Author: David Meyer

  • T-Mobile-MetroPCS merger: Now all that’s left is shareholder approval

    The MetroPCS-T-Mobile USA merger has cleared its final regulatory hurdle, leaving just MetroPCS shareholder approval standing in the way of completion.

    That final piece of regulatory approval came from the Committee on Foreign Investment in the United States, which, according to a statement, told the two operators on Wednesday that “there are no unresolved national security concerns with respect to the transaction and that [the committee] has therefore concluded its review”.

    The merger has already sailed through other regulatory pitstops, first the Justice Department then the FCC (without the commission even seeing the need to hold a vote). Some institutional MetroPCS shareholders oppose the deal, however, so it’s still not a sure thing – we will see the final outcome after a MetroPCS board meeting on 12 April.

    If the merger goes ahead, Deutsche Telekom will hold a 74 percent stake in the combined company. It is therefore unsurprising that incoming Deutsche Telekom CEO Timotheus Höttges would become chairman of the board, as MetroPCS revealed on Tuesday.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • A fifth of cars in North America and Western Europe will be app-enabled by 2017, analysts predict

    Twenty percent of cars in the U.S. and Western Europe will by 2017 be app-capable, according to analysts at Juniper Research. That figure refers to the total installed base of consumer cars on the road, not just new cars — the vast majority of which will be sold with such capabilities by that point.

    In a new report on automotive telematics, Juniper suggested the emergence of the connected car ecosystem would follow from the success of standards such as the Car Connectivity Consortium’s MirrorLink, which aims to help smartphone apps and in-dash displays talk to each other, and also from consumer demand.

    “Demand is growing as consumers are used to the smartphone/app combination out of the car and are beginning to want it in the in-car environment,” Juniper analyst Anthony Cox told me. “What is driving this, though, is the fact that it has become easier to do through standards such as MirrorLink and therefore is reaching critical mass very fast.

    “Getting the in-vehicle entertainment system right can be the difference between the sale of a $15,000-$20,000 car or not, therefore if others are doing it a vehicle manufacturer cannot risk getting left behind… The cost of including this feature will be very low, and the benefits extremely high.”

    While connectivity has many potential uses in the vehicle, Juniper says infotainment will be the big driver – first through smartphone-tethering, then in-car systems. That said, the analyst house also noted a negative factor that could come into play: a slowing-down of the rate at which people are actually buying new cars in the developed economies.

    One interesting point in the report was that of the big data opportunities that come up when you stick connectivity into a car. This could mean extra revenue for both telematics companies and the car manufacturers themselves, Cox suggested:

    “While direct revenue from services is the most evident direct benefit from telematics, there are other benefits which may be equally important, such as the value which resides in the data that is generated from telematics installed in the vehicle.

    “Indeed, there is increasing interest in seeking to develop a revenue stream derived from analytics of the data accrued from the myriad electronic interactions within telematics-enabled vehicles. Furthermore, if the datasets that are collected within the vehicle are then combined with related datasets from partners, the combined data becomes far more powerful — and valuable — from a predictive analytics perspective.”

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Cloudera scores analytics-as-a-service deal with Germany’s T-Systems

    Cloudera’s Hadoop implementation just got a big boost through a strategic partnership with Deutsche Telekom’s T-Systems, one of Europe’s biggest IT services companies. This would appear to be one of the first results of Cloudera’s freshly-funded international enterprise push.

    The two companies are touting analytics-as-a-service using Cloudera Enterprise RTQ, featuring the Impala SQL query engine, on top of T-Systems’ existing cloud computing infrastructure. The package is available immediately for T-Systems’ European customers, while those outside Europe will get access in due course.

    “Our customers don’t want to have to worry about the hardware and software for big data,” claimed T-Systems BI and big data chief Christian Wirth in a statement. “They don’t want technology, just a reliable service. We can offer precisely this — which is what makes our new offer with Cloudera so special.”

    T-Systems counts big names such as Volkswagen and Royal Dutch Shell among its customers, so this is a significant deal for Cloudera. Cloudera’s is the go-to Hadoop distribution right now, but its position may not be unassailable: EMC’s GreenPlum division recently revamped its distribution by fusing it with its own analytics database, and even Intel now has a distribution out there.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Did British spies shoot down BlackBerry 10 for security reasons? Not quite

    According to a report in The Guardian (see disclosure), the latest BlackBerry devices have been deemed insufficiently secure for government use in the UK. The article maintains that Communications-Electronics Security Group (CESG) – the information assurance wing of intelligence agency GCHQ – examined the Z10 and its BlackBerry 10 software, concluding that their implementation of the BlackBerry Balance work-life-separation feature fails the government’s strict security requirements.

    This would be a terrible blow to BlackBerry, which desperately needs BlackBerry 10 to succeed if the company as a whole is to survive. BlackBerry’s biggest selling point has always been its security, and indeed version 7.1 of the software was approved by CESG just last November. The only problem is that – according to both BlackBerry and CESG – the Z10 and its OS have not been nixed.

    Here’s what CESG said:

    “Discussions with BlackBerry are ongoing about the use of the BlackBerry 10 platform in government. We have not yet performed an evaluation of the security of that platform, but we expect to be issuing Platform Guidance in the summer. This will cover a number of platforms including Blackberry 10 (and the use of ‘Balance’).

