Tuesday, January 29, 2013

Applr brings social networking to app purchases


A new online service lets users combine social networking with App Store shopping as they peruse the latest offerings for their Phone and iPad. Applr launched this week, the creation of developer Michael Johnston, who has been working on the project since 2010.
After users register for an account, they're asked to list their most-recommended apps. They can also find other users to "follow"--much like Twitter or Facebook--in order to receive app-buying recommendation from like-minded indviduals. The service also seeks access to your Apple ID to scope out your full range of purchased apps, but giving that permission is not a requirement to use the service.
Johnston told Macworld that Applr does not store a user's Apple ID password and can't make purchases on their behalf. Allowing that access, he said, makes Applr work more seamlessly--making it easier for users to rate apps they see listed or recommended on the site--but using Applr without Apple ID permissions "works almost as well."
The site lists the most popular apps at the top of its home page, and at first glance it doesn't appear all that different from the "Top Selling" list in the App Store itself--offerings like Google Maps, Evernote, YouTube, and Dropbox top Applr's popularity list. Johnston said Applr stands apart because users can compare apps by prices, the devices the software runs on, and the intensity of for-and-against opinions about particular offerings.
Johnston said a user's ability to follow other users should shape the kind of recommendations they receive.
"You can follow people you know, trust, and have similar interests with in order to get recommendations that are relevant to you," he said. "Because Applr operates on the follow model, users tailor the recommendations they see to the apps they're personally interested in, making it unique for every person."
Applr currently exists only as an online service; Johnston said he "absolutely" hopes to make it available as a native iOS app in the future. There is no cost to use the service.

Read more »

Nokia offers paid upgrade to music service


Nokia plans to roll out in the first quarter of this year its Nokia Music+, a new subscription-based upgrade to its free-to-stream mobile music service.
The paid service will offer unlimited downloads of sets of tunes or "Mixes" for offline playback, and unlimited track skips, Nokia said on Sunday.
Nokia started offering last September in the U.S. its Nokia Music, a free music streaming service. The service will continue to be available free of charge, with no advertisements, registration or subscription to Nokia Lumia owners, Nokia said.
The upgrade service, tentatively priced at around US$3.99 per month, will also offer higher quality streams, allowing downloads at eight times the existing quality, Nokia said. Users can also set rules to only download higher quality audio when they are on Wi-Fi, for example. The price of the service will vary according to the territory in which it is offered, Nokia said in a blog post. The price in Euros for the service is also likely to be about 3.99 per month.
The free service has allowed users to download up to four Mixes, each of which contains hours of music, and play them without an Internet connection. The paid service removes that limit, Nokia said in the blog post.
Mixes are created by Nokia specialists who curate the genres or music types, Nokia said in June last year.
Under the upgrade service, users can have lyrics streaming for many tracks. They can also listen to Nokia Music through a Web app on Internet-enabled devices including a PC or tablet.
"It's the only smartphone music service out there offering access to millions of songs out of the box without the need to sign up, sign in, or suffer adverts in between enjoying the music," Nokia's vice president of entertainment, Jyrki Rosenberg, said in the blog post. "When you add in the ability to skip songs and save playlists for offline uses like the tube, you have something unique."
Nokia swung to a net profit in the fourth quarter of last year, partly on increased sales of its Lumia smartphones. Sales of the Lumia smartphones went up to 4.4 million units from 2.9 million in the previous quarter and 4 million in the second quarter. Nokia's portfolio improved with new models like Lumia 920, but the company still lacks a "true hero model" that can compete effectively with Apple's iPhone or Samsung Electronics' Galaxy S III, research firm Strategy Analytics said.
John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's e-mail address is john_ribeiro@idg.com

Read more »

