Category: News

  • Lock down almost any PC with Deskman

    If there’s an aspect of your PC which you don’t like then it can normally be changed very quickly: a right-click option here, maybe launch a Control Panel applet there, install a new program perhaps, and the system should soon be more suited to your needs.

    But while this configurability is great on your own computer, it’s a real problem when you want a PC to be much more restrictive: a system which you’ll install in a school, say, or a business. What you’ll probably want to do then is set up some basic configuration, and make sure your users can’t do anything to change it — and that’s where Deskman comes in.

    The compact commercial tool (priced from $60) appears deceptively simple at first, with the bulk of its functionality available in just a single dialog box. Is that it, you might wonder? Browse through the tabs, though, and you’ll be surprised at just how much the program can do.

    You might start by building a Safe Start Menu, for instance, with only the applications you’d like your users to access. The regular Start Menu can then be hidden (although it still exists, if you need to use it yourself later).

    And because of course users might try to launch programs in other ways, Deskman also provides a Freeze option which allows you to define exactly which programs can be run.

    If browsing is an issue, then you can turn it off entirely, or restrict users to visiting just specific sites which you define.

    And you can set up your preferred desktop with your own choice of application icons, shortcuts and more, and the program will maintain and restore this for you, no matter what your users might try to do.

    More experienced users will of course try various tricks to get around this, but Deskman has options to block them all. So you can disable or limit Task Manager, for instance; disable the Windows keys, Alt+Tab and all the other system keypresses; hide the system tray, application buttons or the entire taskbar; restrict access to Control Panel, Explorer and a whole lot more.

    And while the sheer volume of options means it’ll take a while to set up Deskman properly, the mechanics of the process isn’t difficult. For the most part you’re just working your way through a tabbed dialog, checking boxes next to a restriction you need, and the program will then apply these with a click.

    Deskman may initially feel a little expensive, then, but if you really need to protect a computer then it’s well worth the investment: the ability to preserve your system setup without you regularly having to manually restore it will save you a great deal of time and hassle. It’s a very powerful tool with a lot of options, and there’s a 30-day trial available so you can sample them for yourself.

    Photo Credit: Kutlayev Dmitry/Shutterstock

  • Beyonce Halftime Show: She Broke The Super Bowl

    Beyonce appears to have won over quite a few of the haters who were complaining about her lip-synching scandal at the inauguration with the insanely energetic, sweat-filled workout she gave us at the Super Bowl’s halftime show; Twitter and Facebook are teeming with posts about the performance, which has apparently sucked all the energy from the Superdome.

    Perhaps it was the huge screens filled with images of multiple Beyonces, or the skin-tight outfit she was rocking, or the sudden appearance of Kelly Rowland and Michelle Williams onstage despite rumors that they wouldn’t be able to appear for the much-touted reunion, or the band full of lovely ladies, one of whom was playing a guitar that shot sparks from both ends…any one of those things could have easily caused a power outage. Of course, as soon as the lights went down, the internet lit up with comments, jokes, complaints, and speculation. Something this big happening at one of the biggest events of the year is bound to get people talking, and as fans start to squirm in their seats after nearly a half-hour of downtime, let’s check in to see what everyone’s saying.

    beyonce super bowl

  • BlackBerry 10′s Big Game Ad

    BlackBerry Z10 commercial

    Whaaat is going on here?

    The new BlackBerry Z10 cannot set you on fire, give you elephant legs, cause you to disappear into a cloud of rainbow smoke or turn a speeding truck into harmless rubber duckies. But with only 30 seconds, on the world’s largest advertising stage it’s quicker to show you what it can’t do. In a fun and creative one-time spot that aired this Sunday, BlackBerry introduced the new BlackBerry Z10.

    The fast and elegant BlackBerry 10 device symbolizes a restart for the company, which has completely re-designed, re-engineered, and re-invented its products and its brand. BlackBerry 10 features many advances that are designed to make it stand out. With communication and agility at its core, BlackBerry 10 is for people who need to Keep Moving, which is the new tagline and mantra for the company.

    For the big game, rather than run an ad that is expected for the tech category – one that showcases the features of the product – we decided to have fun and challenge the status quo. We knew that for this event, it was important to spark a conversation about BlackBerry 10 and to make people curious enough to find out more. We’ve got the great benefit of having one of the largest social networks in the world with 30 million fans on Facebook and Twitter, and we wanted to drive people both there and to our website to discover what makes BlackBerry 10 stand out.

    Frank Boulben sat down with the Inside BlackBerry Blog crew to talk about the commercial:

    [ YouTube link for mobile viewing ]

    We’re four days after the launch of BlackBerry 10 – our largest product introduction ever. The response to the product has been tremendous and we’re building off that momentum on the largest advertising stage of the year.

    Don’t forget to check out BlackBerry.com to see what BlackBerry 10 can do.

  • StormFly Wants To Childproof Your Computer With Its Ubuntu-Booting USB Bracelet

    stormfly

    When I was but a wee lad, I hosed my share of family computers simply because I wanted to help out — once I tried to free up space on a 6GB hard drive by deleting anything larger than 1MB. You can imagine how well that played out.

    I wouldn’t be surprised to hear that the founders of Barcelona-based Now Computing went through something similar, because they’ve just recently launched a Kickstarter project for a device that should ensure it never happens again.

    At its core, the $59 StormFly is little more than a 16GB USB 3.0 flash drive with a bootable version of Ubuntu that someone (ideally a kid) can wear on their wrist. After a little bit of setup (mostly changing the boot sequence in a PC’s BIOS), those little ones whip the USB bracelet off their wrists, plug it into a PC or a Mac, and do whatever it is that kids do on computers these days without having to worry. Thankfully, since the StormFly’s user never has access to the OS that’s actually installed on the host computer, there’s no way for them to royally screw things up by mucking with other people’s settings or downloading things they really shouldn’t be.