    “We have a long standing security partnership with BlackBerry and this gives us confidence that the BlackBerry 10 platform is likely to represent a viable solution for UK Government.”

    As for BlackBerry itself, the company called The Guardian‘s report, and others repeating its claims, “false and misleading”:

    “BlackBerry has a long-established relationship with CESG and we remain the only mobile solution approved for use at ‘Restricted’ when configured in accordance with CESG guidelines. This level of approval only comes following a process which is rigorous and absolutely necessary given the highly confidential nature of the communications being transmitted.

    “The current re-structuring of this approval process, due to the Government Protective Marking Scheme review and the new CESG Commercial Product Assurance scheme has an impact on the timeline for BlackBerry 10 to receive a similar level of approval.

    BlackBerry went on to point out that both the U.S. and German authorities have given BlackBerry 10 the all-clear, and it expects the British to do the same.

    So what’s going on here? If you look very carefully at the wording of the denials, the anonymous sources that informed the original article may well have been correct – it could still be the case that the Z10 flubbed a specific test, resulting in CESG going back to BlackBerry and asking them to fix the problem. This would qualify as “ongoing discussions”, and when CESG says it has “not yet performed an evaluation of the security of that platform”, those words could be taken to mean the full evaluation has not yet been completed.

    However, it is certainly not the case that the Z10 and BlackBerry 10 have been rejected outright by the UK’s spooks and their vetting processes. We’re probably looking at a situation where BlackBerry will update the platform, and CESG will take another look before drawing firm conclusions.

    For now, BlackBerry can continue to claim the security cred it so desperately needs.

    Disclosure: Guardian News & Media, which publishes The Guardian, is a minority investor in GigaOM.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • SDN can turn the network into a big data “curator,” claims Juniper

    Software-defined networking (SDN) will help application developers provide context for all the data their services generate and consume, according to Juniper Networks product management lead Jennifer Lin.

    SDN involves the abstraction of the network’s brains, as it were, from its hardware. This is analogous in some ways to server virtualization, in that it makes it much easier to build smarter systems on top of commodity hardware. Juniper’s take on this sees the network as four layers, namely forwarding, control, services and management — in Juniper’s vision, everything but the forwarding layer should be centralized.

    Lin, who joined Juniper through the company’s acquisition of SDN specialist Contrail Systems, said at GigaOM’s Structure:Data conference in New York on Wednesday that federating the control function and eliminating “manual error-prone processes” would help the big data because:

    “We’re seeing a huge opportunity here to reposition the role of the network as a curator of big data and make sure that role is easily exposed through abstractions of the network. The role of the network is interesting because the network is the only thing that’s globally pervasive and … uniquely knows a lot of the contextual information that is required to drive insights back into the system.”

    Lin argued that this “rich context” would enable new types of business models such as collaborative data exchanges, without anyone needing to worry about the technology architectures involved. “The role of the network is changing quite heavily and the pace of innovation for hyperconnected data is really astonishing,” she added.

    Check out the rest of our Structure: Data 2013 coverage here, and a video embed of the session follows below:


    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Amazon gets into hot water in UK over lewd Christmas card listing

    Welcome yet again to the collision between the virtual and real worlds. Amazon has been slapped down by the UK’s Advertising Standards Authority (ASA) over a listing on Amazon.co.uk for a rude Christmas card. Although Amazon tried to claim that listings aren’t ads and shouldn’t be covered by the regulator, the regulator disagreed.

    The card in question, from a company called SmellYourMum (SYM), read, “You’re a c*nt. Sorry, I meant to say ‘Merry Christmas,’” although without the asterisk I inserted (this is a family website, after all). This was shown in an image, with the text alongside it including the aforementioned asterisk.

    SYM claimed the ad wasn’t offensive because of “the specific context of it appearing on a humorous card intended for close friends or family.” Amazon chimed in saying the card was “meant as a bit of light-hearted, irreverent fun,” but also went a step further, arguing that the ad in question wasn’t an ad at all, but a product listing.

    Nonetheless, the ASA said it qualified as an ad and therefore fell under its remit. It said the use of the c-word was “so likely to offend that it should not be used at all in marketing communications even when it was relevant to the name of the product.”

    Interestingly, part of the problem here is that Amazon doesn’t have an adults-only category for products carried on its site. SYM also noted that Amazon didn’t provide a way for it to censor the image, which showed the asterisk-free version of the card’s message (that said, the ASA said even the asterisked version was too offensive).

    There are many products in Amazon’s UK store that would probably fall foul of the precedent here. So the question is, is this just excessive censorship, or does the regulator have a point here?

    If a physical shop carried a poster for such a card in its window, there is little doubt that people would complain. And although the ASA said the offensive word should not even be used in marketing communications, I suspect that the card’s listing in a printed catalog would not have elicited such a complaint to the advertising regulator in the first place.

    The ruling leaves Amazon in a difficult position, due to the breadth of third-party products carried in its store. It doesn’t help that the ruling also comes in the same month in which Amazon U.S. was found to be advertising algorithmically-generated but nonetheless appalling “Keep calm and rape a lot” T-shirts. If there’s much more of this kind of pressure, Amazon may have to be a bit more proactive about screening the products it carries, or at least adjust the way in which it advertises them.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Meet OX Text, a collaborative, non-destructive alternative to Google Docs

    The German software-as-a-service firm Open-Xchange, which provides apps that telcos and other service providers can bundle with their connectivity or hosting products, is adding a cloud-based office productivity toolset called OX Documents to its OX App Suite lineup.