Facebook legal notice could get you cash, so don't trash it


Facebook recently sent a legal notice to users that may appear daunting at first glance, but before you relegate it to the trash bin you ought to take a look at it -- it could mean cash in your pocket.
The notice is meant to notify some of its U.S. members that their names, profile pictures, photographs, likenesses, and identities were unlawfully used to advertise or sell products and services through Sponsored Stories without obtaining those members' consent.
"Sponsored Stories" is targeted advertising that uses information about your friends to sell stuff to you.
To settle a class action lawsuit (Angel Fraley v. Facebook) resulting from those allegations of unlawful use of its members' content, the social network is proposing to pay $20 million into a fund to be used to pay members who appeared in the sponsored stories.
If you received the legal notice from Facebook, you may be paid up to $10 as part of the settlement.
There's no guarantee you will get the money, however.
As the notice points out: "The amount, if any, paid to each claimant depends upon the number of claims made and other factors detailed in the settlement. No one knows in advance how much each claimant will receive, or whether any money will be paid directly to claimants."
Since as many as 100 million Facebook members may be affected by the settlement, and the fund would be exhausted after paying $10 to 2 million members, there's a good possibility that the alternative distribution scheme outlined in the settlement will be implemented.
That alternative would divvy up the money among a number of non-profit organizations involved in educational outreach that teaches adults and children how to use social media technologies safely, or are involved in research of social media.
According to the long form of the legal notice [PDF], those organizations include the Center for Democracy and Technology, Electronic Frontier Foundation, MacArthur Foundation, Joan Ganz Cooney Center, Berkman Center for Internet and Society (Harvard Law School), Information Law Institute (NYU Law School), Berkeley Center for Law and Technology (Berkeley Law School), Center for Internet and Society (Stanford Law School), High Tech Law Institute, (Santa Clara University School of Law), Campaign for Commercial-Free Childhood, Consumers Federation of America, Consumer Privacy Rights Fund, ConnectSafely.org, and WiredSafety.org.
You can fill out a claim form and see what happens.
The Fraley case began winding its way through the courts in March 2011, when five Facebook members, including two minors, maintained they claimed to represent a class of people injured by the Sponsored Stories.
In June 2012, Facebook and its opponents in the litigation announced a $10 million settlement in the case in which all the money would go to social service organizations and advocacy groups involved in the protection of children in the context of social media.
About a month later, the federal judge presiding over the case -- Judge Lucy Koh, who also presided over Apple's successful intellectual property case against Samsung in the U.S. -- recused herself from the case without an explanation.
Judge Richard Seeborg, who took over the case from Koh, subsequently rejected the $10 million settlement . In denying the proposed settlement, the judge maintained that Facebook did not adequately justify the size of the final deal.
A deal with a new settlement amount was hammered out in October and received preliminary approval from Seeborg in December.


Read more »

Twitter's Vine ripe with users of video sharing service


Twitter launched Vine recently and it appears the video sharing service that lets you post clips up to six seconds long is already a hit with users.
Vine is a completely public and compelling medium that gives you a brief window into what people all over the world are seeing, or the kinds of things they're thinking about. You can share the brief videos on Twitter and Facebook.
Just like Facebook's Instagram turns regular people into creative photographers, Vine encourages anyone with an iPhone or iPod touch to make video montages. And unlike other platforms where it might take minutes or more to get your video fix, Vine makes it simple and fast to create and consume it -- perfect in a world where our digital attention span continues to shrink.
It takes a bit of ingenuity to create a good vine, and that's what Twitter intended, saying last week that "constraint inspires creativity."
Take Twitter co-founder Jack Dorsey, for example.
He recently posted a clip of a movie in which Owen Wilson is asked "You box?" to which he replies "No. I mean, not really. No." It's food for thought about what message, if any, the billionaire intended.
Search for the term "vine" at Twitter and you'll see them pop up in your feed or go to the websiteVinepeek , which offers a real-time stream of vines from all over the world, and you'll see everything from random scenes at work, a display of what books are on someone's nightstand, a street protest, and other random stuff.
People are filming cats and dogs, not to mention seeming magic tricks and disappearing food thanks to vine's start/stop recording feature that lets you create montages. And here's one getting some traction: Godzilla battles Mr. Hand.
Brands are also getting in on the action and using the platform to engage with their audiences.
For instance, 30 Rock fans can get a whirlwind run through NBC's studio, Gap propped a handful of itsvintage ads and Moose Tracks ice cream shows a close-up of one of its creamy concoctions.
The proof of the popularity is in the numbers. The Apple App Store has named it an Editor's Choicedownload.

Read more »

The iPad mini: 2013's next big business tool?


