Quote of the day: H-1B suggests too many smart people coming
Via C|Net News:
Microsoft Chairman Bill Gates slammed the federal government's strict limits on temporary visas for technology workers Wednesday, saying that if he had his way, the system would be scrapped entirely. The theory behind the H-1B (visa)--that too many smart people are coming--that's what's questionable," Gates said during a panel discussion at the Library of Congress in the nation's capital. "It's very dangerous. You can get this idea that the world is very scary; let's cut back on travel...let's cut back on visas.
Microsoft Wants Longhorn Shots Pulled
Ed Oswald writes on BetaNews that:
"Microsoft began a surprising effort to remove any unofficial screenshots of its next-generation operating system, code-named Longhorn, Wednesday. The move raised questions as to whether or not the company is attempting to do damage control over increasing criticism of its latest preview build of the new version of Windows."
Group wants encryption bans overturned
Dan Ilett writes on C|Net News that:
"An international security consortium plans to push governments around the world to withdraw restrictions on the use of encryption.
Countries including China, Israel, Russia and Saudi Arabia have strict rules governing the use of encryption tools, and in some cases they have banned these tools."
U.S. Postal Service's Personalized PC Postage Program Returns
W. David Gardner writes over on Techweb.com that:
"The U.S. Postal Service's immensely popular PC photo and imaging stamps program is being re-launched in test mode, and this time it hopes its vendors can stop people from abusing the service. Stamps.com, leading provider of last year's two-month test, is already taking orders for its PhotoStamps postage. The USPS advertised for request for proposals (RFPs) in Wednesday's Federal Register, but Stamps.com--already approved by the postal service to offer its online postage--jumped the same day, offering consumers the ability to turn their wedding pictures, baby pictures, and other images into postage."
U.S. Postal Service's Personalized PC Postage Program Returns
W. David Gardner writes over on Techweb.com that:
"The U.S. Postal Service's immensely popular PC photo and imaging stamps program is being re-launched in test mode, and this time it hopes its vendors can stop people from abusing the service. Stamps.com, leading provider of last year's two-month test, is already taking orders for its PhotoStamps postage. The USPS advertised for request for proposals (RFPs) in Wednesday's Federal Register, but Stamps.com--already approved by the postal service to offer its online postage--jumped the same day, offering consumers the ability to turn their wedding pictures, baby pictures, and other images into postage."
Cisco Rolls Out Network Protection Appliance
This is an interesting development -- I'll have to read up on this one. Matthew Friedman writes in Networking Pipeline that:
"Cisco has announced an out-of-band appliance for its Clean Access network registration and network admission control solution providing vulnerability assessment and authentication integration. The Cisco Clean Access Out-of-Band appliance is designed to automatically detect, isolate, and repair infected or vulnerable devices that attempt to log into the network. The device recognizes users and devices as they gain network access and determines whether they are compliant with security policies. If they are not, the appliance can isolate or repair noncompliant machines under the direction of the network administrator.
The appliance integrates with a switching infrastructure and implements Network Admission Control (NAC). A Cisco-sponsored initiative, NAC promises to use the network infrastructure to minimize the damage caused by viruses and worms by enforcing security compliance by all devices seeking to access network resourtces [sic]."
57% Evil, 43% Good
Huh?
I ran across this site earlier today, and it determined that fergdawg.blogspot.com is 57% evil, and 43% good.


Here's how:
"The Gematriculator is a service that uses the infallible methods of Gematria developed by Mr. Ivan Panin to determine how good or evil a web site or a text passage is.
Basically, Gematria is searching for different patterns through the text, such as the amount of words beginning with a vowel. If the amount of these matches is divisible by a certain number, such as 7 (which is said to be God's number), there is an incontestable argument that the Spirit of God is ever present in the text. Another important aspect in gematria are the numerical values of letters: A=1, B=2 ... I=9, J=10, K=20 and so on. The Gematriculator uses Finnish alphabet, in which Y is a vowel.
Experts consider the mathematical patterns in the text of the Holy Bible as God's watermark of authenticity. Thus, the Gematriculator provides only results that are absolutely correct."
Of course, the balance in the percentages will change as more words are added to the blog, so ....
Bangalore, still the outsourcing capital of the world
K.C. Krishnadas writes in the EETimes that while Bangalore is still the "Outsourcing Capital of the World," it's infrastructure is worrisome:
"Bangalore may be attracting attention for sagging infrastructure but the city's reputation as a location for software development is not under threat, yet. Multinational companies are still pushing into the city, even though by general consensus, the city is getting less livable with each passing day. It is getting more congested, costly, dusty, commuting is getting more difficult, continuity of electrical power is still a problem and the roads are getting worse — not better — since an outcry against the authorities started."