    Not a bad proposition, especially when parents are exposing children to technology earlier and earlier these days (for better or worse).

    Granted, this is the sort of thing most of you readers could probably cobble together in under an hour, but not everyone can be bothered to put together a custom computing environment for their kids. StormFly is about more than just a bit of hardware that you wear though — young ones are prone to lose things, which is why StormFly also features an encrypted online backup component… for an additional monthly fee. In the event that its user misplaces their USB bracelet, StormFly can ship out a replacement unit that has all of a user’s data back where it was within about 24 hours.

    There are, however, some issues to be found here. Perhaps most concerning its the project’s tagline — the team claims multiple times that the StormFly is “like a PC on your wrist,” which seems a bit misleading. To their credit, the project’s description puts a finer point on what the thing actually is (a USB 3.0 flash drive with Ubuntu loaded onto it), but it’s a questionable move that’s already caused some heated debate in the project’s comments section. Still, it’s a neat enough project, and it’s slowly been picking up steam — StormFly has currently hit $14,000 in pledges after only a few days, so it’s certainly got a shot at becoming a real product.

  • Vice President Biden and Dr. Biden Visit Landstuhl Regional Medical Center in Germany

    Vice President Joe Biden and Dr. Jill Biden visit with medical staff

    Vice President Joe Biden and Dr. Jill Biden visit with medical staff during a visit to Landstuhl Regional Medical Center, in Landstuhl, Germany, Feb., 3, 2013. (Official White House Photo by David Lienemann)

    Today, Vice President Joe Biden, Dr. Jill Biden, and Deputy Secretary of Defense Ashton Carter visited with Wounded Warriors and their medical caretakers at Landstuhl Regional Medical Center (RMC) in Landstuhl, Germany. 
     
    Landstuhl RMC is the largest U.S. military hospital outside the United States. It serves American servicemembers and their families who are stationed in Europe. Landstuhl RMC is also the nearest medical trauma center treating wounded U.S. servicemembers coming from Afghanistan. The center treats wounded coalition military members serving alongside U.S. forces in Afghanistan as well.
     
    The Vice President, Dr. Biden, and Deputy Secretary Carter thanked the combat-injured U.S. soldier for his service to our country and thanked his wife and their young son for their sacrifices. They also spent time visiting with two wounded soldiers serving in Afghanistan who were from the Republic of Georgia. Of the fifty-nation coalition providing forces in Afghanistan, the Republic of Georgia is the largest non-NATO contributor, providing over 1,560 forces who primarily serve in Afghanistan’s volatile Helmand province.
     
    The Vice President, Dr. Biden, and Deputy Secretary Carter also took time to specially thank on-duty medical caretakers in the surgical wards and the intensive care unit for caring for our Wounded Warriors. Vice President Biden said, “Even if there were no Wounded Warriors here to visit today, we wanted to stop by and visit with you to say thank you for all that you do for them. What you do is truly breathtaking. And because of you, our Wounded Warriors can return home alive to their mothers and fathers, to their wives and husbands, and to their sons and daughters.”
  • ‘House of Cards’ is just that for big media companies

    The new made-for-Netflix drama “House of Cards” is aptly named for what it represents — a fundamental shift in entertainment creation, distribution and consumption. The political thriller is by no means the first made-for-web TV show. But the production values, storytelling and intrigue meet, and in some ways surpass, those found from cable network productions. Yes, even Showtime’s popular “Homeland”.

    I predict that Netflix has here what HBO did with “The Sopranos” in 1999, an industry-changing series. The D.C. drama, starring Kevin Spacey and Robin Wright, shows how the entertainment industry is a house of cards new media distribution can topple. Good content can go to the web first, or only there.

    Crime Family

    HBO was no studio startup when Tony Soprano sat in the psychiatrist chair 14 years ago, but had no real success producing television series (more mini-series and made-for-pay-cable feature films). The drama’s popularity demonstrated the value of pay cable, and bolstered the appeal and economics. All the cable productions that followed — even “Mad Men” or “Walking Dead”, from non-premium subscription network AMC — owe homage to “The Sopranos”.

    Like HBO, Netflix depends on licensing deals with Hollywood studios, but the new media company also threatens long-established distribution channels. “House of Cards” spotlights the economics, suddenly showing how Netflix could be something like the Google of entertainment. The search giant’s business model is about giving away stuff for free — or at most for less cost — than competitors.

    From that perspective, Google lowers the value of everything it touches. Why should people pay for something they can get for free? But that’s a simplification. Free isn’t often good enough. The stuff given away by Google has value — or is valuable enough.

    People will always pay, and this is especially true for entertainment, when there is value. Why else do subscription services like HBO remain so popular? (Okay, that and some damn good content-distribution contracts.) That said, Netflix is just $7.99 a month, available to pretty much anyone — no cable or premium network subscription required. Like Google, Netflix changes the economics by streaming movies and TV shows — that’s nothing new. Producing dramas that are as good as those from HBO or Showtime raises the stakes.

    Netflix seemingly bites the hand that feeds it, but that’s another simplification. People didn’t stop watching network television because of pay-cable dramas like “The Sopranos”. TV simply got better, and I’d argue across the board. A new golden age of television started around 2004, with debut of dramas like “Lost”, and continues today (Yes, there are early exceptions, like “The West Wing”, which is same vintage as “The Sopranos”, or many Fox dramas).