    Open-Xchange has around 70 million users through its contracts with roughly 80 providers such as 1&1 Internet and Strato. Its OX App Suite takes the form of a virtual desktop of sorts, that lets users centralize their email and file storage accounts and view all sorts of documents through a unified portal. However, as of an early April release it will also include OX Text, a non-destructive, collaborative document editor that rivals Google Docs, and that has an interesting heritage of its own.

    OX Text iPadThe team that created the HTML5- and JavaScript-based OX Text includes some of the core developers behind OpenOffice, the free alternative to Microsoft Office that passed from Sun Microsystems to Oracle before morphing into LibreOffice. The German developers we’re talking about hived off the project before LibreOffice happened, and ended up getting hired by Open-Xchange.

    “To them it was a once in a lifetime event, because we allowed them to start from scratch,” Open-Xchange CEO Rafael Laguna told me. “We said we wanted a fresh office productivity suite that runs inside the browser. In terms of the architecture and principles for the product, we wanted to make it fully round-trip capable, meaning whatever file format we run into needs to be retained.”

    This is an extremely handy formatting and version control feature. Changes made to a document in OX Text get pushed through to Open-Xchange’s backend, where a changelog is maintained. “Power” Word features such as Smart Art or Charts, which are not necessarily supported by other productivity suites, are replaced with placeholders during editing and are there, as before, when the edited document is eventually downloaded. As the OX Text blurb says, “OX Text never damages your valuable work even if it does not understand it”.

    “[This avoids] the big disadvantage of anything other than Microsoft Office,” Laguna said. “If you use OpenOffice with a .docx file, the whole document is converted, creating artefacts, then you convert it back. That’s one of the major reasons not everyone is using OpenOffice, and the same is true for Google Apps.”

    OX Text will be available as an extension to OX App Suite, which also includes calendaring and other productivity tools. However, it will also come out as a standalone product under both commercial licenses – effectively support-based subscriptions for Open-Xchange’s service provider customers – and open-source licenses, namely the GNU General Public License 2 and Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License, which will allow free personal, non-commercial use.

    You can find a demo of App Suite, including the OX Text functionality, here, and there’s a video too:

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Crowdsourced location data firm Grafetee opens up to businesses and enterprise users

    There’s a huge amount of value in location-based services, and I’m not even necessarily talking about shopping deals and the like. Maps are the ideal way to both collect and present localized data on all sorts of things, from crime to potholes — the only issue is setting up such services and, as it happens, a Finnish outfit called Grafetee has just launched tools to make that task a lot easier.

    Grafetee lets you set up a new embeddable, interactive map on the Grafetee website, for free and within a minute or two. This service was already available, but now bloggers and businesses can pay $20 a month for a premium version that includes a channel in the Grafetee mobile app (for Android and iOS), customizable graphics and tools for moderating user submissions. Enterprise and governmental users can also pay $200 a month to get a webpage under their own domain, along with premium support and API access to their content.

    The Finnish police force was an early Grafetee user, having set up a map so citizens could, for example, notify the cops that a certain park should be patrolled on weekends due to troublesome teenagers hanging out there. Since then, others picked up on the idea, such as animal shelters wanting people to flag strays, and mobile operators looking to crowdsource coverage data. According to founder Juha Huttunen, someone even set up a Grafetee map for tracking toxic seaweed during the Finnish summer.

    And yes, it can be used for offers too. “If you have a chain of cafes or whatever you can send your own offers to your customers,” Huttunen explained to me. “You would have a channel in the Grafetee app and, using the toolkit, the cafeteria would upload their offers. Anyone subscribing to the channel in the app would see those offers whenever they are close by.”

    A couple of Finnish startups have already built their services using Grafetee, and they actually provide a pretty good insight into the range that’s on offer. One, kidd.io, is on the simple side, collecting and displaying the locations of child-friendly services around Helsinki. Hoods.fi, a location-based flea market and garage sale service, shows greater complexity.

    There are other services in this space — AmigoCloud targets the enterprise and public administrations, Ushahidi’s Crowdmap (currently in closed beta) is for aid groups tracking crises, and Everplaces is all about community-sourced recommendations – but none that I’ve seen have quite the combination of simplicity and breadth that Grafetee offers.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Google expands Chromebook availability to six more countries while doubling down in U.S.

    Google’s cloudy Chromebooks must be doing well. The company has just extended their availability to six new countries, namely Australia, Canada, France, Germany, Ireland and the Netherlands, and doubled the number of Best Buy stores in the U.S. in which the Chrome OS laptops are sold.

    According to a blog post early on Tuesday, Samsung’s Chromebook has been a best-seller on Amazon U.S. for 150 days, and over 10 percent of laptop sales in the UK electricals stores Currys and PC World have been Chromebooks.

    Chromebooks go on sale from Tuesday in the aforementioned countries, where Google will also be pushing the devices on businesses and schools. Availability will differ somewhat from country to country, although generally the Acer and Samsung Chromebooks are on sale now, with HP’s effort on its way soon.