Not long after the iPad mini launched last fall, Cameron Yuill, the founder of AdGent Digital, started using the device to make business presentations.
Convenience was one reason: The iPad mini has all the capabilities of its bigger predecessor, including wireless AirPlay mirroring that allows him to project the tablet's screen onto a nearby TV. But salesmanship was a factor, too: There's nothing like arriving at a meeting, seemingly empty-handed, only to pull the latest and greatest Apple technology from a jacket pocket.
"I pull it out and people are quite astounded," says Yuill, whose company provides advertising on mobile platforms. "We're in the business, so we're promoting the usage as much as we can."
Months after the iPad mini launched to the public, the device appears to be a hit in the consumer sector, combining with the fourth-generation iPad to sell more than 3 million units in the opening days of the product's life. But analysts have yet to determine whether the new, miniature tablet will follow its larger iOS predecessors from the living room to the boardroom--and if so, what route it will take to get there.
Schools and hospitals
Two institutions likely to be big iPad mini adopters are schools and hospitals. The first is understandable. Schools already use the iPad, but want to cut down on technology costs. At $329, the iPad mini's starting price is $170 less than that of the iPad with Retina display. Lynn University in Florida will distribute the tablet to freshmen next fall, and the East Jordan, Michigan, school district is buying 770 units of the iPad mini. In the meantime, KinderTown--a developer of educational apps aimed at the 3- to 8-year-old set--saw a dramatic rise in iPad mini usage after the holidays. Inside Higher Ed has endorsed the iPad mini's suitability for classroom use.
But why hospitals? For an unexpected reason: The 7.87-inch-long iPad mini is just the right size to fit in the 8.5-inch-deep pocket of a standard medical lab coat.
"It really fits that lab coat pocket," says Marianne Braunstein, vice president of product management atEpocrates, which makes medical apps for iOS devices. A survey that her company conducted ahead of the iPad mini launch found that one in three doctors planned to buy the new, smaller tablet.
"They're moving constantly between exam rooms, around the hospital...they're very, very mobile people in their careers," Braunstein says. "They need to have devices that allow them to be very portable."
The iPad mini might seem to be at a disadvantage in a hospital, since it doesn't offer the high-resolution Retina display of its bigger counterparts. But Dr. Stephen Ferzoco, chief medical officer atMobiquity Inc., agrees that doctors will be seeking out the mini: The bigger iPad, he says, is just too cumbersome.
"From a form factor standpoint, doctors can now carry the mini device around in their coat pockets," he says. "This effectively means that their electronic medical records, order entry, reference materials, and imaging capabilities are within arm's reach at all times."
Even in hospitals, though, Braunstein expects that doctors will have to bring in the iPad mini themselves, rather than using hospital-issued models.
"For the most part, it's going to be the individuals," she says. "These devices make their lives easier, so that's what they're going to be bringing into the workplaces."
The winding path to adoption
Previous iOS devices entered the workplace quickly, but by wildly different routes.
The iPhone, for example, was initially disdained by IT departments that had built their security infrastructure to support the then-dominant Blackberry line of phones from Research in Motion. But the iPhone elbowed its way into the office anyway, initially brought in by top executives and then, increasingly, their underlings--forcing IT departments to adapt. The "bring your own" approach worked for Apple: More than five years later the iPhone is one of the dominant smartphones in the enterprise market.
The iPad, in contrast, was more immediately embraced by institutions--and ended up being distributed in businesses and other workplaces on more of a top-down basis. Within months of its 2010 launch, the tablet was at work in car dealershipscockpits, and medical schools, as institutions recognized that it could help reduce paperwork and provide more mobility to users than traditional laptop computers.
Analysts say that they expect the iPad mini to follow the iPhone's trail into the workplace, arriving initially as a BYO device before institutions grasp how to use the small tablet to their advantage.
"I think it's hard to say it's going to definitively follow one [route] or the other," says Frank Gillett, a vice president and principal analyst with Forrester Research in Massachusetts. "The mini, because it's so small, will follow an individual approach initially--though some businesses will find a smaller, less expensive screen appealing."
The larger iPad should remain the device of choice for many businesses, Gillett says, since cash register applications such as Square Register and business applications such as SalesForceprobably make more sense on the bigger tablet. But in other instances--particularly where device cost is a major factor--the iPad mini has an advantage. It could also prove advantageous in situations where space is at a premium, particularly for users who spend lots of time on planes and in other cramped locations.
"It's like a lot of other things," Gillett says. "You pick the right tool for the job."


