Tuesday, January 29, 2013

Acquisition math: Belkin CTO predicts outcome of Linksys deal will be "1+1=3"


News that Cisco intended to divest its Linksys home-networking business unit broke last December, but Belkin's decision--announced last Thursday--to acquire that division came as a surprise. Belkin's intentions are even more interesting: The company isn't just buying a prestige brand to slap on its existing home-networking product line; it plans to market networking products under both brands.
When I asked Belkin's Chief Technology Officer Brian Van Harlingen how that might benefit consumers, he replied that Belkin's employees "strive to understand user needs, and deliver a good user experience. The philosophy at Linksys isn't fundamentally different, but each company has different strengths. Linksys did [the cloud-based router administration software] Smart Wi-Fi, and we've done great work in terms of quality of service [QoS describes the ability to assign priorities to different data flows, so that gaming and video traffic are given priority over downloads]. Where do those things come together? We think the ultimate outcome of putting the two companies together will be 'one plus one equals three.'"
According to Van Harlingen, Belkin "sees Linksys as a premier brand. They brought wireless networking into the home. But our intention is to maintain both brands in networking; each has a unique appeal to consumers, and we think we can create differentiation for the two product lines."
Van Harlingen says Belkin also sees an opportunity to grab some market share in the small to medium-size business market, a market that Linksys had largely drifted away from while under Cisco's control. "We're still working on long-terms plans and product roadmaps, but Linksys goes back a ways and [the brand] had some real credibility in the SMB space. We see some opportunity there."
Van Harlingen said the Linksys acquisition would also help Belkin grown its budding line of home-automation products, marketed under the WeMo brand. "Those are some of the products we're proudest of, and we are expanding in that area. We announced a new light switch at CES, as well as Android support, and we're integrating video cameras."
"The beauty of the WeMo line using a Wi-Fi network, as opposed to Z-Wave or ZigBee" Van Harlingen continued, "is that you can buy a product that will perform a function without depending on another product. You don't need a gateway [as a master controller that integrates lighting and other home controls, as the Z-Wave and ZigBee protocols generally require]. It's much less confusing for the consumer."
I couldn't resist the opportunity to ask Van Harlingen if Belkin had learned anything from Cisco's poorly conceived decision to proactively install new firmware on some of its high-end Linksys routers that were already in the field without informing the people who had purchased them. The new firmware not only forced users to switch to Cisco's cloud-based admin tool, but it also came with terms of service that many viewed as an egregious invasion of privacy. Cisco eventually reversed its decision.
"I can't criticize them [Linksys] for that," said Van Harlingen. "We've made our own missteps over the years. They were really excited about delivering the benefits of Smart Wi-Fi to as many of their customers as quickly as possible. Our approach will be 'let's listen to our customers very carefully before we take any dramatic actions.'"
Since mergers and acquisitions rarely occur without some job losses, I also asked Van Harlingen if Belkin planned to retain Linksys employees across the board, or if the company wanted only the Linksys engineering teams. "Across the board," he replied. "We intend to merge the two companies. Linksys has incredibly talented people in key roles. But we will be looking for places, where there are opportunities, where it makes sense to leverage--I guess redundancy is the word."

Read more »

HP offering data-breach response and remediation services


HP today announced data-breach remediation services intended to help organizations prepare for an incident related to data loss that would require fast response to meet both legal and digital forensics requirements.
"It's not if, it's when a breach occurs," said Andrzej Kawalec, global chief technology officer at HP Enterprise Security.
HP's services from consultants include working with internal security and management teams to prepare for regulatory notifications and public response by establishing a clear set of practices and processes for data breach incidents. It also includes the HP Breach Response Service for round-the-clock monitoring to detect and respond to intrusions, with HP on call to dispatch its security team to the client's location to investigate any breach and work through remediation.
Jeremy Ward, manager at HP Security Services in the U.K., said HP can provide digital and computer forensics services to pull together evidence related to a data breach. "The forensics readiness services gets the clients prepared," Ward said. HP anticipates its services, which would cost about $20,000 depending on the size of the business, will have the most initial demand in North America and Europe, though the need could come from "anywhere in the world."
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.
Read more about wide area network in Network World's Wide Area Network section.