XP SP2 downloads top 180 million
Iain Thomson, at InfoSec Europe, writes on vnunet.com that:
"Over 180 million computer users have downloaded Windows XP Service Pack 2 (SP2), and Microsoft said today at the InfoSec Europe event that it is working to make life more secure for those using non-XP systems."
You can say that again....
New Crop of Software Startups Growing Up
Let's just hope it's not "Déjà vu all over again."
John Palletto writes in eWeek that:
"In the years since the post-2000 IT recession and dot-com meltdown the software industry has been buffeted by business consolidation and job losses.
However, at the Software 2005 conference here [Santa Clara] Tuesday there were signs that a new generation of startup software companies is emerging with new ideas and products to replace at least some of the jobs lost through earlier business failures and mergers."
One-Third Of All Companies Wasting Money On Email Monitoring
Mike over at techdirt.com writes that:
"While studies have shown that spying on workers tends to make them less productive, that hasn't stopped approximately 1/3 of all US companies from employing email monitoring tools. 43% of those companies employ staff to check outgoing emails. This seems like quite a waste. While there are some times when it makes sense to monitor emails (or it's required by law), most of the time, this seems like a complete waste of money. Not only are you upsetting workers and decreasing productivity, the benefits are pretty hard to spot. The number of "problem" emails tends to be incredibly low. If someone really wants to send out inappropriate emails, they're going to figure out some other way to do so, such as via a free webmail account somewhere. Yet, the companies are buying up expensive tools and hiring staff to watch just in case they catch the one or two problematic emails that go over the corporate network."
A couple of good links in that post, too.
CNN on China: Young, angry ... and wired
CNN's Kristie LuStout writes that:
"On May 4 in 1919, students in Beijing launched a nationwide movement against imperialism and a government that had failed to stand up to the West and Japan."
"More than 80 years later, a new generation in China is flexing its nationalist muscle. Its members are still stoked by hostility toward Japan, but now they're powered by laptops and high-speed broadband." "About 100 million people are wired to the Internet in China. More than half are male, and under the age of 25."
Netcraft making available phishing pheed
Over at Netcraft:
"Netcraft is now making available the list of phishing sites reported by the Toolbar community and validated by Netcraft as a continuously updated feed suitable for ISPs, hosting companies, enterprises, and other companies that operate mail servers and web proxies, or network monitoring systems."
Wireless Valley Maps RF Management
Living here in Austin, it's nice to be able to post some positive news about local tech. Jim Wagner writes on internetnews.com that:
"Site survey tool vendor Wireless Valley is launching a tool later this year to find out the true effectiveness of wireless deployments, officials said Wednesday."
"The RF Manager will be tied to the Austin, Texas-based company's software suite to provide real-time information on RF activity on the wireless network, evaluate bandwidth usage and report areas that aren't getting enough coverage, providing possible solutions to the problem."
Technology outlays fueling U.S. growth
Eve Tahmincioglu (The New York Times) is the author of an article in the International Herald Tribune that explains how:
"Small businesses are living up to their reputation as engines of economic growth in the United States, a new study shows."
"In a survey released on Wednesday by Hewlett-Packard, 81 percent of 399 small businesses polled last month said they planned to increase their technology spending by an average of 20 percent in the next two to three years, and 68 percent said they would do so over the coming year."
Internet Growing As Main Source Of News Among Online Adults
No big surprise here. Techweb News posted an article last night that reveals:
"The number of online adults who prefer the Internet as their main source of news has grown by over 35 percent in the last four years, at the expense of television and newspapers, a market research firm said Tuesday."
"Currently, more than 26 percent of online adults prefer the Internet for national and international news, compared with 19 percent in 2001, JupiterResearch, a division of Jupitermedia Corp., said."
EU Threatens Microsoft Over Windows
Hmmm. Two back-to-back posts this morning involving Europe...
Reuters reports this morning that the EU has pretty much issued Microsoft an ultimatum:
"BRUSSELS (Reuters) - The EU's executive told Microsoft CEO Steve Ballmer his company must comply urgently with its decision to stop abusing its virtual monopoly position of its Windows operating system or face action."
"'All I can say for the moment we are still not satisfied,' European Commission spokesman Jonathan Todd told a news briefing, referring to Microsoft's action to meet the Commission's demands. "
© Reuters 2005. All Rights Reserved.
Update: The BBC has an article about this, too.
Software models death row outcomes
In a rather interesting, yet bizarre, article in USA Today this morning, Susan Llewelyn Leach (The Christian Science Monitor) writes that:
"Convicts on death row can wait for years while appeals are filed and protests lodged. Many never get beyond this limbo. Others are executed."
"What determines the final outcome? That is the question two professors, one a criminologist, the other a computer scientist, asked as they took 28 years of data on prisoners facing the death sentence and fed it into a software program." "What the software — known as an artificial neural network — managed to do was to predict with more than 90% accuracy who would be executed."