Read more »

What IT needs to know about near-field communications


The rise of near-field communications (NFC) has been part of the discussion in the mobile industry for years. Unfortunately, the technology hasn't generated much more than discussion to this point.
So far, all who have predicted the ubiquity of the point-to-point communications technology have been wrong. Executives at major tech companies - Apple and eBay, for example - have scoffed at the idea of NFC as an everyday tool, and consumers in general still have no idea what it is.
Regardless, the technology provides ample opportunity for businesses, and is still expected to make a slow climb to relevance over the next few years. With separate factors helping to drive growth of the technology into new markets, it's time to consider how NFC can help in the enterprise.

Read more »

Samsung investigates worker's death following chemical leak at chip plant


A chemical leak at a Samsung Electronics plant in South Korea has resulted in the death of a contract worker, while four others have been discharged from a hospital after treatment, the company said Monday.
Hydrofluoric acid leaked from a chemical supply system during a maintenance operation at Samsung's Hwaseong site, the company said. A service company sent the contract workers to deal with the problem, Samsung said.
"Sadly, one worker died due to complications," the company said in a statement offering condolences to the contractor's family.
The Hwaseong site, near Seoul, is home to one of the world's largest memory chip factories. Last June Samsung said it will invest almost US$2 billion in a new production line due to open there by the end of this year. The line will use 20-nanometer and 14nm production processes to make mobile application processors on 300 millimeter wafers.
Korean media reports said the leak, of about 10 liters of hydrofluoric acid from a tank with a capacity of 500 liters, began around 11 p.m. local time on Sunday.
Yonhap News Agency reported that the company delayed reporting the leak for up to 15 hours after it occurred.
Hydrofluoric acid is used to etch away silicon oxides in the manufacture of semiconductor wafers.
It is highly corrosive and can also dissolve glass and stainless steel. It burns exposed skin, and over-exposure to vapor or mist can cause tissue damage and death.
Samsung said the leak has been contained and that it will investigate the circumstances surrounding the incident.
Peter Sayer covers open source software, European intellectual property legislation and general technology breaking news for IDG News Service. Send comments and news tips to Peter atpeter_sayer@idg.com.

Read more »