    I get the feeling that Google has spotted a gap in the market here. At the size and price point we’re talking about (roughly between $250-$350), people will most likely be buying and using Chromebooks as they would have netbooks. With the manufacturers having more-or-less abandoned the netbook market, those who want a cheap, portable, notebook-format device may very well find themselves looking in Chrome OS’s direction.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • End of an era at ARM, as CEO Warren East retires

    ARM, the British chip architecture firm responsible for powering the vast majority of mobile phones and tablets, will soon have a new CEO: Simon Segars, currently the company’s president. Warren East will retire at the end of June.

    East, 51, has been CEO at ARM since 2001, although he has been at the firm since 1994 (he was originally head of ARM’s consulting business, then business operations chief, then COO). Segars, 45, has been at the company even longer – since 1991, shortly before Apple incorporated the ARM6 design into its Newton PDA. Like East, Segars is an engineer who evolved into sales and business development roles.

    Both men are largely responsible for turning ARM, once a mere spinoff of Acorn Computers, into what it is today: Intel’s nightmare. For not only does ARM dominate in the mobile device, which is in itself supplanting Intel’s desktop base, and in embedded processors, but it is even squaring up to the x86 crowd in the server space.

    Here’s ARM chairman John Buchanan:

    “Warren has transformed ARM during his time as CEO. In 2001 ARM had one processor product line found mainly in mobile phones. Now ARM provides the broadest portfolio of technologies in the industry, used by more than 300 semiconductor customers in nearly 9 billion chips last year.

    “During Warren’s tenure the company has received royalties for over 40 billion ARM-based chips. As CEO he has created a strong platform for growth and consistently created value for shareholders even in a challenging external environment. On behalf of the Board, and the wider ARM team, deep thanks are due to Warren for his passion, service and leadership.”

    So, will the leadership change affect ARM’s strategy? Right now ARM is safe in its mobile stronghold, although Intel’s efforts there are not the joke observers once suspected they might be – Intel’s mobile processors are surprisingly capable when it comes to raw performance and power efficiency, although ARM still edges ahead in the graphics department.

    We can glean a strong sense of continuity from the words of East and Segars themselves. According to East, the two men “share a global perspective and belief in the ARM approach to partnership and collaboration”. Segars said East’s “vision of the ARM business model and commitment to the ARM partnership has been inspirational and has created a tremendous platform for future growth”.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • European carriers are moving away from handset subsidies, analysts find

    One by one, the signs point to the decline and perhaps demise of the mobile handset subsidy. Whether it’s Vodafone paying newfound attention to the high-end pay-as-you-go market or regulators threatening to let contract customers walk out in the event of a price hike, there are frequent signs that carriers won’t be subsidizing the smartphones they sell you forever.

    In the U.S., this is a new thing. It was only in December that T-Mobile USA announced its abandonment of smartphone subsidies, much to the interest of other players such as Verizon, but in Western Europe things have moved on quite a bit further. In fact, according to new research from Informa Telecoms & Media, almost 30 operators there have already dropped handset subsidies for some or most customers.

    What’s taking the place of those subsidies? Leasing and financing plans, such as Vodafone’s Red Hot and O2 Germany’s My Handy schemes. According to Informa analyst Francesco Radicati, this makes it easier for operators to cope with the growing popularity of expensive smartphones:

    “The rising cost of devices like the iPhone means operators have to pay increasingly large subsidies to offer ‘free’ phones. Financing allows operators to continue offering phones for a low up-front price without subsidizing them; as an added bonus, it makes it easier to market smartphones to consumers on pay-as-you-go.”

    Why does this matter? Partly because it spells the end for lengthy contract lock-in periods — something operators have to consider anyway due to new consumer protection laws in countries such as Denmark — but also because it means a major shift in consumers’ perception of smartphone costs.

    Absorbing handset costs into the associated monthly contract payments creates the illusion of the handsets being cheap or even free. This illusion has been handy in some ways — perhaps the smartphone revolution would not have been possible at scale without it — but ultimately it distorts the market.

    Expensive toys don’t really come for free, and pretending that they do doesn’t help anyone. Two-year contract terms should not be the norm. Monthly payments should reflect only the service that the consumer gets in return; nothing more. On top of that, the need to absorb more and more upfront handset costs certainly doesn’t do much for carriers’ ability to invest in their networks. If subsidies really are on their way out, then good riddance to them.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Fusion-io picks up software-defined storage firm ID7 for SCST chops

    The flash storage firm Fusion-io has picked up ID7, a British software-defined storage outfit, for an undisclosed amount. This is a big deal because ID7 is the driving force behind the SCST Linux storage subsystem, widely used in storage products from vendors including HP, EMC and IBM.

    According to Fusion-io, the deal will leave safe the open-source distribution of SCST. On the other hand, ID7 makes its money off helping those other hardware vendors implement SCST in their commercial products, so in that sense Fusion-io just bought its way closer to the center of the software-defined storage universe.

    Here’s what Fusion-io product chief Gary Orenstein had to say in a statement on Monday:

    “As with other kernel contributors across the Linux stack working at Fusion-io, we will continue to support the open philosophies that have made ID7 and SCST successful. In addition to maintaining an open source version of SCST, Fusion-io will continue to contribute to the open source distribution as we develop software solutions to help define the all-flash data center.”

    Software-defined storage, where storage is abstracted in much the same way as has been done with servers, is a lucrative scene right now. Just in recent months, we’ve reported on major investments for players such as SwiftStack, ScaleIO, Convergent.io, Nutanix and Jeda Networks.