Read more »

IBM to beef up content management, analytics in Connections enterprise social product


IBM will launch before midyear several new and improved collaboration and communication products, including a new suite for human resources tasks and a major upgrade of its Connections enterprise social networking product.
The company, which will unveil the products at its Connect 2013 conference in Orlando on Monday, will also announce improvements to its enterprise social suite for marketers.
The upgrade to its IBM Connections enterprise social networking platform will feature new analytics features so that administrators can monitor usage, such as collaboration trends among employees and engagement with customers in social media services like Twitter and Facebook.
IBM Connections 4.5, which will be available in March, will also feature new document and content management capabilities, as well as an "ideation" tool to manage brainstorming processes. This new version will also feature deeper integration with Microsoft Outlook, so that users can access IBM Connections features within their Outlook interface.
"This 4.5 version is a momentum announcement," said Rob Koplowitz, a Forrester Research analyst. "IBM continues to grow, add functionality to and improve Connections."
The content management functionality makes Connections a stronger competitor to Microsoft's SharePoint, which in turn is encroaching further into the Connections territory with its upcoming integration with the Yammer enterprise social networking software.
The suites for human resources and marketing departments are designed to give employees collaboration tools like microblogging, IM, video conferencing, activity streams, employee profiles, document sharing, content rating, wikis and discussion forums.
The new IBM Employee Experience Suite will include existing IBM enterprise social and communication software along with human resources management applications from Kenexa, a company IBM acquired in December for $1.3 billion. This new suite will be available in this year's first half.
Meanwhile, the existing IBM Customer Experience Suite, designed for marketing departments, will gain a new capability to let marketers push content, like ads and promotions, to social networks "with one simple click" and without requiring IT involvement.
IBM also plans to ship in March an upgrade of its Notes-Domino email and collaboration software, called IBM Notes and Domino Social Edition 9.
"We have an enterprise social business platform that is for social networking, content management, analytics, and can be leveraged across all business departments," said Jeff Schick, vice president of social software at IBM.
During the opening session of the conference, Jeff Bowman, global e-business manager at Caterpillar, the maker of heavy machinery equipment and industrial engines, said that his company is using IBM enterprise social products to extend its traditional face-to-face interactions with customers into the online realm.
"We're funding e-business at an unprecedented rate at Caterpillar," he said, adding that the efforts are at an early stage, but driven by a sense of urgency prompted by competitive pressure.
The online effort attempts to fine-tune the entire "customer experience lifecycle," including being where current and prospective clients are, such as in search results and social media channels, and delivering a "virtual" sales representative experience that manages "to make tractors sexy online," he said.
Caterpillar is also sharpening its online support capabilities and launching a new e-commerce platform that makes it faster and easier to purchase parts online, Bowman said.
Meanwhile, Ross Grossman, vice president of human resources at Regeneron Pharmaceuticals, said the company has been using Kenexa software and services since 2007 to improve recruitment, training and hiring, and increase employee engagement and retention, all of which have played a big part in the company's ability to grow fast and compete against bigger rivals.
"In HR, we want to have a meaningful impact on the business," he said, adding that his department now plays a critically important role in the company's operations and performance.
At a press conference after the session, Mike Rhodin, senior vice president of IBM's Software Solutions Group, said that the impact of enterprise social technologies in collaboration and front-office business processes like HR and marketing amounts to a "generational shift" that is transforming how companies function, and will do so for the next two decades.
Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at@JuanCPerezIDG.

Read more »