Security software showdown! 9 antivirus suites empirically tested


If you're like a lot of people, when it comes time to renew your security software, you may ask yourself, "Do I really need to upgrade to the latest version?" The answer is yes. Keeping up-to-date is generally a good idea, as new threats surface constantly. And if you value mobile security or use a social network, this year's crop of security suites is worth paying attention to.
An increasing number of security suites now feature special tools to help protect you on social networks--a growing target for spammers, scammers, and other parties who want to get at your personal information. For example, Trend Micro's Titanium Internet Security suite comes with a handy tool that highlights any possible areas of concern involving your Facebook privacy settings. Various suites also include tools that will scan links on social networks so that you aren't duped into clicking a malicious link hidden behind a URL shortener.
If you own a smartphone or tablet, or both, the security class of 2013 has some new tools for you. And some security packages come with a mobile app that provides protection against mobile malware or includes other features such as GPS tracking to help you find your phone should it go missing. These apps often also include remote-wipe capabilities that let you delete the contents of a missing phone or tablet so your private data doesn't end up falling into the wrong hands.
In addition, Windows 8 has changed the way security software makers design their programs. Many of the suites we looked at this year sport redesigned interfaces that include larger buttons and controls made to be more touch-friendly.
As usual, we teamed up with the fine folks at AV-Test, a respected antivirus testing lab based in Germany. AV-Test ran each suite through a comprehensive battery of tests to find out how well each would stand up to the worst malware currently in existence. AV-Test also performed speed testing to determine whether the suites will slow your PC to a crawl. We analyzed the data that AV-Test provided, and then tried each of the products ourselves to give you an idea of which suites you should go for--and which ones you should pass on.
Here are the suites we tested. You can click on each link to read individual reviews, or simply read this list for quick star ratings and summaries.
1. F-Secure Internet Security 2013 -- 4.5 stars (Superior). F-Secure's latest suite offers excellent protection and a friendly user interface.
2. Norton Internet Security 2013 -- 4.5 stars (Superior). With its great detection rate and Windows 8-ready design, Norton's suite is definitely worth a look.
3. Trend Micro Titanium Internet Security 2013 -- 4.5 stars (Superior). This "titanium" suite earned high marks in almost all our detection tests, and it has a nice interface.
4. Bitdefender Internet Security 2013 -- 4.5 stars (Superior). Bitdefender has a user-friendly interface that will appeal to people of all experience levels.
5. Kaspersky Internet Security 2013 -- 4 stars (Very Good). Kaspersky lets both beginners and advanced users get the most out of its suite, and scored well in our tests.
6. McAfee Internet Security 2013 -- 4 stars (Very Good). McAfee didn't earn top marks, but it's still a proficient, user-friendly antimalware program.
7. G Data InternetSecurity 2013 -- 3.5 stars (Very Good). G Data has an effective suite, but in­­stallation is a hassle, with a settings panel that's more suited to advanced users.
8. AVG Internet Security 2013 -- 3.5 stars (Very Good). AVG's security program is perfectly re­­spectable. But perfectly respectable just doesn't cut it these days.
9. Avira Internet Security 2013 -- 3.5 stars (Very Good). This suite is competent at detecting, disabling, and cleaning up malware, but its user interface is unfriendly.
BEST OVERALL: F-Secure Internet Security 2013 F-Secure's 2013 suite kept our test system free of malware and did a great job of cleaning up infections that made it onto our PC. It's speedy and well designed, too.
BEST PROTECTION: Trend Micro Titanium Internet Security 2013This suite had the most well rounded protection of all the suites we looked at. It proved effective at keeping malware at bay and at cleaning up infected PCs.
BEST SPEED: Norton Internet Security The days of Norton being ridiculed as slow are long gone: Norton's newest suite had lightning-quick scan times, and its impact on overall PC performance was minimal.
BEST INTERFACE: Norton Internet Security We liked Norton's polished, easy-to-use interface and one-click installation process. It's also designed to be Windows 8-friendly.
A competitive field
The security software market is highly competitive and it showed in our test results. In our testing, no suite detected less than 97.8 percent of recent known malware samples, and blocked below around 94.4 percent of new malware in our "real-world" attack-blocking tests. False positives were also largely a non-issue. But if you look closely,there are still some notable differences.We noticed a fairly wide difference in terms of ease of use between the suites we looked at. While some--like Norton and Trend Micro--were very user friendly and polished, others--like Avira and G Data--were less so and seemed to be designed withexpert users in mind.In the end, even the lower-ranked suites performed reasonably well, but simply didn't stand out enough to claim a higher ranking.
What you don't get in these suites
For the sake of this story, we looked at mainstream Internet security suites, but most security companies also sell more feature-complete "advanced" suites. These suites include products like Norton 360, Trend Micro Titanium Maximum Security, and AVGPremium Security.For the most part, these advanced suites feature the same basic antivirus engine as the more basic suites, but will also include PC maintenance tools, online backup, additional parental controls and privacy controls, and more.What comes in the more advanced packages compared to the more basic suites does very between manufacturers, though: Some include a mobile app with the basic suite, while others include it only in their advanced suites. In general, though, the basic suitescontain just about everything you'll need to keep your PC protected.
Threats to watch for in 2013
(by Tony Bradley)
More sophisticated phishing Email and text messages that contain links to malicious websites will improve in quality to the point that they'll be virtually indistinguishable from legitimate communications. The messages will become more polished and professional--no more broken English and poor grammar.
Watering-hole attacks A drive-by download is a twist on the concept of browser-based attacks. In this sort of attack, cybercriminals post malicious content on a Web page, and then try to figure out some way to lure you to visit the website. If the PC you use to visit the website is vulnerable to the exploit used by the attack, malware is downloaded and the system is compromised. In 2013, though, attackers will continue to hone in with more precise attacks known as "watering hole" attacks. Rather than casting a wide net (as attackers do with drive-by downloads), the watering hole attack is more precise.
Data breaches In 2013, attackers will continue to target weak security on Internet-facing database systems to acquire thousands or millions of compromised records at once rather than going after individual users. Unfortunately, there isn't much you can do to prevent this sort of attack, but you can go on the defensive by being vigilant. Monitor your bank and credit card statements and report anything suspicious to your financial institution.
  Note: Click on the chart image below to see a summary of our findings.