Can Europe Survive?
An interesting article in Red Herring (online version of the April 18, 2005, print issue) explains that:
"Europe gave the world Linux, GSM, and the web, but got little of the fortune and less of the glory. To get what it is due, some old world ways will have to change."
"Olli Martikainen, Bernhard Grill, and Stratis Avrameas don’t like to think about what might have been."
"Mr. Martikainen, a Finn, started developing a router—hardware that directs streams of data from one computer to another—back in 1982 at VTT, a research institute in Espoo, Finland. The Finnish companies financing the research, including Nokia, didn’t see the potential, so the project was dropped in 1986, shortly before an American startup called Cisco commercialized similar technology. Cisco went on to dominate basic corporate networking gear, with annual sales of more than $23 billion. Mr. Martikainen today works as a professor and researcher; his prototype gathers dust in a university display."
Blogger discrepancies.... Please stay tuned.
I've noticed that my XML atom feed sometimes gets funky -- at times there is the proper summary in the per-link feed, else times it appears that it does not (and wants to link directly to the individual article).
I'm not sure what the problem is here, but I will inquire with the the Blogger folks, as they have had a spot or two of application/server, etc., issues in the past week or so.
Thanks for bearing with me, and please stay tuned!
- ferg
Publisher banned from Apple stores
Well, everyone else and their brother is writing about this, so I guess I should at least mention it.
First off, however, I should mention that I have co-authored a book (and contributed to several others) for this publisher, John Wiley & Sons. And kudos to my esteemed coauthor, Geoff Huston, for his patience and effort -- he certainly has had more success, and perhaps less aggravation, working & writing on other projects (Thanks, Geoff!).
In any event, it sounds to me like a protracted, juvenile reaction by Apple to something their Public Relations droids found "objectionable" (I hate that word -- it allows the people of this planet to really show how stoopid they really are -- euphemisms are tearing this world apart), and yanked their support for it at their leisure. Scumbags.
Here's perhaps the best existing "real" news story about the situation, on CNN/Money.
Snails Edge Out ADSL
And now, something from the Lighter Side of the Networking Sciences:
Via /.
"Anomymous writes "Dear Sirs, Following our experiment last year, and after long preparations, we have successfully proved that certain gastropods called African giant snails can be faster then ADSL and ... pigeons. The system we have used, called SNAP (SNAil-based data transfer Protocol), uses biological carriers (snails), and, for the first time, taking advantages of the unique merits of the wheel for data transfer. More details can be found here."
Phishing for Credit
Figures. ~:-/
Via /.
"An anonymous reader writes "Two graduate students at Indiana University conducted a phishing study to determine how readily students will give up personal information if the phishing emails appear to come from close friends. Using only publicly available information, they sent out emails to students asking them to click a link that required username/password information. Needless to say, the study has generated lots of attention on campus. The student newspaper has the story and the researchers have created a blog where the participants can vent."
Security guru slams misuse of 'cyberterrorism'
Apparently, Dan Ilett has been quite busy reporting on Infosec Europe for C|Net News. This time, Dan reports that Bruce Schneier has, yet again, slammed the "establishment":
"An Internet security expert told conference attendees Tuesday to use the term 'cyberterrorism' properly--and played down the spread of government-sponsored hacking. Organizations are abusing the word by using it to fuel their budgets, Bruce Schneier said. Speaking at the Infosecurity Europe conference in London, the renowned author and cryptography expert called cyberterrorism a myth that has yet to become to a threat to human life."
Good for him.
Amen, brother.
Spamhaus hits out at ISPs, praises Microsoft
Lots of stuff from Infosec Europe. Obviously. Dan Ilett writes in C|Net News that:
"The chief technology officer of anti-spam campaign group Spamhaus hit out at ISPs on Tuesday, accusing them of failing to protect their customers from malicious attacks. Meanwhile he had high praise for Microsoft's Windows XP Service Pack 2."
Rootkit Hunter Insecure Temporary File Creation Vulnerability
FrSIRT Advisory : FrSIRT/ADV-2005-0398
Rate: Low
"A local vulnerability was identified in Rootkit Hunter, which may be exploited by malicious users to conduct symlink attacks and potentially overwrite arbitrary files. The problem is that the 'check_update.sh' script creates several temporary files with predictable filenames, which may be exploited by a local attacker to overwrite arbitrary files with the privileges of the user running a vulnerable application."
Affected Versions:
Rootkit Hunter versions prior to 1.2.3-r1
Be careful when searching the web
Over on the F-Secure blog, Jusu posted an interesting snippet this morning which describes how Bad Things (tm) can happen when you accidentally mis-type a URL:
"We have been investigating an interesting case about what happens if you happen to mistype www.google.com. One variation (www. googkle .com) leads to a site that will start a huge chain of webpages with exploits in various formats. HTML, CHM, JS, VBS, EXE, JAR you name it. As an end result the poor mistypist will have seriously malware and spyware infected computer. So keep your browsers up to date and practice on your touch typing."