    The supposed benefit of the software-defined storage approach is the ability to weave shared storage pools out of standard server-attached hardware, so usage can be quickly scaled up and down as needed. ID7 has already been working with Fusion-io on its ION Data Accelerator software, which does this in an interface-agnostic fashion, and will indeed be folded into this side of Fusion-io’s business.

    Again from the statement, here’s ID7 co-founder Mark Klarzynski:

    “We had an opportunity to work with Fusion-io on the development of the ION Data Accelerator when it became apparent that the team has been founded on a culture of architecting software innovation deep within the Linux operating system kernel to deliver significant breakthroughs in modern storage architectures. We’re excited to join the Fusion-io team of world class engineers and developers to work together on open, software defined solutions to today’s most challenging data demands.”

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • What if every ‘like’ and ‘favorite’ came with money? Flattr makes it possible

    A lot of people want Flattr — or something like it — to work. Monetizing online content is a continuing problem, and micropayments may provide a solution. Flattr is probably the best-known exponent of these virtual tips, or “microdonations” as it calls them, and a few content platforms such as DailyMotion have signed up to allow their users to make pocket-money off their videos.

    However, “flattring” someone has until now remained a slightly clunky business, with the content platform needing to carry a Flattr button and with the user having to remember to click it in order to reward the creator. No longer – changes revealed on Monday make it possible to flattr someone simply by clicking the “like” or “favorite” button that’s already next to their content. At launch, 8 services are supported: Twitter, Instagram, SoundCloud, Github, Flickr, Vimeo, 500px and App.net.

    That’s right: this makes it possible for you to earn money just by being an awesome tweeter.

    Cashing in

    Let’s remind ourselves of how Flattr works: users budget a certain amount of money that they want to donate or pay each month. Let’s say User X wants to spend $10 a month. Each time User X flattrs someone, that flattr gets added to a tally, and at the end of the month the money gets divided by that number. Flattr itself takes a 10 percent cut, so, if User X flattrs people 100 times in the month, each recipient then gets 9c.

    According to Flattr co-founder Linus Olsson, there have been around 1.5 million flattrs performed since the service launched three years ago. Ignoring the fact that some pay a lot and others very little, the average monthly spend per user is around €4.50 ($5.80) and the average flattr is around €0.50. From this, we can deduce that, on average, users flattr around 9 times each month – this is really not much, and it highlights the need for Flattr to make the changes it announced today.

    As Olsson explained to me, it was one thing to have a button that blog proprietors could integrate into their own self-hosted site, but it’s quite another thing to handle the content spewed out on platforms such as Twitter:

    “The main way of flattring before has been the button, but the problem with the button is with most content sites today it’s impossible to integrate the button. So we have been thinking how to make it simpler to flattr and possible to flattr in places where the button cannot be added.

    “The logical way was to use existing like and favorite buttons, which one can argue are empty right now. Now you can make those functions worth something. We see it as giving them the value they should have.”

    This integration has not involved partnering up with Twitter and the others; instead, Flattr is simply using their APIs. “That’s one reason we didn’t do this when we started three years ago — it wasn’t possible,” Olsson pointed out.

    More widespread, but more subtle

    The use of APIs comes with several benefits for Flattr. For a start, it gets the startup around the problem presented to it by Apple last year. Apple rejected a podcasting app called Instacast on the basis that it included Flattr payment functionality – this apparently broke the App Store T&Cs, because it didn’t give Apple a way to claim its 30 percent cut of all in-app payments.

    Now, because Flattr’s method of tapping into the core service’s APIs obviates the need for a telltale Flattr button, Apple would have no way of knowing whether the use of an app that’s plugged into Instagram or Twitter, for example, might result in someone making money without Cupertino taking a slice.

    The other problem partially solved by the API approach is that of unclaimed flattrs. A Twitter user, for instance, doesn’t have to sign up to Flattr in order to have people flattr their tweets – they do, however, have to create a Flattr account in order to get the cash. So, when they create that Flattr account, authorizing Flattr on their Twitter account will tell the system that, yes, they are the person whom User X meant to credit.

    That said, there is an outstanding problem: right now Flattr has no way of automatically informing people that someone out there is trying to give them money; it’s up to the user to tell their intended recipient to sign up and claim their payment (the payment only leaves the user’s account once it is claimed).

    Will it work?

    As I stated above, there is a lot of goodwill behind the micropayments concept, but also a number of failed attempts to make the concept work in reality.

    If you view this as a chicken-and-egg dilemma, then Flattr is very much doing the right thing. After all, you’re less likely to get into being a Flattr user if the person you want to give money to hasn’t made it super-easy to take Flattr payments. Conversely, if there aren’t scores of people using the service, there is little impetus for content platforms to incorporate the Flattr button.

    In theory, quietly plugging into platforms such as Twitter and Instagram makes it a heck of a lot easier for the service to gain scale. However, it raises another issue: visibility. If there’s no Flattr button, how is the company going to educate users about the scheme? How will they know that this system is in place, allowing them to reward their favorite content producers?