Read more »

Acquisition math: Belkin CTO predicts outcome of Linksys deal will be "1+1=3"


News that Cisco intended to divest its Linksys home-networking business unit broke last December, but Belkin's decision--announced last Thursday--to acquire that division came as a surprise. Belkin's intentions are even more interesting: The company isn't just buying a prestige brand to slap on its existing home-networking product line; it plans to market networking products under both brands.
When I asked Belkin's Chief Technology Officer Brian Van Harlingen how that might benefit consumers, he replied that Belkin's employees "strive to understand user needs, and deliver a good user experience. The philosophy at Linksys isn't fundamentally different, but each company has different strengths. Linksys did [the cloud-based router administration software] Smart Wi-Fi, and we've done great work in terms of quality of service [QoS describes the ability to assign priorities to different data flows, so that gaming and video traffic are given priority over downloads]. Where do those things come together? We think the ultimate outcome of putting the two companies together will be 'one plus one equals three.'"
According to Van Harlingen, Belkin "sees Linksys as a premier brand. They brought wireless networking into the home. But our intention is to maintain both brands in networking; each has a unique appeal to consumers, and we think we can create differentiation for the two product lines."
Van Harlingen says Belkin also sees an opportunity to grab some market share in the small to medium-size business market, a market that Linksys had largely drifted away from while under Cisco's control. "We're still working on long-terms plans and product roadmaps, but Linksys goes back a ways and [the brand] had some real credibility in the SMB space. We see some opportunity there."
Van Harlingen said the Linksys acquisition would also help Belkin grown its budding line of home-automation products, marketed under the WeMo brand. "Those are some of the products we're proudest of, and we are expanding in that area. We announced a new light switch at CES, as well as Android support, and we're integrating video cameras."
"The beauty of the WeMo line using a Wi-Fi network, as opposed to Z-Wave or ZigBee" Van Harlingen continued, "is that you can buy a product that will perform a function without depending on another product. You don't need a gateway [as a master controller that integrates lighting and other home controls, as the Z-Wave and ZigBee protocols generally require]. It's much less confusing for the consumer."
I couldn't resist the opportunity to ask Van Harlingen if Belkin had learned anything from Cisco's poorly conceived decision to proactively install new firmware on some of its high-end Linksys routers that were already in the field without informing the people who had purchased them. The new firmware not only forced users to switch to Cisco's cloud-based admin tool, but it also came with terms of service that many viewed as an egregious invasion of privacy. Cisco eventually reversed its decision.
"I can't criticize them [Linksys] for that," said Van Harlingen. "We've made our own missteps over the years. They were really excited about delivering the benefits of Smart Wi-Fi to as many of their customers as quickly as possible. Our approach will be 'let's listen to our customers very carefully before we take any dramatic actions.'"
Since mergers and acquisitions rarely occur without some job losses, I also asked Van Harlingen if Belkin planned to retain Linksys employees across the board, or if the company wanted only the Linksys engineering teams. "Across the board," he replied. "We intend to merge the two companies. Linksys has incredibly talented people in key roles. But we will be looking for places, where there are opportunities, where it makes sense to leverage--I guess redundancy is the word."

Read more »

HP offering data-breach response and remediation services


HP today announced data-breach remediation services intended to help organizations prepare for an incident related to data loss that would require fast response to meet both legal and digital forensics requirements.
"It's not if, it's when a breach occurs," said Andrzej Kawalec, global chief technology officer at HP Enterprise Security.
HP's services from consultants include working with internal security and management teams to prepare for regulatory notifications and public response by establishing a clear set of practices and processes for data breach incidents. It also includes the HP Breach Response Service for round-the-clock monitoring to detect and respond to intrusions, with HP on call to dispatch its security team to the client's location to investigate any breach and work through remediation.
Jeremy Ward, manager at HP Security Services in the U.K., said HP can provide digital and computer forensics services to pull together evidence related to a data breach. "The forensics readiness services gets the clients prepared," Ward said. HP anticipates its services, which would cost about $20,000 depending on the size of the business, will have the most initial demand in North America and Europe, though the need could come from "anywhere in the world."
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.
Read more about wide area network in Network World's Wide Area Network section.