WhatsApp could face prosecution on poor privacy


A yearlong investigation by government privacy watchdogs in Canada and the Netherlands identified major weaknesses in the way the WhatsApp cellphone messaging application handled the personal information of its users.
Many of the problems have since been fixed, but Dutch authorities have yet to decide whether they will attempt to prosecute WhatsApp under Dutch privacy law, the two organizations said in a joint statement on Monday.
WhatsApp allows users to exchange messages like conventional instant messaging software, but rather than use screen names the system identifies users by their phone number. When a user signs up, they upload their cellphone's address book to WhatsApp to discover who among their existing contacts is available via WhatsApp.
That method was one of the things that originally drew the attention of the Office of the Privacy Commissioner of Canada and The Dutch Data Protection Authority.
Their investigation found that after uploading the address book and using the data to match existing users, the WhatsApp servers failed to delete the phone numbers of non-users as required by Canadian and Dutch law.
The app was also initially found to be sending messages in an unencrypted form, which leaves them vulnerable to eavesdropping and interception, particularly when sent over an unsecure Wi-Fi network. WhatsApp added encryption to messages in September 2012.
Finally, the investigation found the app was generating passwords for message exchanges based on things like the phone's IMEI (international mobile equipment identity) or MAC (media access control) address. Both are relatively easy to discover, opening the possibility that a third party could send and receive messages in the name of users without their knowledge. WhatsApp has since strengthened password generation, but users need to update their software to benefit from the change.
WhatsApp, which is based in Silicon Valley, could not immediately be reached for comment.
News of the investigation comes as the issue of mobile app privacy is increasingly coming into the spotlight.
In December, the State Attorney General of California launched a prosecution of Delta Airlines for failing to comply with California's privacy laws. California's online privacy law requires commercial operators of websites and online services, including apps, which collect personally identifiable information conspicuously to post a privacy policy. The state attorney general has begun looking at apps that either don't include such a policy or don't make it obvious to users.
But even if a privacy policy is put in front of consumers, many often click the "read and understood" button without looking at it, said Pat Walshe, privacy director at the GSM Association, an organization representing network operators. His organization has published guidelines for privacy by design for mobile phone applications.
"We want consumers to have confidence in the industry and that means a commitment to protect consumer privacy. Industry has to fill in the gaps or policy makers will do it, possibly in an overly prescriptive way," said Walshe.
(Jennifer Baker in Brussels contributed to this report.)
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address ismartyn_williams@idg.com

Read more »

Apple makes good on CEO's promise to expand iPhone 5's 4G carriers


iOS 6.1 patches more than two-dozen security vulnerabilities and adds three-dozen LTE carriers to the supported list for the iPhone 5. Apple today released iOS 6.1, the first major update for the mobile operating system since its September 2012 launch, patching 27 security vulnerabilities and adding three dozen LTE carriers to the iPhone 5's support list.
At the top of Apple's list of improvements was an expansion of the LTE networks compatible with the iPhone 5, a move announced last week by CEO Tim Cook during a quarterly earnings call with Wall Street analysts.
"Next week, we are adding 36 more carriers for LTE support," Cook said Jan. 23. "And these carriers will be in countries that were currently not supporting LTE."
Among the iPhone 5 markets where customers now can connect to an LTE carrier are Denmark, Finland, Greece, Italy, Kuwait, Saudi Arabia, Switzerland and South Africa.
iOS 6.1 also added carriers in countries already served by LTE. In the U.S., for example, the update expanded the list from AT&T, Sprint and Verizon to add Alaska Communications, Bluegrass Cellular and Pioneer Cellular.
complete list of all iOS 6.1-supported LTE carriers can be found on Apple's website.
Other enhancements in iOS 6.1, according to Apple's typically terse note, included Fandango movie ticket purchases using Siri (U.S. only) and individual track downloads from iCloud for iTunes Match subscribers.
iTunes Match is the $25-per-year service launched in November 2011 that acts like a music storage locker in the sky, storing tracks purchased via iTunes or ripped from CDs in iCloud, then making the library available on all of a user's iOS, OS X and Windows devices.
Prior to today's update, iTunes Match automatically downloaded all tracks in an album, making it difficult to grab just a single tune to place, say, on a storage space-strapped iPhone.
iOS 6.1 also included patches for 27 security vulnerabilities, most of them labeled with the phrase "arbitrary code execution," Apple's way of saying they are critical.
Of the 27 total, 22 were in WebKit, the browser engine that powers Safari in iOS and OS X, as well as Google's Chrome. Not surprisingly, most were reported to the WebKit open-source project, and from that to Apple, by Google security engineers.
Eleven of the WebKit bugs were uncovered by the prolific Abhishek Arya, a Google engineer who goes by the nickname "Inferno."
The update also revoked several digital certificates improperly issued in mid-2011 by TurkTrust, a Turkish "certificate authority," or CA. While Google, Microsoft and Mozilla had previously revoked those same certificates, this was Apple's first move. It has yet to update Safari for OS X to do the same.
Today's update was the third for iOS 6, although the first two were minor refreshes that either fixed a handful of security flaws (November's iOS 6.0.1) or addressed a single issue ( December's iOS 6.0.2).
Owners of the iPhone 3GS, iPhone 4, iPhone 4S and iPhone 5; iPad 2, third- and fourth-generation iPad, and iPad Mini; and iPod Touch fourth-generation and later can retrieve 6.1 over the air by tapping the "Settings" icon, then the "General" tab, and finally "Software Update."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com.
Read more about ios in Computerworld's iOS Topic Center.