    Network programs are better, but more importantly, cable is changed. Most major cable-only networks, even the non-premiums, produce in-house dramas, not just mini-series. If successful, “House of Cards” could — I predict will — lead to a surge in TV shows produced directly for the web. The series is that good.

    Political Intrigue

    Netflix has a real winner that smartly, and too accurately, captures Washington’s political intrigue — from the Capitol dome to the newsroom. “House of Cards” is based on a 1990 BBC program, which also is available on Netflix. So, you can watch both and compare, which I may do. Besides great acting and storytelling, the original Netflix series does something else quite dramatic. There is no serialization. All 13 episodes are available at once, for people to watch at their own pace. That’s simply brilliant.

    “The world of 7:30 on Tuesday nights, that’s dead”, series director David Fincher says. “A stake has been driven through its heart, its head has been cut off, and its mouth has been stuffed with garlic. The captive audience is gone. If you give people this opportunity to mainline all in one day, there’s reason to believe they will do it”.

    That’s how many people watch TV shows on Netflix, or even Amazon Prime, today. It’s the next thing beyond the DVR. Rather than time-shift by recording, watching and fast-forwarding commercials, people can watch what they want when they want and how much they want. Granted, this isn’t new, whether programs are rented, purchased or consumed for free from the Internet.

    The earth that shakes media distribution’s house of cards is something else: Releasing all episodes of a series simultaneously, turning the concept of serialization on its head. My wife and I watched the first two “House of Cards” episodes late last night and probably more today.

    For Netflix, the approach makes loads of sense, because the business model is different. For traditional television programming, the idea is to get people to come back and to pull them away from competing networks. Like websites that measure value by the amount of time people stay on them, Netflix wants viewers to stay put. Why not 13 hours straight, then present them even more reasons with other programming that is either original or otherwise not available elsewhere.

    Take “Annika Bengtzon: Crime Reporter“, which I recently watched on Netflix. The producers filmed six 90-minute movies back-to-back over the course of a year. Only one released to theaters in Europe. But all are quite good and available on Netflix to watch on your time, which I did when sick with the flu earlier this month. The production concept is similar to “House of Cards” — make them all, then release them all, at the same time. I highly recommend the book-based Swedish series, by the way.

    The question, looking ahead 12 to 36 months: What next, and from where? I’d pay for MAX Go, as a separate streaming service, just for the original programming. Cut cable’s cord. Wouldn’t you? Today you can taste the future. “House of Cards” debuted February 1, and for the month the first episode is available to everyone, even non-subscribers.

  • Track Tested: 2013 Chevy Corvette 427 Convertible

    2013 Chevy Corvette 427

    With all the hoopla surrounding the recently released 2014 C7 Corvette, it seems that people are forgetting just how good the outgoing C6 actually is. To cap off their final production run Chevrolet has seen fit to release the final edition by way of the Corvette 427. That means 505 hp, an almost 200 mph top speed and a roof that disappears at the touch of a button. The other thing to consider is that dealers will be HEAVILY discounting the current crop of C6 Vette’s currently on the market, so if your interested, now is the time to act!

    Source: InsideLine.com

  • New playlists: “Our brains: predictably irrational” and “What’s wrong with what we eat?”

    BrainTED playlists are collections of talks around a topic, built for you in a thoughtful sequence to illuminate ideas in context. This weekend, two new playlists are available: “What’s wrong with what we eat?” and “Our brains: predictably irrational” — and a bonus! A TED primer of 11 classic TED Talks. Think of it as “TED 101.”

    Our brains: predictably irrational
    We humans are amazing specimens of reason, but our brains are also remarkably buggy. We make absurd choices, behave inconsistently, and are constantly irrational. Watch 11 talks on just how fallible we can be.

    What’s wrong with what we eat?
    Are you eating the wrong stuff? What exactly is the junk you’re putting in your body? What about people who don’t even have enough to eat? 5 talks on our problematic eating habits.

  • San Francisco and Baltimore Mayors Put Service on the Line for Super Sunday

    Ed note: a version of this post was first published on serve.gov, the official site of the Corporation for National and Community Service. You can read the original post here.

    Today is game day, and as the Baltimore Ravens and San Francisco 49ers get ready to take the field, the mayors from those cities are taking a different approach to the traditional, friendly wager. This year, the focus will be on volunteering and community service.

    San Francisco Mayor Edwin M. Lee and Baltimore Mayor Stephanie Rawlings-Blake have agreed that the winning mayor would host the mayor from the opposing team for a day of volunteer service with AmeriCorps members. This service project will be done in partnership with the Corporation for National and Community Service (CNCS), the federal agency that administers AmeriCorps. (Click here to watch a video announcing the challenge on the "Today Show.")

    The mayors' friendly wager further elevates the role of community service within the Super Bowl's activities. As part of the official events, the Super Bowl Host Committee also hosted a community service effort yesterday, Super Saturday of Service, in which local volunteers revitalized five New Orleans playgrounds. AmeriCorps members serving with Habitat for Humanity New Orleans and Habitat for Humanity Baton Rouge participated. AmeriCorps members also took part in service activities organized by Rebuilding Together.

    read more

  • BULLRUN now on HULU!

    Bullrun On HULU

    The BULLRUN Rally is one of those events that’s on the bucket list of every automotive hoon out there. You take some of the best cars in the world, add in a few great hotels and parties and then wrap it all together in a 3,000 mile road trip that’s full of fun and debauchery. However if BULLRUN’s price is out of your league, then have no fear as you can now get your BULLRUN jollies on HULU! In short it’s a blast… Oh, and believe me as I know this for a fact. You see I’ve done it 3 times.