Read more »

IBM to beef up content management, analytics in Connections enterprise social product


IBM will launch before midyear several new and improved collaboration and communication products, including a new suite for human resources tasks and a major upgrade of its Connections enterprise social networking product.
The company, which will unveil the products at its Connect 2013 conference in Orlando on Monday, will also announce improvements to its enterprise social suite for marketers.
The upgrade to its IBM Connections enterprise social networking platform will feature new analytics features so that administrators can monitor usage, such as collaboration trends among employees and engagement with customers in social media services like Twitter and Facebook.
IBM Connections 4.5, which will be available in March, will also feature new document and content management capabilities, as well as an "ideation" tool to manage brainstorming processes. This new version will also feature deeper integration with Microsoft Outlook, so that users can access IBM Connections features within their Outlook interface.
"This 4.5 version is a momentum announcement," said Rob Koplowitz, a Forrester Research analyst. "IBM continues to grow, add functionality to and improve Connections."
The content management functionality makes Connections a stronger competitor to Microsoft's SharePoint, which in turn is encroaching further into the Connections territory with its upcoming integration with the Yammer enterprise social networking software.
The suites for human resources and marketing departments are designed to give employees collaboration tools like microblogging, IM, video conferencing, activity streams, employee profiles, document sharing, content rating, wikis and discussion forums.
The new IBM Employee Experience Suite will include existing IBM enterprise social and communication software along with human resources management applications from Kenexa, a company IBM acquired in December for $1.3 billion. This new suite will be available in this year's first half.
Meanwhile, the existing IBM Customer Experience Suite, designed for marketing departments, will gain a new capability to let marketers push content, like ads and promotions, to social networks "with one simple click" and without requiring IT involvement.
IBM also plans to ship in March an upgrade of its Notes-Domino email and collaboration software, called IBM Notes and Domino Social Edition 9.
"We have an enterprise social business platform that is for social networking, content management, analytics, and can be leveraged across all business departments," said Jeff Schick, vice president of social software at IBM.
During the opening session of the conference, Jeff Bowman, global e-business manager at Caterpillar, the maker of heavy machinery equipment and industrial engines, said that his company is using IBM enterprise social products to extend its traditional face-to-face interactions with customers into the online realm.
"We're funding e-business at an unprecedented rate at Caterpillar," he said, adding that the efforts are at an early stage, but driven by a sense of urgency prompted by competitive pressure.
The online effort attempts to fine-tune the entire "customer experience lifecycle," including being where current and prospective clients are, such as in search results and social media channels, and delivering a "virtual" sales representative experience that manages "to make tractors sexy online," he said.
Caterpillar is also sharpening its online support capabilities and launching a new e-commerce platform that makes it faster and easier to purchase parts online, Bowman said.
Meanwhile, Ross Grossman, vice president of human resources at Regeneron Pharmaceuticals, said the company has been using Kenexa software and services since 2007 to improve recruitment, training and hiring, and increase employee engagement and retention, all of which have played a big part in the company's ability to grow fast and compete against bigger rivals.
"In HR, we want to have a meaningful impact on the business," he said, adding that his department now plays a critically important role in the company's operations and performance.
At a press conference after the session, Mike Rhodin, senior vice president of IBM's Software Solutions Group, said that the impact of enterprise social technologies in collaboration and front-office business processes like HR and marketing amounts to a "generational shift" that is transforming how companies function, and will do so for the next two decades.
Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at@JuanCPerezIDG.

Read more »

WhatsApp could face prosecution on poor privacy


A yearlong investigation by government privacy watchdogs in Canada and the Netherlands identified major weaknesses in the way the WhatsApp cellphone messaging application handled the personal information of its users.
Many of the problems have since been fixed, but Dutch authorities have yet to decide whether they will attempt to prosecute WhatsApp under Dutch privacy law, the two organizations said in a joint statement on Monday.
WhatsApp allows users to exchange messages like conventional instant messaging software, but rather than use screen names the system identifies users by their phone number. When a user signs up, they upload their cellphone's address book to WhatsApp to discover who among their existing contacts is available via WhatsApp.
That method was one of the things that originally drew the attention of the Office of the Privacy Commissioner of Canada and The Dutch Data Protection Authority.
Their investigation found that after uploading the address book and using the data to match existing users, the WhatsApp servers failed to delete the phone numbers of non-users as required by Canadian and Dutch law.
The app was also initially found to be sending messages in an unencrypted form, which leaves them vulnerable to eavesdropping and interception, particularly when sent over an unsecure Wi-Fi network. WhatsApp added encryption to messages in September 2012.
Finally, the investigation found the app was generating passwords for message exchanges based on things like the phone's IMEI (international mobile equipment identity) or MAC (media access control) address. Both are relatively easy to discover, opening the possibility that a third party could send and receive messages in the name of users without their knowledge. WhatsApp has since strengthened password generation, but users need to update their software to benefit from the change.
WhatsApp, which is based in Silicon Valley, could not immediately be reached for comment.
News of the investigation comes as the issue of mobile app privacy is increasingly coming into the spotlight.
In December, the State Attorney General of California launched a prosecution of Delta Airlines for failing to comply with California's privacy laws. California's online privacy law requires commercial operators of websites and online services, including apps, which collect personally identifiable information conspicuously to post a privacy policy. The state attorney general has begun looking at apps that either don't include such a policy or don't make it obvious to users.
But even if a privacy policy is put in front of consumers, many often click the "read and understood" button without looking at it, said Pat Walshe, privacy director at the GSM Association, an organization representing network operators. His organization has published guidelines for privacy by design for mobile phone applications.
"We want consumers to have confidence in the industry and that means a commitment to protect consumer privacy. Industry has to fill in the gaps or policy makers will do it, possibly in an overly prescriptive way," said Walshe.
(Jennifer Baker in Brussels contributed to this report.)
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address ismartyn_williams@idg.com