    Olsson reckons the imminent introduction of automated notifications for content creators will help the service spread: “First people get unclaimed flattrs, get a message about them, collect them [then] flattr others.” I’m not so sure. It’s true that the services we’re talking about didn’t sport Flattr buttons in the first place, but I can’t help but feel that some extra marketing element would be needed in order to really educate potential users about the service.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Ericsson and STMicro agree ST-Ericsson divorce terms, with 1,600 jobs on the line

    This story was updated at 4:30am PT with confirmation from Ericsson that ST-Ericsson’s recently-announced NovaThor chipsets have been cancelled.

    With STMicroelectronics having indicated back in December that it wanted out of its chipmaking joint venture with Ericsson, and with Ericsson having politely declined to buy the half it didn’t already own, it was only a matter of time for ST-Ericsson. The question was how it would go, and now we know the answer: perhaps predictably, Ericsson will take on the modem side of the business and STMicro will take on other existing products as well as some of the manufacturing facilities. The rest will be shut down.

    As for jobs, around 1,800 employees and contractors will transfer to Ericsson (mostly in Sweden, Germany, India and China) and around 950 to STMicro (mostly in France and Italy). Approximately 1,600 employees are likely to find themselves without a job – 50-80 of them in Germany and 400-600 in Sweden.

    Former ST-Ericsson CEO Didier Lamouche announced his resignation a week back and, according to Monday’s announcement, his replacement from 1 April will be current COO Carlo Ferro. Ferro won’t be in place for long, though, as STMicro and Ericsson said they expected the breakup to be completed during the third quarter of the year.

    Ericsson chief Hans Vestberg said his company saw a great future for the “thin modem” side of ST-Ericsson (the term refers to multimodal, low-power modems that draw their intelligence from the associated mobile application processor), which Ericsson will now run as a standalone business:

    “Ericsson continues to believe that the thin modems hold a strategic value to the wireless industry. With this move Ericsson will create a highly focused ‘thin modem only’ operation — an area in which both parents have invested significant amounts to establish industry leading technology and intellectual property. Initial customer contacts give support to the belief that our modems will meet the requirements of the manufacturers in the rapidly growing smartphone and tablet market.”

    ST-Ericsson had been hemorrhaging money for many quarters. Indeed, it had never been profitable since being established in 2008, but it was particularly damaged by the negative fortunes of its big two customers, Sony-Ericsson (now entirely a Sony affair) and Nokia, which used ST-Ericsson chips in its low-end phones but never adopted the NovaThor system-on-a-chip (SoC) platform for its Windows Phones, as ST-Ericsson claimed it would back in 2011. Nokia’s Lumia handsets continue to use Qualcomm chipsets, as do most other high-end smartphones these days.

    ST-Ericsson had only just unveiled its latest NovaThor chipsets last month at Mobile World Congress. However, a spokewoman for Ericsson told me that these new chipsets — namely the the L8540 and L8580 lines — are being immediately discontinued. The ageing U-series, such as the U8500 that was announced in 2011 and that still powers midrange devices such as the Samsung Galaxy SIII Mini, will continue under STMicro’s auspices, she added.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Finnish development firm offers to pay salaries partly in Bitcoins

    A Finnish developer outfit called SC5 has begun giving its employees the option of having part of their salaries paid in Bitcoins, the peer-to-peer virtual currency. This is not technically the first time this idea has been floated – the Internet Archive is planning to do the same from April – but it’s still a radical move at this early stage of the Bitcoin game.

    From SC5′s blogpost:

    “We are doing this just out of curiosity to try out new things. Bitcoin as such fits our vision of the world quite well. It allows for open source development, competition and innovation in the field of payments and Internet commerce. Based on cryptography, it is secure and deterministic as we require for digital services. As a comparison, credit cards rely on few enough physical cards getting stolen or copied and the centralized organizations covering fraud for billions of dollars each year.

    “For currency conversion we use the daily exchange rate of the payday. The euro amount to be converted into Bitcoins is deducted from the net salary on the employee’s paycheck. Bitcoins are sent to the address provided by the employee.”

    I’m not an economist, so I’m going to steer clear of commenting on the intelligence of opting to receive part of your salary in the currency (there are also many excellent explanations out there of how the currency is algorithmically generated and controlled). That said, Bitcoin has been doing very well recently – so well that many suspect we’re experiencing a Bitcoin bubble.

    SC5′s decision to experiment with Bitcoin-based salary payments is not entirely surprising. Last month a young developer by the name of Martti Malmi joined the company — Malmi, also known as Sirius, was one of the earliest developers involved in the Bitcoin project.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Privacy in the mobile age? You’re doing it wrong, say EU regulators

    Everyone knows how finicky the European Union is when it comes to data protection in the cloud, but until now there hasn’t been much noise regarding the humble smartphone app. Now a group of privacy regulators from across Europe has published its opinion on that subject, and the result may be a world of pain for anyone involved in the mobile ecosystem.

    The group is called the Article 29 Working Party and, while it doesn’t make laws, it does have a great deal of influence over those who do, and over the way in which privacy laws are interpreted. Its opinion (PDF warning) on mobile apps will be unwelcome in many quarters because it states that just about everyone in the mobile industry — app developers, app store proprietors and even OS and device vendors — has a range of legal obligations around protecting and properly collecting and processing user data.

    Compliance with E.U. data protection law means sticking to several principles. First and foremost, the user needs to give full and unambiguous consent to having their data processed. Data processing has to be for a legitimate purpose — like the app’s stated use case — and everyone has a responsibility to keep personal data secure.