    Source: HULU.com

  • Backed Or Whacked: Life, Liberty And The Pursuit Of Laziness

    Backed or Whacked logo

    Editor’s note: Ross Rubin is principal analyst at Reticle Research and blogs at Techspressive. Each column will look at crowdfunded products that have either met or missed their funding goals. Follow him on Twitter @rossrubin.

    Last week’s Backed or Whacked covered light-related products that could be controlled by a smartphone. Beyond making their way in the dark, though, modern humans have many other basic needs — maintaining well-being, feeling secure, and enforcing as much control over their domain as possible while exerting as little effort as necessary. The ability to achieve them with the aid of a smartphone, though, has arrived relatively recently, and the ability to crowdfund them via Indiegogo as per all of this week’s projects, even more recently.

    Backed: Amiigo. Amiigo, which is Spanish for “friend in good shape who spells poorly,” is a chevron-shaped shoe clip that monitors movement, enabling you to know precisely how many calories you’ve expended repeatedly lifting the Boston Creme donut until it has been reduced to sugary crumbs. Amiigo enters the increasingly crowded contest for survival of the fittest begun by early entrants such as Nike+ and Fitbit. However, the trendy joint between the hand and forearm is where all the wriststers hang out these days. These include the Nike+ Fuelband, Jawbone UP, and other forthcoming entrants such as CES debutante Fitbit Flex and the HAPIwatch from HAPI Labs. To enter that club, the Amiigo shoe clip neatly docks into a wrist strap.

    What the Salt Lake City-based team is counting on to set Amiigo apart from these rivals is more intelligence regarding the specific type of activity you’re doing. The idea of diving deeper into the nature of your exertion has been previously espoused by the developers of the $199 Basis, which employs fancy sensors to monitor the body’s reaction to exercise beyond motion detection. Amiigo, which has more than tripled its $90,000 funding goal with about 25 days left in its campaign, dispenses with the extra hardware and is due to ship to Indiegogo backers in June for about $99.

    Backed: iSmartAlarm. ADT has run a legitimate business securing people’s homes and businesses. Recently, however, bigger bosses like AT&T, Comcast and Verizon have told their capos that they want into the protection racket, see? Extracting a monthly fee for peace of mind, though, has heretofore taken place mostly within the customer base of those in multi-room dwellings. There have been a few alternative approaches, though, like the apartment-friendly but nonetheless professionally monitored SimpleSafe system.

    For those who are comfortable handling alarms — false and otherwise — themselves, though, Raymond Meng’s team proposes iSmartAlarm, which includes a base station/siren reminiscent of the old Power Mac G4 Cube. iSmartAlarm, set to ship in April and starting with a basic package of only $79 with no monthly fees, has big plans for expansion. The company eventually seeks to include features such as sprinkler controls and GPS pet trackers.

    For now, though, it is starting off with the basics — window/door-open sensors, motion sensors and, most importantly, that inert sign that scares away the bad guys. Should brazen intruders disregard the latter, the system can initiate taking successive photos of the perp and will send alerts to the smartphone owned by you or the vigilante of your choosing. iSmartAlarm’s campaign has been plodding along with over $30,000 raised of its $50,000 target with about 20 days to go.

    Backed: Tethercell. Now that the crowdfunding world has provided the gear to convince you of your health and safety, it’s time to take it easy. Perhaps you want to turn on that FM radio on the porch a few feet away, but the thought of leaning forward displeases you. Debuting at CES along with the ultra-thin, time-telling bangle CST-01 that a future Backed or Whacked will discuss in more depth, the Tethercell may be your only hope.

    Designed by aerospace engineers, the cylindrical device stuffs a Bluetooth radio into a AA battery shell, leaving enough room in the cavity to insert a AAA battery. You give up some device stamina, but gain the ability to remotely enable and disable all kinds of products either manually or according to a schedule. Tethercell can also alert you when the AA batteries in a device are running low.

    Adding Bluetooth to products never intended to be controlled by a smartphone creates a wonderful twist on backward compatibility. While a shrinking number of devices that you might want to activate remotely take standard cells these days, the campaign’s Indiegogo page depicts small lamps, radios and baby monitors as examples. As Tethercell also works with some videogame controllers and many toys, the non-confrontational parent wishing for their kids to turn that damn thing off and pick up a book already can still pick one up for only $35 (although pairs are also proving popular). Recently charged above 47 percent of its $59,000 goal capacity, the Tethercell campaign has about 20 days’ worth of juice left.

  • avast! 8 beta is available — get it NOW!

    AVAST Software has released the first public beta of avast! 8 (or the first official one, anyway). Downloads are available for avast! Free Antivirusavast! Pro Antivirusavast! Premier Antivirus andavast! Internet Security.

    The immediately obvious change is avast’s clean new GUI. The home page presents a simple front end to each product, dividing its functionality up into six tiles, but clicking one of the tabs at the top of the screen allows you to quickly drill down into the detail.

    Explore the menus a little further and you’ll quickly spot several new tools. Perhaps the most important is the Software Updater, which will check your installed applications for missing updates. We’re not sure how many programs are supported, but already it’s covering the most important candidates: Adobe Reader, Flash, Java, all the main browsers, and so on.

    Elsewhere, Browser Cleanup aims to help you remove annoying addons from your browsers (although this only appears to work with IE and Firefox at the moment, at least on our system), AccessAnywhere allows you to set up remote access to your PC, while DataShredder will securely wipe files, drives or partitions. The last two will only be included as a part of the new avast! Premier product tier, though, so keep that in mind when you’re deciding what to download.