Read more »

Winzip 17 adds integration with Box cloud storage


Winzip has been a household name in file compression for two decades. WinZip 17 takes file compression and management to the cloud with Google Drive, SkyDrive, and Dropbox integration--and now a new update is available that adds Box to the mix.
WinZip was a pioneer of the freemium software business model--basically providing the software for free, and relying on the moral compass of customers to pay for the product if it proved to be useful to them. I used to download a wide variety of shareware applications following a similar strategy, but WinZip was the first one I ever felt compelled to actually pay for.
Over the years, hard drive and flash drives have grown exponentially in size, and the cost of storage has gone down, so the need for a file compression utility has declined. However, the rise of photos and videos--which can be massive files--and the desire to upload information to social networks or cloud storage services has brought it back in vogue. It's much easier and faster to upload a 100Mb file instead of a 1GB file.
WinZip has evolved to be a much more comprehensive file management tool than it once was. It still provides file compression, but now it also includes the ability to convert documents to PDF, add custom watermarks to PDF files, and post files directly to popular social networks.
Another advantage of WinZip 17 is that it ties disparate services together. Rather than dealing with your PC, Google Drive, Dropbox, SkyDrive, and Box as separate entities, WinZip 17 gives you a single tool from which to manage all of your data no matter where it's stored.
There are two flavors of WinZip 17, Standard and Pro. The Pro version includes features that strengthen and speed up file encryption, as well as the ability to view photos within a ZIP file without extracting them first, and features that make it easier to transfer and manage photos from supported cameras and mobile devices, among other things.
You can get WinZip 17 directly from the WinZip site starting at $30. WinZip 17 Pro is $50. WinZip offers volume licensing discounts for businesses that purchase the software in bulk. WinZip 17 is only available for Windows (XP or later), but there are versions available for Mac OS X, iOS, and Android as well.
Customers who already have WinZip 17 can download an update to add integration with Box cloud storage.

Read more »

Yahoo's Marissa Mayer looks to new products, mobile to restore company growth


Yahoo CEO Marissa Mayer has identified new products and mobile investments as among several strategies aimed at keeping the company relevant as it tries to compete against the likes of Google and Facebook.
On Monday, Mayer highlighted recently revamped hiring protocols and product launches, such as its redesigned Flickr iOS app and Yahoo Mail, as positive steps for the company, though she stressed that "there's a lot of work still to be done." Mayer spoke on a conference call Monday to discuss the company's mixed results for the fourth quarter of 2012, which showed revenue up but profit down from a year earlier.
"Flickr and Yahoo Mail marked the start of these efforts," Mayer said.
Yahoo will focus on developing or redesigning roughly a dozen products in the months and years to come, each built around people's "daily digital habits," Mayer said.
She cited search, the homepage, finance, sports and news as areas the company would be focusing on, without giving more details.
Yahoo said its three key business challenges going forward are, in order of priority, increasing usage, growing its international presence and appealing to a broader set of users.
Mayer also said mobile products are "incredibly important to our strategy," and that the company is working to make them a substantial part of its business. As part of that effort, the company recently acquired the mobile recommendations app Stamped and the video chat broadcasting app OnTheAir. "This is a nascent source of revenue for us," Mayer said.
Though the company said it does not break out financial performance metrics for its mobile products individually, mobile adoption of Yahoo products grew to more than 200 million monthly unique users in the fourth quarter, the company reported.
Yahoo also reported on its progress toward having at least 50 percent of its engineering workforce dedicated to mobile. Though it is not there yet, the company hired 120 new employees with computer science degrees in the fourth quarter and allocated them largely to new mobile product areas, Mayer said.
Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach's e-mail address is zach_miners@idg.com