    Even those mobile players who are trying to stick to the rules may find the task more complex than they first imagine. Here’s an example given by the regulators (with bold type reflecting my emphasis):

    “An app provides information about nearby restaurants. To be installed the app developer must seek consent. To access the geolocation data, the app developer must separately ask for consent, e.g. during installation or prior to accessing the geolocation. Specific means that the consent must be limited to the specific purpose of advising the user about nearby restaurants. The location data from the device may therefore only be accessed when the user is using the app for that purpose. The user’s consent to process geolocation data does not allow the app to continuously collect location data from the device. This further processing would require additional information and separate consent.

    Similarly, for a communication app to access the contact list, the user must be able to select contacts that the user wishes to communicate with, instead of having to grant access to the entire address book (including contact details of non-users of that service that cannot have consented to the processing of data relating to them).”

    How about app stores? Here, the working party recommends that apps “should not just be rated by users for how ‘cool’ they are, but also on the basis of their functionalities, with specific reference to privacy and security mechanisms”.

    These kinds of recommendations may seem a tall order, but they are doable. However, the working party seems under no illusion about the challenge it faces. Here’s the whole problem with ensuring the rules get stuck to, distilled into a single passage:

    “A high risk to data protection comes from the degree of fragmentation between the many players in the app development landscape. A single data item can, in real time, be transmitted from the device to be processed across the globe or be copied between chains of third-parties. Some of the best known apps are developed by major technology companies but many others are designed by small start-ups. A single programmer with an idea and little or no prior programming skills can reach a global audience in a short space of time. App developers unaware of the data protection requirements may create significant risks to the private life and reputation of users of smart devices. Simultaneously, third-party services such as advertising are developing rapidly, which, if integrated by an app developer without due regard, may disclose significant amounts of personal data.”

    There’s the rub. The creation and distribution of apps can involve many, many parties, with services interlinked in a way that’s hard to keep track of — especially since one of the fundamentals of EU data protection law is that the user is kept fully informed of what’s happening with their data, the likelihood of proper compliance breaks down on that point alone. That’s before we even get to the thorny issue of who is situated where and whether sending data to that location means breaking the rules, or how many opportunities for a security breach get opened up by having so many links in the chain.

    It’s one thing imposing these rules on a big cloud provider, but what about the one or two-person team that comes up with some app that taps into multiple APIs linking to services around the world? Are they supposed to have a designated data controller within their organization, keeping an eye on compliance? That’s hardly going to be top of their agenda when their app may have been created and set live practically on a whim.

    What the Article 29 Working Party is doing here is noble — and I don’t mean that dismissively. We should all be thinking about this stuff. Low barriers to entry shouldn’t be an excuse for ignoring a cumulative effect of privacy erosion.

    The question is, are these guidelines going to stay a wishlist, or are we going to see Europe’s regulators enforce them? That’s what these opinions often presage, so we may soon find out what privacy regulation really means in the mobile age.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Scoop: Deutsche Telekom dives into multi-cloud management with NetOptimize

    Deutsche Telekom (DT) hasn’t announced this one yet, but the German communications giant is getting into the cloud multi-sourcing business. The website for two new services is already live: they’re called NetAnalyze and NetOptimize, and the focus seems to be on content delivery.

    While public cloud services, including content delivery networks (CDNs), are usually very reliable, no one is perfect. Outages happen, and as a result some companies find themselves looking into multi-cloud strategies to ensure redundancy (and to optimize performance and cost). The issue is that cloud costs and resource allocation are complex — hence the emergence of a new breed of cloud mediation services such as Rightscale and Cedexis.

    DT is preparing two complementary services in this space. The first is NetAnalyze, which draws on the billion network measurements that DT’s “community” takes every day, spanning 32,000 networks in 230 countries. Webmasters can put the NetAnalyze tag on their site and visiting customers will then automatically generate anonymized measurement for metrics like throughput and response time.

    Then NetOptimize kicks in. When a customer requests the website from wherever they are located, NetOptimize will use the NetAnalyze metrics to determine which provider will deliver the content most quickly, and automatically route the content accordingly. Pricing for this load-balancing service is pay-per-use. The result, in theory, is better performance and lower risk of outages, and also better price-to-performance ratios, given the ability to hop between different providers according to needs.

    DT’s website also touts the fact that such multi-sourcing approaches make it easier to avoid vendor lock-in. The company says NetAnalyze and NetOptimize make it possible to “form a unified strategy across multiple platforms (cloud, data center or CDN)”.

    A glance at the NetOptimize portal (which appears to default to Japanese, at least from my end) shows that the service covers numerous clouds and CDNs. On the cloud side, we have locations for Amazon EC2, Google App Engine, GoGrid, InstaCompute, Internap AgileCLOUD, Joyent, PhoenixNAP, Profitbricks, Rackspace Cloud, Softlayer and Windows Azure. For CDN, there’s Akamai, Azure, BitGravity, CacheFly, CDN77, CDNetworks, CDNVideo, ChinaCache, ChinaNetCenter, CloudFlare, Cloudfront, Edgecast, Fastly, Fastweb, Highwinds, Internap AgileCAST, Internode, Level3, Limelight, NetDNA, Ngenix, OnApp, Pacnet, UPX CloudCache and Yacast.