    And of course there have also been improvements to the core protection technologies, so for instance FileRep and WebRep are now better able to identify and new threats in near real time.

    Keep in mind that this is a beta, and even by those standards it has plenty of problems. In particular, there’s no Windows 8 support yet, and Facebook registration is buggy: you’re better off registering with an email or skipping it altogether.

    In our brief tests we’ve also noticed performance issues and some product instabilities. And the official avast! forum announcement talks of several other issues, including broken profile detection with the firewall, stability issues with Outlook plugins, and a significant Data Shredder bug (it can’t shred files or partitions: oops).

    This is only to be expected with betas, though, so isn’t any particular cause for alarm. So if you want to install avast! Free Antivirus or avast! Internet Security then go ahead (apparently they can be installed over an existing version, keeping your current settings), just expect occasional problems as you explore the new features.

    Photo Credit: almagami/Shutterstock

  • BlackBerryCool Talks BlackBerry 10 With CTV News

    BlackBerryCool Kyle McInnes CTV Interview
    Click the image or this link for the clip.


  • Where Kim Dotcom and Mega have the edge on Dropbox and Box.net

    As a world (in)famous technologist with the literal last name “Dotcom,” Kim Dotcom is a man whose swag is matched only by the damages sought against him by the U.S. government. His filesharing site Megaupload was long the ire of record companies and movie studios, who say it was a massive and sprawling repository of pirated content.

    If the accusations are true, it was one of the more successful pirate operations in history. At its peak, Megaupload saw approximately 7 percent of internet traffic and grossed over $150 million in annual revenue. But Megaupload’s incredible run ended in the fall of 2012 when the FBI forcefully took down the site and sought Kim’s extradition from New Zealand to face a litany of criminal charges.

    Of course, you can’t expect to keep a guy with the last name Dotcom down, and sure enough he recently announced the relaunch of a Megaupload redux dubbed Mega. Only Mega is a security- and privacy-conscious file-sharing service that audaciously targets storage industry magnates like Dropbox and Box.net.

    And loathe as some of us may be to admit it, he just may be on to something. Mega differentiates itself by embracing client-side encryption: generating and storing the keys on a user’s local machine rather than encrypting everything in the cloud. The result of such client-side encryption is not only a far more secure product – and a security practice the industry should embrace – but a significant reduction in cost and legal liability for Mega and other cloud storage providers that use this architecture.

    How Mega is different

    Security is one of the biggest inhibitors to cloud adoption. Yielding sensitive data to a third party over the public internet continues to be a dealbreaker for many medium- to large-scale enterprises, with their desire for privacy and concerns of regulatory and legal exposure.

    In the movement to the cloud, data is exposed at two points to attack or compromise: in-flight (when it is being transmitted over the security no-man’s land of the public internet) and at-rest (when it physically sits on servers within the cloud system). In both instances there are a myriad of threats that could allow that data to be stolen or compromised.

    Mega employs cryptography to protect data in-flight and at-rest. Now by all means, using encryption to protect data in-flight isn’t really game changing. Similar to most security-conscious sites, Mega wraps communication between its users with Secure Socket Layer (SSL) encryption.

    But Mega is unique in its approach to handling encryption at rest. Rather than encrypting and storing keys for a client’s data within Mega’s infrastructure, Mega pushes their cryptography back to their users. So Mega users encrypt their own data prior to sending it to Mega’s servers, and store keys locally such that even Mega can’t read their data – or be forced to yield it to authorities.

    While this sounds like a feature tailored solely to the needs of a company that will frequently find itself at the end of a subpoena, the desire to have users keep their own keys and send data in the form of encrypted “ciphertext” (rather than unencrypted “plaintext)” is actually one shared by mainstream small businesses and enterprises alike.

    Benefit for providers

    Having cloud providers hold ciphertext and having users handle their own encryption and keep their own keys makes sense on both sides of the fence.

    In an architecture where customers are responsible for their own encryption and key management, significant legal liabilities are lifted from the service provider. Customers would assume personal liability for the selection and correct implementation of encryption algorithms – a critical concern for compliance regulations like PCI-DSS that incorporate strict rules on cryptography.

    By having their customers manage keys locally, service providers can also significantly reduce costs. Many modern PCs incorporate a Trusted Platform Module (TPM) – a hardware device that can safely store cryptographic keys for prolonged periods of time. Storing keys locally on a TPM is relatively costless for the customer, but safely storing keys en masse in the cloud requires the use of expensive key management servers.

    The cost of encryption

    Encryption is also still not a costless process. By pushing customers to encrypt and decypt their own data, cloud providers can also redirect the significant compute time required to handle cryptography towards providing a higher quality of service for their customers.

    For customers, sending only ciphertext to the cloud and keeping keys locally has real benefits beyond peace of mind. If a cloud services provider is ever hacked, that customer’s data will be encrypted in a way that can’t be decrypted using its service provider’s security infrastructure. There’s no master database of passwords that an attacker can break into. Customer data on the service provider remains locked in ciphertext and encrypted using one of any number of symmetric key algorithms.

    It’s important to note, though, that there are consequences for moving to a client-side encryption architecture. For instance, when customers send only ciphertext to the cloud, popular means of reducing the on-disk footprint of data such as deduplication (in short, a process where copies or parts of files are deleted and data is instead “pointed” towards a single instance) are generally rendered impossible.

    It’s also important to note that, for the server to dedupe data encrypted by the client, the client must yield sensitive information about the plaintext at various points during its encryption. The fact that Mega seems to perform client-side encryption with deduplication is a red flag to many security cognoscenti, and may even be a sign that Mega has more visibility into its clients; data then it otherwise claims.