Read more »

Google publishes detailed maps of North Korea


Google has published detailed maps of North Korea, based on information entered by users via its online Map Maker tool.
The maps now include details about the ultra-secretive nation including highways and smaller roads, country borders, parks, schools and features such as an amusement park in Pyongyang, the capital. Most of the areas were blank previously, and the information supplements Google's existing satellite imagery of the country.
Google said in a blog entry that the new data was collected via its Map Maker software over several years. The company said that from now on, it will publish approved updates entered using the tool as part of its official Google Maps offering.
"While many people around the globe are fascinated with North Korea, these maps are especially important for the citizens of South Korea who have ancestral connections or still have family living there," wrote Jayanth Mysore, a Google product manager, in the blog.
Earlier this month, Google Executive Chairman Eric Schmidt visited North Korea with his daughter and former New Mexico governor Bill Richardson. The U.S. government was negative about the trip, which was deemed a "personal" visit by the executive, coming just after North Korea's launch of a long-range rocket.
After the trip, Schmidt's daughter Sophie, posted details of the trip online in an account titled "It might not get weirder than this," with details including a visit to an electronic library at a university and Doritos for sale at a supermarket.
Map Maker is an online tool that Google uses to solicit map information from users about certain countries, with the goal of eventually adding it to the official version of Google Maps. The tool can be used to add features such as natural landscape, political boundaries, roads, railways and buildings, although the company usually does not immediately publish the data.
Users are currently able to add information on about 200 countries, which are often places where traditional map data is difficult to obtain. These include locations in many countries in Africa and central America, Afghanistan, Iraq, and even Antarctica.

Read more »

Pentagon to add thousands of new cybersecurity jobs


The Pentagon is planning to expand its cyber security force nearly five fold over the next several years in a bid to bolster its defensive and offensive computer capabilities.
The plan is to add about 4,000 more troops and civilians to the existing 900 personnel in the Defense Department's Cyber Command, the Washington Post reported today citing several unnamed sources.
The planned expansion is in response to growing threats against critical U.S. assets in cyberspace, a defense official told Computerworld on Monday.
"As Secretary Panetta stated in his cyber speech last October, we are faced with an increasing threat of a cyber attack that could be as destructive as the terrorist attack on 9/11," the official said. "The department recognizes this growing danger and is working with a sense of urgency to put the right policies and structures in place to enable us to carry out our role."p>
The official said the Department of Defense (DoD) will work closely with U.S. Cyber Command and the Combatant Commands to develop an "optimum force structure" for dealing with emerging cyber threats.
The goal is to create three separate types of cyber forces each tasked with specific roles and responsibilities. The cyber force structure will include Cyber National Mission Forces, Cyber Combat Mission Forces and Cyber Protection Forces, the official noted.
The national force and cyber protect force will focus on addressing threats to critical infrastructure targets and DoD networks respectively. Meanwhile, the combat mission force will be responsible for planning and executing offensive operations and attacks in cyberspace.
"While the basic cyber force structure model is clear, the implementation plan to achieve it is still being developed and is pre-decisional at this time," the official said.
The planned expansion comes amid heightening concerns about U.S. vulnerabilities in cyber space. Many believe that the U.S. is already in the midst of an undeclared and mostly unseen cyberwar directed against it by unfriendly nation states and well-funded highly organized criminal gangs and hactivist groups.
Countries like China and Russia are well ahead of the U.S. in terms of having cyber forces of the kind that the Pentagon is trying to build up, said Alan Paller, director of research at the SANS Institute. The challenge for the DoD will be to find enough qualified cybersecurity professionals to meet its ambitious expansion plans, he said.
"The key to putting the 4,000 in perspective is that every other critical part of the economy also needs the same people -- banks, power companies, telecom, defense contractors, civilian and state government and hospitals."
But while the hunger for cybersecurity professionals with advanced skills is very real, the supply line is near empty, he said. If the DoD wants to meet its expansion goals it will have to find innovative ways to find talent, Paller said.
He pointed to a recently launched program called Cyber Corps Challenge by New Jersey Governor Chris Christie as an example of the kind of approach the DoD needs to take to find talent. Under the program, the state invited veterans of the U.S armed services and others to take part in a competition for spots in a community college-based cyber security program and six month residencies at banks, the FBI and other organizations.
"China has been running competitions and training programs that work well in every ... district since at least 2003," Paller said. "Russia set up its first advanced school in 1994. We are way behind in quantity and quality."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed. His e-mail address is jvijayan@computerworld.com.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Read more »