Read more »

Apple makes good on CEO's promise to expand iPhone 5's 4G carriers


iOS 6.1 patches more than two-dozen security vulnerabilities and adds three-dozen LTE carriers to the supported list for the iPhone 5. Apple today released iOS 6.1, the first major update for the mobile operating system since its September 2012 launch, patching 27 security vulnerabilities and adding three dozen LTE carriers to the iPhone 5's support list.
At the top of Apple's list of improvements was an expansion of the LTE networks compatible with the iPhone 5, a move announced last week by CEO Tim Cook during a quarterly earnings call with Wall Street analysts.
"Next week, we are adding 36 more carriers for LTE support," Cook said Jan. 23. "And these carriers will be in countries that were currently not supporting LTE."
Among the iPhone 5 markets where customers now can connect to an LTE carrier are Denmark, Finland, Greece, Italy, Kuwait, Saudi Arabia, Switzerland and South Africa.
iOS 6.1 also added carriers in countries already served by LTE. In the U.S., for example, the update expanded the list from AT&T, Sprint and Verizon to add Alaska Communications, Bluegrass Cellular and Pioneer Cellular.
complete list of all iOS 6.1-supported LTE carriers can be found on Apple's website.
Other enhancements in iOS 6.1, according to Apple's typically terse note, included Fandango movie ticket purchases using Siri (U.S. only) and individual track downloads from iCloud for iTunes Match subscribers.
iTunes Match is the $25-per-year service launched in November 2011 that acts like a music storage locker in the sky, storing tracks purchased via iTunes or ripped from CDs in iCloud, then making the library available on all of a user's iOS, OS X and Windows devices.
Prior to today's update, iTunes Match automatically downloaded all tracks in an album, making it difficult to grab just a single tune to place, say, on a storage space-strapped iPhone.
iOS 6.1 also included patches for 27 security vulnerabilities, most of them labeled with the phrase "arbitrary code execution," Apple's way of saying they are critical.
Of the 27 total, 22 were in WebKit, the browser engine that powers Safari in iOS and OS X, as well as Google's Chrome. Not surprisingly, most were reported to the WebKit open-source project, and from that to Apple, by Google security engineers.
Eleven of the WebKit bugs were uncovered by the prolific Abhishek Arya, a Google engineer who goes by the nickname "Inferno."
The update also revoked several digital certificates improperly issued in mid-2011 by TurkTrust, a Turkish "certificate authority," or CA. While Google, Microsoft and Mozilla had previously revoked those same certificates, this was Apple's first move. It has yet to update Safari for OS X to do the same.
Today's update was the third for iOS 6, although the first two were minor refreshes that either fixed a handful of security flaws (November's iOS 6.0.1) or addressed a single issue ( December's iOS 6.0.2).
Owners of the iPhone 3GS, iPhone 4, iPhone 4S and iPhone 5; iPad 2, third- and fourth-generation iPad, and iPad Mini; and iPod Touch fourth-generation and later can retrieve 6.1 over the air by tapping the "Settings" icon, then the "General" tab, and finally "Software Update."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com.
Read more about ios in Computerworld's iOS Topic Center.

Read more »