    Holes in Mega’s strategy

    Mega’s security infrastructure is far from perfect. Their decision to handle cryptography in browser-based Javascript has already earned wide-spread criticism, and due to implementation issues in how Mega creates keys for users,  hackers could work around encryption and access plaintext data (what’s called a “side-channel attack”).

    Regardless, to give credit where it’s due, Kim Dotcom’s decision to push encryption to the client is an impressively forward-thinking maneuver that should be replicated by Dropbox and other cloud storage providers. Client-side encryption makes financial and legal sense for customers and service providers, helping to enable even regulatory compliance-bound customers to embrace cloud computing at scale.

    Andrew “Andy” Manoske is an Associate at GGV Capital, a Sand Hill and Shanghai-based venture capital firm. Prior to GGV, he was a product manager at NetApp and managed the design of security features across the company’s entire product line. Follow him on Twitter @a2d2.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • How to build better products

    A friend who is a Google engineer once thought of a great idea for a browser extension. So he set to work and over the next few weeks he had built a prototype. It then occurred to him to check whether anyone had already made a similar product.  Sure enough, a quick search turned up pages and pages of results for existing implementations of his concept – there was even a wiki to track the various incarnations!

    It turns out this situation is common. Spend even a little time creating products and you quickly learn that every idea has been done before in some form or another. So to find success with your product, you need to rely on superior execution to make your product stand out and succeed. How do you execute on delivering the best engineering implementation?  Here are a few tips for each phase of software development.

    Feature planning

    Many times when a product has an edge over competitors, it can be attributed to the use of a new technology that is only recently available, and that has not (yet) been utilized by others.  For example, the increased computing power of smartphones enabled Instagram to perform sophisticated image processing that before may have required a desktop computer. In the case of my company, Minted, as browser rendering became more powerful, we were able to expand our in-browser editor to include curvilinear text, text that follows a path, and drag-and-drop edit boxes.

    So it’s crucial to look for opportunities to leverage new developments in technology, which can often open doors to new features that distinguish your product from the competition. When you discover such technology, assess which resources will be taxed by using it, such as high memory usage, or broadband internet speeds, and confirm that this matches the resources of your demographic.  For example, if you know that you’d like to use a technology that depends on HTML5, and you read a stat that HTML5 adoption has spread to 75 percent of North American users, going that route can unlock a novel feature that substantially improves your product.

    Prototyping

    When you are not yet sure of your feature set, and still at the stage where you’re playing with prototypes, there are two common pitfalls that can happen. Interestingly, they are the opposite of each other.

    The first is that people sometimes make technical choices that are good for prototyping but will need to be rewritten down the line in order to scale the product. This is what led to a single .NET project within Google’s Linux infrastructure, which required custom attention until it was ported, and how new PHP-based projects still come into the world these days. The authors figure that if their project is successful to the point where it needs to be scaled, it’ll be a great problem to have –and they’ll deal with it then.

    The trouble with that rationale is that it assumes in the future you and the rest of the engineering team will somehow have a lot more time and resources, and can comfortably rebuild the product with a more scalable architecture. But that’s usually not realistic — when your project takes off, you’ll have less time than ever. The reality is that it can take months or years to fully rebuild a product, and in that time your features inevitably stagnate and your userbase can defect to competitors out of impatience.

    The second common pitfall is the opposite, where developers absorb the lesson of scalability so thoroughly that they become hung up on preparing for it. So from the beginning they devote precious time searching for and hiring a scalability expert. Or even though they have a perfectly good database in MySQL, they spend an inordinate amount of time researching Cassandra and Reddis just in case their pre-alpha product explodes in popularity.  It can quickly turn into a form of procrastination that delays the product.

    My recommendation for avoiding both mistakes is the same. Pick technical solutions from the beginning that are known to have scaled with other products in the past without causing enormous customization or pain. It doesn’t have to be the most optimally scalable solution – just one that is known to have worked well enough for others. Make sure there are large userbases running on the technologies that you’ve selected. And of course confirm it’s an actively supported technology with an ecosystem of developers, so that you’ll be able to hire people versed in it when the time comes. Once you’ve done these things, stop obsessing over other alternatives and turn your attention toward actually making a good product.

    Fine-tuning

    Once you’ve gone past the prototype phase and decided on your feature set, it’s time to polish the product.  Remember the equation for determining how your end user will relate with your product:

    User satisfaction = Rewards from using your product – Irritations

    If you’ve addressed the first two points, you’ve already used advancing technology and prototyped an enjoyable product.  But almost as important is the second part of the equation: reducing user irritations.

    When users engage with a product, there are many opportunities for them to experience minor annoyances that collectively add up. For instance, maybe a button doesn’t give feedback and so the user is confused about whether he should press it again or wait. Or maybe a page takes longer than expected to load. If your users can’t find the right UI flow, they get annoyed and seemingly minor irritations add up, until the user crosses an emotional threshold and gives up on the product, or at least for that session. That’s never good.

    The most polished experiences are usually achieved through a combination of:

    • analyzing metrics and taking actions to improve them
    • observing usability tests
    • improving pain points of personally using the product

    Let’s go through these one at a time:

    Typical metrics include latency, error rate, and business goals, such as retention or conversion.  For reducing latency on web pages, make sure you’ve run YSlow and followed Steve Souders’s best-practices for javascript, CSS, and HTML.  Remember to keep yourself honest by continually checking real-world latency via profiling tools such as NewRelic, and automatically collate users’ crash and bug reports on your servers.

    For UX flow, I’ve found the books “Don’t Make Me Think” and “Rocket Surgery Made Easy” to be helpful in describing the process for finding usability flaws.