Startup NetCitadel aims to orchestrate security management controls in virtualized nets


Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.
"We're helping enterprises go from manual processing that's time-consuming to show automated responses to network events," says Mike Horn, co-founder and CEO of NetCitadel, about the purpose of the OneControl virtual appliance. Used in data centers, it can automate determinations about firewall, router and switch settings based on the preferred corporate security policy relative to VM-based workloads, eliminating the need for an administrator to manually research it.
Horn says OneControl can be installed to work with the various VM platforms, including VMware, Xen and Hyper-V. In a VMware-based environment, it can work with VMware's vDirector and vCloud APIs "to map the intelligence of the virtual device," says Horn, noting OneControl keeps track of the VM resource pool and related information such as IP addresses to determine what changes might need to be made to network firewalls, switches or routers to conform to security policy.
Available for about $25,000, the product competes against similar security-policy management and orchestration offerings from Cisco and Juniper. The idea is when VM workloads are moved around, OneControl can immediately advise on changes that need to be made to gear that today includes certain Cisco and Juniper routers, switches, firewalls and security gateways. A typical question it's designed to answer is, "If vMotion happens inside a network, how does that impact firewall devices?" says Horn. In the future, NetCitadel plans to bring intelligence about other gear, such as load balancers, into the equation as well.
OneControl can be deployed in either the enterprise network or cloud services, though the main testing so far has been toward supporting the Amazon AWS cloud, says Horn.
OneControl has been in early adoption for about five months at Kenettek, the Broken Arrow, Okla.-based managed services and data center provider which serves the oil and gas industry, among others. Almost the entire Kenettek data center is virtualized, says Ken Dobbins, service manager there, noting that OneControl is saving a huge amount of time in configuring services in routers and firewalls when new VM server clusters are spun up or otherwise changed for customers.
OneControl immediately provides security-policy directions to the Kenettek help desk staff rather than requiring they research how the VM-based change will impact security policy-based configurations related to firewalls and routers. This not only saves a huge amount of time, but it's turning out that it also saving on VMware licensing charges which are now based on "committed RAM per hour," says Dobbins. In the energy sector where data related to SCADA controls is collected during certain peak hours, it makes a difference, he points out.
NetCitadel, based in Mountain View, was founded in 2010 by Horn with Theron Tock, CTO, and Vadim Kurland. The company has received an undisclosed amount of funding from New Enterprise Associates.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.
Read more about wide area network in Network World's Wide Area Network section.

Read more »

Friday, January 18, 2013

Amazon rolls out iOS-optimized MP3 store


Watch your back, iTunes: Amazon's now in the game of selling digital music to iOS users. The retail giant has optimized its store to let owners of iPhones and iPod touches browse and purchase from its 22-million song catalog.
To sidestep Apple's rules about taking 30 percent of purchases, though, Amazon's store isn't available via a native app, but rather in a Web interface that iOS users can access via Safari atwww.amazon.com/mp3. The interface is optimized for Apple's handheld devices, complete with a black-and-orange aesthetic that is strangely reminiscent of iOS's Music app.
That optimization also lets Amazon offer common touch controls, like the ability to quickly swipe through carousels of songs and albums, much as you can in iOS's iTunes Store app. Tapping on a play button next to a song plays a 30 second preview, which plays in the background as you browse (though if you do anything to cause the browser to load a new page, you'll cut off the song). As on the iTunes Store, tapping once on the price of a song or album will turn it into a Buy button that you must tap again, at which point you'll be prompted to enter your Amazon credentials.
"And then what?" you're probably wondering. Unlike the iTunes Store, Amazon has no direct access to your iOS device's Music library. Amazon sidesteps again here, loading your purchases directly into yourAmazon Cloud Player, which you can access via the Web or the company's Cloud Player app. And because you purchased that music from Amazon, it doesn't count against your Cloud Player storage limit.
Amazon's been careful to provide most of the features you'd expect from a store, including autocomplete options in the search field, bestseller lists, personalized recommendations, and customer ratings. One thing I did find lacking from my browsing experience was the ability to seamlessly preview all songs on an album.
The ability to purchase music directly from your iOS device has clearly been a missing part of Amazon's digital music strategy--with it in place, the company's Cloud Player offerings become even more attractive to iOS users looking to comparison shop, or simply to get their music from someplace that isn't iTunes.