    I’ve asked DT for further details of the service, such as when they intend to officially take the wraps off it, and will add their response when I get it.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • CERN: We’re sure this is a Higgs boson, but we’re not sure which one it is

    Last July physics researchers at CERN said they thought they had found evidence of the Higgs boson, a theoretical but essential component of our standard model of physics, and the raison d’être of the enormous Large Hadron Collider (LHC). Now they’ve come back with further analysis of their data, and they’re surer than ever that what they found is the real deal.

    How sure? Well, these are scientists so there’s still a note of caution, but Joe Incandela, a spokesman for one of the LHC experiments, went on-record with a pretty confident statement: “The preliminary results with the full 2012 data set are magnificent and to me it is clear that we are dealing with a Higgs boson.”

    However, they’re still not sure what kind of Higgs boson they’re looking at. From today’s statement:

    “Having analysed two and a half times more data than was available for the discovery announcement in July, they find that the new particle is looking more and more like a Higgs boson, the particle linked to the mechanism that gives mass to elementary particles. It remains an open question, however, whether this is the Higgs boson of the Standard Model of particle physics, or possibly the lightest of several bosons predicted in some theories that go beyond the Standard Model. Finding the answer to this question will take time.”

    It’s not surprising that this task takes time. CERN said a month ago that its storage systems were holding 100 petabytes of data.

    The research organization has been working closely with companies such as Yandex to sift through that information in search of unusual events, and in Thursday’s statement CERN pointed out that finding one event means looking through around a trillion proton-proton collisions.

    “To characterize all of the decay modes will require much more data from the LHC,” the statement read. For now, the LHC is turned off – it will come back online next year.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Wunderlist tiptoes further onto Evernote’s turf by adding web clippings browser extension

    Berlin-based 6Wunderkinder has added a major feature to its Wunderlist task-management service — a browser extension called Add to Wunderlist that lets you save and share web clippings and even emails from the web app versions of Gmail, Outlook and Yahoo Mail.

    The extension is available today for Chrome, Firefox and Safari users. It allows the saving of any URL to the service, but also more specific content from sites such as Amazon, eBay, YouTube, Hacker News, IMdB and Twitter – on Amazon, for example, an “Add to Wunderlist” button will show up next to the “Add to wishlist” button if you have the extension installed.

    Wunderlist Amazon6Wunderkinder was able to add its button to these sites through the use of their APIs, and it has also released the code to help other sites also allow the button’s addition. The content that the service saves differs from site to site (it may include URLs, prices or ratings, for example), but the user can always just highlight any text and hit the button up in the toolbar to save it.

    Why is this important? For a start, it makes Wunderlist a much stickier service. It also makes it much clearer how the consumer and pro versions of Wunderlist are beginning to diverge: Wunderlist Pro, the details of which were accidentally leaked earlier this week, is shaping up to be a replacement for the axed Wunderkit team productivity service, while the normal Wunderlist is, well, it’s starting to look a bit more like Evernote, right?

    “We definitely have the same kind of strategy,” 6Wunderkinder CEO Christian Reber admitted today. “When we build the product, we definitely say all the time that we want to own every single task … we want to integrate it in every part of your lives, on every device you have.

    “We share the same space as Evernote somehow, but Evernote is the main tool for notes and we are the main tool for tasks. We will probably conflict in the future in some places, but the two products can definitely coexist. Personally I use Evernote and Wunderlist. We will see in the future how it will work out — we don’t focus on following what our competitors do.”

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Cisco accused of stealing data from Swiss services firm Multiven

    Multiven has accused Cisco of espionage, claiming that the networking giant stole thousands of its files.

    The Zurich-based IT services company has had a long and often fractious relationship with Cisco. It has sued the networking giant repeatedly – in the U.S. in 2008 and in Switzerland last year – claiming that Cisco’s bundling of network maintenance service plans amounted to an abuse of monopoly. So far, the suits have proven unsuccessful. Cisco also countersued, claiming Multiven CEO Peter Alfred-Adekeye (a former Cisco employee) had broken into its systems and stolen software. Alfred-Adekeye was even arrested at one point, which he claimed was all Cisco’s doing (Cisco denied involvement).

    And now Multiven has filed complaints with both the U.S. Department of Justice and the Swiss Cybercrime Coordination Unit, alleging “the theft of thousands of its proprietary and copyrighted data files from its knowledge base, mysolvr.com”. Multiven also claims that this alleged unlawful access “put undue load on Multiven’s server resulting in a degraded service for its legitimate users and customers”.

    According to Multiven, the files were stolen using “automated cyber scraping software”, and an internal investigation traced the attack back to IP addresses assigned to Cisco over in California. Customer and user passwords were apparently not taken.

    Multiven is looking for a public apology from Cisco, with a deadline of 5pm PT on March 29. If that’s not forthcoming, it says it will launch a civil suit. Here’s what Alfred-Adekeye had to say in a statement:

    “Based on the fact that the source IP addresses of these systematic and premeditated theft of Multiven’s intellectual property by Cisco Systems originated from Cisco’s headquarters in San Jose, California, it is clear that Cisco CEO John T. Chambers and General Counsel Mark Chandler or people under their control instigated these thefts. Per standard operating procedure, we have reported these breaches to law enforcement but we will refrain from seeking a civil redress if Cisco issues a public apology immediately and the assurance that none of the stolen data has been used for its advantage and it has now all been deleted.”

    I’ve asked Cisco for comment on the allegations and will add it in as soon as I receive it.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.