    Finally, the most polished user experiences often come from teams who avidly use the product themselves (or who have honest family and friends that do). When the engineers, product managers, QA, and user experience designers are confronted on a daily basis with the effects of friction in their product, it inevitably leads to the rough edges getting smoothed out, giving your product that extra edge that can make the difference.

    Niniane Wang is the CTO of Minted. She previously managed engineering teams at Google and Microsoft. Read more of her writing at Niniane’s blog, or follow her on Twitter @niniane.

    Photo courtesy of everything possible/Shutterstock.com.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Hennessey Venom GT 0-200 Runway Test

    The Smoking Tire Venom GT

    Not too many of us have actually been over 200 mph, unless that is, you were flying at over 36,000 feet. Matt Farah of The Smoking Tire and DRIVE’s TUNED recently took an opportunity to break this barrier by climbing behind the wheel of John Hennessey’s insanely fast Venom GT, a car that recently ran its way into the record books. What’s even crazier though is that he did this in the Venom GT Spyder because his helmeted head wouldn’t fit in the coupe! Click through to check out the video.

    Source: TheSmokingTire.com

  • How Sitegeist used great design to make census data cool

    Can census data be fun?

    At first glance, you might not think median home prices or transit data would be all that interesting. But Sitegeist, the location-based open data app from the Sunlight Foundation and famed design firm IDEO, is proving that good design can make public data cool.

    how people commute Sitegeist screenshotThe concept seems simple when you open the app, the app uses data and information pulled from a wide variety of sources. Sitegeist allows users to set their location and then flip through several screens to explore data tied to their specific location. The screens include: people (median age, age distribution, household income, gender, and political contributions), housing (median home value, average rent, percentage renting v. buying, and commuting patterns), local attractions (popular businesses, local movie theaters, and restaurants), environment (weather), and history (median home age and number of housing units.) The app is available for both iOS and Android.

    The sheer volume of data that the Sitegeist app provides for each location is a reminder that between census data and public APIs from companies like Yelp, Foursquare, and Dark Sky, users can put together a relatively comprehensive profile of a geographic location. The Sunlight Foundation put together a “how we did it” blog post, explaining the technology behind the app and how they used different APIs to build a comprehensive product:

    All of this wonderful data resides on our servers. When you select a location, the latitude and longitude are passed along with the ID of the pane you want to view. Of the various geographies we keep track of (census tracts, ZIP codes, etc.), the boundaries of any shape that contains your location is found. This uses a customized version of Chicago Tribune’sboundary service. We then match those geographic boundaries with any data we have, making calls to third-party APIs as needed. The collected data is rendered into templates and returned to you as the beautiful infographics you see in the app.

    But presenting the information in an intuitive manner with help from IDEO was just crucial to the app’s success as the data that went into it. The Sunlight Foundation won a grant from the John and James L. Knight Foundation to hire external designers to work with them on the Sitegeist app, which was the third in a series of data apps the group worked on. The Sunlight Foundation is focused on using technology to promote openness and transparency in government, an idea we’ll be exploring at GigaOM’s Structure:Data conference in New York in March.

    Sitegeist app screenshot household income San Francisco“These apps are designed to make the case for why open data is important to people,” said Tom Lee, director of Sunlight Labs. “And I think it’s really accessible for people. It’s visually striking, which is a credit to IDEO’s designers and Sunlight’s designers, and everyone has an investment in their neighborhood.”

    I downloaded the app about two weeks ago, and I’ve found myself opening it in different neighborhoods around San Francisco to see what kinds of people live there. The app would be an ideal travel companion for exploring completely new areas, but even comparing two spots in SOMA (on the left) and Telegraph Hill (on the right), was eye-opening:

    Sitegeist app housing prices

    Sitegeist app housing prices screenshot

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Android this week: Samsung Galaxy Tab 3 spec’d; HTC M7 yelled; Nexus 4 ships

    The close we get to this month’s Mobile World Congress event, the more information about new Android devices gets leaked. First up is the third iteration of Samsung’s small slate. The Galaxy Tab 3 may be one of the bigger Samsung reveals at MWC as it’s more likely the Samsung Galaxy S 4 smartphone will warrant its own event later.

    galaxy_tab_7_7So what’s the word on the Galaxy Tab 3? Samsung has already created 7- and 7.7-inch tablets, and it appears the new slate will be in available in a similar size. It could be even be an 8-inch tablet; the same screen size as the expected Galaxy Note 8.0. A key difference, however, is that the Galaxy Tab 3 won’t have an active digitizer nor supporting digital S-Pen like the Note model. That should keep costs down for the new Tab 3; perhaps even in the sub-$200 range to compete against Google’s Nexus 7.

    Alleged benchmarks for the Galaxy Tab 3 indicate a 1280 x 800 display running Android 4.2.1 and a CPU capable of up to 1.5 GHz. I’m willing to bet that Samsung keeps the price down by not using one of its new Exynos 5 processors, but a dual-core version of the prior Exynos generation. It’s more likely that Samsung uses the newer chip in the Galaxy Note 8.0.

    HTC will also be at Mobile World Congress but it may debut its newest flagship phone even sooner. I’ll be attending an HTC press event in New York City later this month, where the company could out the HTC M7. There’s little doubt the phone exists now that a video and pictures of HTC’s CEO, Peter Chou, shouting out “M7!” and using the phone’s camera at an year-end company celebration.