Read more »

Intel sales, profits slide for 2012, but data center business growing


Intel saw its sales and profits drop in 2012 as the company was hit by slower demand for personal computers and its continued inability to make it big in the smartphone and tablet markets, although its data center business continued to grow.
The world's biggest chip maker reported revenue of US$53.3 billion for the year, down 1.2 percent compared with 2011, and posted net income of $11 billion, down 15 percent. Full-year revenue from its PC client division, which accounts for more than half its revenue, fell 3 percent year-on-year.
Intel also reported its fourth-quarter results on Thursday. Revenue slipped 3 percent and net income was down 26 percent from the final quarter of 2011, and while earnings per share slipped from $0.64 to $0.48, they were $0.03 above a consensus estimate from analysts polled by Thomson Financial.
The root of Intel's PC client problems lies in the declining market for PCs, where it has traditionally been the market leader, and the rise in popularity of tablet computers, where it faces much stronger competition.
Worldwide PC shipments fell 5 percent in the last three months of the year compared to the same period of 2011, according to an estimate from Gartner. The market amounted to 90.1 million units, it said.
Much of the drop is being blamed on tablet computers, which rather than emerging as a new class of machine that takes a place in the home between smartphones and PCs, is becoming a replacement for a PC, said Gartner.
In the tablet market, Intel faces competition from companies like chip makers relying on chip designs from competitor ARM.
However, Intel's data center business recorded better results. Sales rose 6 percent to $10.7 billion as demand for its server chips climbed.
"We made tremendous progress across the business in 2012 as we entered the market for smartphones and tablets, worked with our partners to reinvent the PC, and drove continued innovation and growth in the data center," said Paul Otellini, Intel president and CEO, in a statement.
"As we enter 2013, our strong product pipeline has us well positioned to bring a new wave of Intel innovations across the spectrum of computing," he said.
For the coming year, Intel said it expects to see sales rise in the low single-digit percent range.
Some of the company's hopes for 2013 stem from new chips it plans to release for laptops, tablets, and smartphones, Otellini said in a conference call with analysts.
"Looking ahead, I am exited about a strong pipeline of products coming to market," he said.
Intel plans to launch its Haswell chip in the first half, a new laptop processor that will deliver "the largest generation-to-generation battery life improvement in Intel's history," said Otellini. The executive said the new chip should help its PC partners produce thinner and lighter computers with longer battery life.
It also expects to see more Intel-based tablets shipping beyond the 10 that are already available. And the number of smartphones based on Intel chips will expand beyond the seven devices currently available, said Otellini.
Intel's new chips will be "extremely competitive with ARM designs," he said.
Intel also plans to launch its first Xeon and Atom chips produced on its leading-edge 22-nanometer manufacturing process targeted at the data center market.
Those new chips should return the data center group to double-digit percentage growth this year, Intel CFO Stacy Smith said during the conference call.
In after-hours trading, the company's stock on the Nasdaq was trading at around $21.60 per share at the time of this report, down from its close at $22.68.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address ismartyn_williams@idg.com

Read more »

