quarter
- Education market is up 16% to the highest level in 9 years
- Gross profit and net profit are at the highest levels in years.
First, we can discount the rumors of a couple of weeks ago that iPod sales are off. Au contraire. Inventories are within the planned 4-6 weeks of stock. The "better value" iPods launched two weeks ago -- lower price with color LCD and photo capability -- should continue to drive consumers to Apple.
The overall iPod ecosystem has no close competitors, period, as there are over 1,000 iPod-related products available. Apple in just a couple of years has become a force to be reckoned with in the entire music industry, as any artist with a chance at an iTunes Store song pane will tell you. This opens up opportunities for further differentiation.
The significant uptick in Mac sales is also fortuitous. But its not just the iPod halo effect: iPod has no impact on the K-12 education market, for instance.
With an entrenched position in music that is still expanding, a strong professional graphics and video market position, and renewed respect for the value and quality of the Mac line -- and that certainly includes OS X 10.4, Apple is on a roll.
The current quarter should be the strongest of the fiscal year, as Apple and the rest of the industry are in high gear chasing back-to-school sales.
All in all, an excellent quarter that shows Apple is back.
Some of the report's most compelling highlights include:
- The FBI estimates that cybercrime cost about $400 billion in 2004.
- In an investigation, codenamed "Operation Firewall," U.S. and Canadian authorities announced the arrest of 28 people from six countries involved in a global organized cybercrime ring. They operated Websites to buy and sell credit card information and false identities. They bought and sold almost 1.7 million stolen credit card numbers. Of these stolen credit cards, financial institutions have estimated their losses to be $4.3 million.
- The use of pseudonyms or online identities provides an anonymity that is attractive to criminals. Sources estimate that perhaps only 5% of cybercriminals are ever caught or convicted.
The general population of Internet users may not know exactly what it is, but they know they don't like it. Their machines slow to a crawl, they are forced to click through ads to do their work or pursue their pleasures, sometimes seemingly endlessly. They worry about trojan horse programs stealing their personal data and making theft of their identity possible.
Businesses of every size now see spyware and adware, no matter the definitions, as a major problem. And trojan horses have been discovered in Isreal custom designed to facilitate industrial espionage. It must be pointed out that this incident did not involve files obtained from the Internet. Instead, they were spread on physical media using some fairly simple social engineering. But the lesson is clear: The machines we use in so much of our life threaten to do us harm at the hands of others.
Recently, I read where an officer of a company which distributes adware said consumers have to be educated on the difference between adware and spyware and other malicious programs. What I took from that told me he thought that if consumers were so educated, they would tolerate adware much more readily.
I have news for him; Computer use is often an intensely personal experience and the majority of people resent ANY intrusion into it. Don't believe me? Look at the proliferation of ad and popup blockers. Only the most technically inept are not aware of their availability and, in my personal experience (which may or may not be typical) adding them to the machine is THE most often requested software upgrade.
We don't just dislike popup ads. We resent them deeply. Hate is probably not too strong a term for the way we feel. The same goes for those animated Flash presentations you insist on putting in the middle of texts we want to read. I will read and occasionally react to a tastefully placed advertisement. It's not as if I think advertising is bad. I do not. I just don't wish to be forced to deal with it, have it detract from my surfing experience or leave anything on my machine, no matter what it is. I have yet to find anyone who disagrees with me on this, though I admit I haven't asked anyone I know in the online advertising trade.
There are issues of who gets to control whose computer, as well. But the vast majority of users aren't really aware of these. They just want to be able to view the content they choose without wading through layers of ads.
CNet's News.com is reporting adware companies are trying to clean up their act and image. The driving force in this is the specter of federal legislation and nothing I've found signals anything like a moral re-awakening on the part of the adware folks. They're just afraid of possible legal consequences. In cases where companies have actually posted accurate details in licenses and made uninstallation of the adware easy, their penetration (in number of installations) has gone 'way down. There is a lesson in this, but no one I know expects these companies to hear it.
It seems Intel's compiler for Fortran 77 and Fortran 90 produces code that looks for the Intel trademark and if it doesn't find it, refuses to enable several optimizations, regardless of whether or not the chip it does find is capable of using them or not. Note that this is NOT the usual cpuid routine, but something hidden. The code so produced runs much more slowly or segfaults on AMD processors.
The "bug" has been fixed, but the compiler still does not use cpuid for identifying the processor. Intel claims it was a mistake. Various observers label it a dirty trick. Read it and make up your own mind.
Tuesday, July 12, 2005
Not to mention I think its useful for all firefox users...
MissM in Louisiana
Monday, July 11, 2005
So expect that HP will (quietly) become a major Teradata customer. In my opinion, there is no better technology for creating the complex, near real-time transaction systems that drive supplier-facing and customer-facing operational excellence. Part of that opinion rests on the deep and strategic use of Teradata by industry-leading companies who are betting their business on NCR Teradata. (For the record, I have no financial relationship with NCR).
-- Peter S. Kastner
One of the big tricks is to go online with stolen ID and change the notification address, then ask for a higher credit limit. You can imagine what happens next. How large banks miss an obvious check is beyond me. Bank stockholders, who are paying billions in fraudulent charge reimbursements, ought to be asking why banks do not send an address change notification to the old address. That way the people whose ID is stolen have a clue when their bank statement is changed to Pocohontas, Iowa. The banks are acting like fools or knaves.
Companies are hot on the idea because the rack concept saves precious office and/or cubicle space. OEMs are in favor of it because, just like in servers, they tend to lock-in customers to a brand because the blades are not interchangeable between various makers. You need a rack from the company who makes your blades and this makes switching brands much more expensive. Given a well thought-out setup, blades are also easier to service because you just jerk out the offending unit, plug in the replacement and restore from the storage appliances. There's no need to disrupt someone's office.
Since they took over IBM's PC division, Lenovo seems intent on offering a truly complete line of computers and this is proof. It's entirely possible the broad spectrum of their offerings will quickly overcome any hesitancy about the brand being under new ownership. In short; it looks as if they have all the smart moves on tap.
The Electronic Privacy Information Center (EPIC) has filed a complaint with the Federal Trade Commission (FTC) in which they point out that many web sites are selling information protected by law, such as drivers license information, postal box information, cell and long-distance phone records.
This kind of information has been used in the past by stalkers to find victims they subsequently murdered, which is why it is protected by law.
The link above is to a short article in The Inquirer and there is a link to the actual complaint on EPIC's web site. I urge you to read both. This one is not rampant paranoia. This is a real threat, by any standard.
Most Linux and BSD distributions, some Microsoft products and many applications from all over use this set of functions. Gentoo, Debian, Mandriva and others have already issued patches. I urge anyone using Linux, BSD or any application which uses PNG (Portable Network Graphics) format images to check for updates pretty much continuously until they get one for this problem.
It is a hard vulnerability to exploit, but with the increasing sophistication of attackers, it WILL be exploited. Get your patches as fast as you possibly can.
Also, some older Microsoft products use this library of functions and are vulnerable. Watch for updates to them, as well.
Sunday, July 10, 2005
There are other things that are equally important and perhaps chief among them is user education and enforcement of policies, both security and otherwise, that foster a safe environment. Smaller businesses are particularly prone to this problem; once they've invested in an expensive firewall, they assume their security quotient has risen significantly, when in fact it may not have advanced the cause at all.
This is worth a read. It applies to the home network and small business as well as larger entities. Security is a state of mind as well as a state of being.