    Little information is known about the M7 other than it should have a new version of HTC’s Sense user interface based on some Android Police photos. That’s to be expected, given the company’s yearly iteration of its smartphone software. I suspect this to be a large-screened 1080p device — perhaps 5-inches diagonally — with one of the latest Qualcomm Snapdragon Pro chips running a version of Android 4.2. I wouldn’t be surprised for HTC to put it its highest resolution camera sensor to date in the M7 as well. We’ll see as soon as Feb. 19, which is when the HTC press event is planned.

    Google Nexus 4 by LGEnough about phones and tablets that are coming soon: How about a phone that’s coming after being sold out for so long? Amid quick sell-outs, the Google Nexus 4 appeared back in stock on line and many folks are reporting shipments in under 48 hours, per Geek.com. My recent check of availability says both the 8 and 16  GB versions of the unlocked phone are now shipping in 1 to 2 weeks if you order now. That’s much better than the “coming soon” message we’ve seen for weeks on end; perhaps LG is kicking up the production pace as noted two weeks ago?

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • Weekend listening: 128 GB iPad? Kickstarter and Creativity and no a-holes

    In case you missed any of our thrilling podcasts this week, this is your chance to catch up! There’s something here for everyone:

    Kickstarter CEO Perry Chen talks about creativity and crowdfunding.

    (download)

    Kevin Tofel answers your questions about gadgets. For instance, who should get a 128 GB iPad?

    (download)

    Our weekly news wrap up tackled the new Blackberry, Facebook’s mobile moves and Bob Sutton, author of The No Assholes Rule, talked about the continuing excellence of Netflix.

    (download)

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

  • TED Weekends asks: What do Santa Claus and UFOs have in common?

    UFOSanta Claus and UFOs may indeed have something in common. As Michael Shermer shared at TED2010, they are two things that engage the “belief engine” that is also known as our brains.

    Michael Shermer: The pattern behind self-deceptionMichael Shermer: The pattern behind self-deception

    In his talk, “The pattern behind self-deception,” Shermer debunks superstitions and urban legends and shares why we are prone to believe in thembecause of our brain’s hardwiring for survival. He explores what is behind our shared desire to believe, even when it means actively deceiving ourselves — and potentially others.

    Today, TED Weekends on the Huffington Post features Shermer’s compelling talk. Below, find some of our favorite essays that accompany it, taking a look at deceptive tendencies.

    Michael Shermer: Why We Deceive Ourselves (Sometimes)

    As the publisher of Skeptic magazine I am often asked what I mean by skepticism, and if I’m skeptical of everything or if I actually believe anything. Skepticism is not a position that you stake out ahead of time and stick to no matter what.

    Consider global warming: Are you a global warming skeptic? Or are you skeptical of the global warming skeptics? In this case, I used to be a global warming skeptic, but now I’m skeptical of the global warming skeptics, which makes me a global warming believer based on the facts as I understand them at the moment. The “at the moment” part is what makes conclusions in science and skepticism provisional.

    Thus, science and skepticism are synonymous, and in both cases it’s okay to change your mind if the evidence changes. It all comes down to this question: What are the facts in support or against a particular claim? Read the full essay » 

    Laura Cococcia: Santa, Self-Deception, and the Survival Instinct

    It takes almost no effort to make a child believe in Santa Claus. Step one? Put some presents under a Christmas tree every year. Step two? Tell the child that Santa Claus put them there. Result? You’ve got a Santa-believer on your hands, and you have evolution to thank for it.

    Belief is the topic of science writer and historian Michael Shermer’s TEDTalk on the patterns and Darwinian instincts behind self-deception. Even as a noted skeptic — in fact, as editor-in-chief of Skeptic magazine — Shermer asserts that belief is the natural human state, and that it is science and reason that seem unnatural to us. During his time on the stage, he pulls away the curtain that divides us from our understanding of why we are prone to believe ultimately illogical, at times fantastical, things.

    Santa Claus and, as we’ll see, his mystical compatriots the Easter Bunny and the Tooth Fairy, are cultural as well as psychological phenomena that serve as apt examples of our propensity for self-deception. However, they aren’t the examples Shermer employs in his explanation. After all, their creation is too recent to represent the development of belief. He must travel a long way back in time. Read the full essay » 

    Laura Kray: What if…

    “Jamal Malik is one question away from winning 20 million rupees. How did he do it? (A) He cheated, (B) He’s lucky, (C) He’s a genius, and (D) It is written.” — Slumdog Millionaire, 2008

    In the opening scene of the critically acclaimed film, a title card appears on the screen to raise the possibility that fate has intervened to guarantee that an uneducated orphan from the slums of Mumbai will defy the odds and become a game show champion. Throughout the film the possibility that Jamalʼs quest would end in failure looms large. Ultimately, the sheer improbability of his success suggests the universe conspired to provide a set of questions that he was uniquely suited to answer. In so doing, Jamal was reunited with Latika, his first and only true love, and his romantic destiny was fulfilled. Viewers are left with the sense that something so improbable could not have happened by chance alone, and the underdogʼs fate must have been written in the stars. Indeed, the filmʼs immense popularity is most likely enhanced by its universally appealing storyline: seemingly random and disconnected events are, in some unfathomable sense, intertwined by fate.

    As a researcher at UC Berkeleyʼs Haas School of Business, I study how people reflect on fateful experiences to construct the story of their lives. Let me ask you, have you ever considered how your life would be different if certain pivotal experiences, or turning points, hadnʼt occurred? The scientific term for reflecting about “what might have been” is counterfactual thinking. It turns out that, rather than immobilizing us with regret, actively “what iffing” can help us to see our destiny more clearly. Even painful experiences, like loss of loved ones, can come to be appreciated for the growth and learning that they brought about by imagining how your life would be different had these events not occurred. Read the full essay »