'Make me Asian' app yanked from Google Play amidst racism concerns


An app called "Make me Asian" that added details like narrowed eyes and conical hats to screenshots of users has been pulled from the Google Play store after inciting widespread public outrage, including a Change.org petition that was signed by more than 8,400 supporters.
"Make me Asian," along with the similarly offensive "Make me Indian," which featured things like feathers and war paint, are gone as of today. Their creator was listed as KimberyDeiss, who apparently had a large number of "Make me ..." apps on the Play store, according to AppBrain. That developer page appears to be down as well.
Peter Chin, a Washington, D.C., pastor and the organizer of the Change.org petition, celebrated the deletion of the apps, telling NPR, "I am deeply thankful to those who realized the danger of these stereotypes entering the mainstream and spoke out against this app, [b]ut I am also appreciative of Google, who listened to our concerns and acted accordingly."
However, it took some time before Google acted in this case -- Chin first blogged about the app in mid-November, and the intervening months saw a Twitter campaign and the aforementioned petition have no effect on the Play store until today.
Somewhat strangely an avowedly progressive company, Google has been at the center of the occasional sociopolitical controversy of late. Iris, the Android platform's ostensible answer to Apple's Siri, was hammered for early versions that provided stridently right-wing answers to some queries in early 2012. That, of course, was after Siri itself came under fire from pro-choice activists for apparently being hesitant to direct users to Planned Parenthood locations. (For the record, both apps have been updated to be less controversial.)
Email Jon Gold at jgold@nww.com and follow him on Twitter at @NWWJonGold.
Read more about anti-malware in Network World's Anti-malware section.

Read more »

Three reasons Facebook Graph Search is good for business


Mark Zuckerberg unveiled a plan this week to make all of the Likes, check-ins, and photo tags on Facebook actually mean something with the launch of Graph Search. The service is in early beta, and is not yet widely available, but the concept has some valuable implications for businesses on Facebook.
Here are three ways that small and medium businesses can benefit from Facebook Graph Search:
1. Engagement
Facebook is already the online destination where users spend the most time. One report from May of 2012 suggests that users spend nearly 8 hours per month on average perusing Facebook--more than double the amount of time spent on the next closest rival. Facebook also has nearly a billion registered users, and boasts around 150 million unique visitors per month.
So, what do all of these stats mean to you, and what does it all have to do with Graph Search? First, the data underscores the value of Facebook as a platform for connecting with and engaging customers. It's the place to be online, and the people who use it spend a lot of time there. Graph Search is going to give Facebook users even more reason to stay enmeshed in the social network. Queries that people might normally switch over to Google or Bing for, they'll now conduct from within Facebook in order to get responses that are more relevant to them personally.
2. Research
Facebook already represents a massive global repository of valuable marketing data. Companies have spent the past few years trying to grasp how to leverage Facebook Pages, Likes, and other nuances of the social network in order to connect with customers and gain some tactical advantage over competitors.
Graph Search gives businesses a powerful new tool for mining market research data from Facebook. A search of users who Like the company Facebook Page and live in a given area will be instrumental in allocating resources where they can have the most impact. With a little creativity in the queries, a business can learn all sorts of useful correlations that paint a more complete picture of who their customers are, and what they like.
3. Marketing
Facebook Ads already enable targeting on a fairly granular level based on a wide variety of attributes. You can distribute ads by location, age, gender, interests, and more.
Just as cyber criminals can use the power of Facebook Graph Search to pinpoint potential phishing attack victims with greater precision, legitimate businesses can also target marketing efforts to a more exact audience. Granted, Graph Search has some privacy controls built in, so the results for a business doing market research would be based primarily on information that users have shared with the general public--but many users are unaware of the security controls, are too lazy to use them, or simply don't care, so there's plenty of valuable information to be found there.

Read more »

Nokia Lumia 820 owners can customize their phone with 3D printers


Nokia is embracing the 3D printing community by releasing files that will let smartphone users create their own custom shells.
Owners of its Lumia 820 smartphone will be the first to have the opportunity, the company said in a blog post on Friday.
The move is mostly about marketing, as Nokia looks for ways to make its products stand out, according to Malik Saadi, principal analyst with Informa Telecoms & Media.
The Lumia 820 was announced last September. It uses an interchangeable shell that allows users to wirelessly charge their device and choose between a number of colors, which now can be expanded upon with the option to print custom shells.
For people who want to design their own shells Nokia is releasing 3D templates, case specs, recommended materials and best practices. Mechanical drawings in either STL or STP file formats can be downloaded from the company's developer website. The printed shells cannot be sold, as the licensing only allows for non-commercial use.
Once confined to prototyping and niche curiosity, 3D printing has started to take off thanks to products from companies such as MakerBot Industries, Stratasys and 3D Systems and services such as Sculpteo, which allows users to upload a file and then prints it for them.
Send news tips and comments to mikael_ricknas@idg.com

Read more »