The
F-Secure folks have a detailed description of this particular malware web page
here.
Update: Apparently,
Techweb.com picked up on this story, too. Read it
here.
FCC Chief Wants 911 Service for Internet Phones
In a Reuters article by Jeremy Pelofsky (posted here on Yahoo! News), "Federal Communications Commission Chairman Kevin Martin said on Tuesday he would soon propose requiring Internet-based telephone providers to offer their customers emergency 911 dialing services."
Nixon and Rumsfeld caught on tape
Jennifer Guevin posts on C|Net's Missing Links Blog that:
"Another set of secret tapes have found their way to the Internet, but this batch has nothing to do with Paris, Britney or Ashlee. And although these tapes are "work safe," that doesn't mean they don't reveal dirty dealings. The Presidential Recordings Program at the University of Virginia has made available almost 5,000 hours of tapes recorded by six U.S. presidents from 1940 to 1973. They can be listened to for free at Whitehousetapes.org."
Sheet could shelter Wi-Fi from eavesdroppers
Gotta get me somma dat! Dan Ilet reveals, in C|Net News, some really cool laminate that thwarts WiFi snooping:
"Wireless hackers in the United Kingdom could soon face a new obstacle to stealing information. The British government has endorsed a transparent film that can block Wi-Fi transmissions and other wireless signals from traveling through windows. The film, called SpyGuard, can be laminated or fitted inside windows to prevent remote eavesdroppers penetrating rooms with infrared or Wi-Fi signals to steal information or access private networks."
Has tech employment turned a corner?
Ed Frauenheim writes in C|Net News that perhaps the tech sector job losses have hit rock bottom:
"That's the implication of a study released Tuesday by the American Electronics Association, which found that the country's high-tech industry shed 25,300 jobs in 2004, to 5.6 million. By comparison, 333,000 tech industry jobs were lost in 2003 and 612,000 in 2002, according to the trade group."
Well, let's hope so....
Microsoft to Beta MBSA 2, Student 2006
David Worthington writes in BetaNews that:
"Microsoft has issued beta invitations to testers for Baseline Security Analyzer 2.0 (MBSA 2.0) and Microsoft Student 2006. MBSA 2.0 is a free vulnerability assessment tool designed for IT professionals built with the Windows Update Services infrastructure. No specific areas of improvement for MBSA 2.0 has been released at this time. The beta will officially begin on May 16, 2005 and is expected to continue into July. A Microsoft spokesperson would not provide further details."
Juniper Buys Peribit, Redline For Traffic-Processing Smarts
Paul Kapustka writes in Advanced IP Pipeline that Cisco Systems isn't the only networking vendor who has been doing some shopping lately -- so has Juniper Networks:
"Juniper Networks on Tuesday announced plans to acquire Peribit Networks and Redline Networks, two startups in the emerging field of application acceleration technologies. The two purchases, which total about a half-billion dollars, give Juniper more weapons to compete against router kingpin Cisco Systems for enterprise IT customers. Wide-area optimization technology like Peribit's and application-acceleration hardware like Redline's are being used to speed performance of enterprise applications, especially when they are being accessed via remote connections. Overall, the application acceleration market was worth $1 billion in 2004, according to analysts at Gartner."
Nothing like a little competition to stir things up.
Netscape GIF Image Netscape Extension 2 Buffer Overflow
The folks over at Secunia have posted a "highly critical" vulnerability found in Netscape browsers, verison 6.x and 7.x:
"A vulnerability has been reported in Netscape, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in version 7.2 and has also been reported in version 6.2.3. Other versions may also be affected."
Verizon to hand 911 access to VoIP operators
Ben Charny writes this afternoon on C|Net News that Verizon is opening up access to it's 911 plumbing to external VoIP network providers:
"In another sign of detente between traditional phone companies and upstart VoIP businesses, Verizon Communications, the largest of the Baby Bells, said it plans to open its 911 emergency calling infrastructure to providers of Net-based phoning. Verizon announced Tuesday that it would start making its 911 network in New York City available to all voice over Internet Protocol providers this summer. How well things go in the Big Apple will determine whether Verizon will open the rest of the emergency network, according to spokesman Mark Marchand."
GoDaddy.com Tops Registrar Ranking
Jim Wagner reports today on internetnews.com that:
"Domain name registrar GoDaddy.com is tops in the world, officials announced Tuesday. The new ranking comes from a recent report by analyst firm Name Intelligence and topples Network Solutions (NetSol) from the No. 1 spot it has held for years."
AOL Placed on Spam Blacklist
Via /.
"Hacker-X writes "According to this item over at Spam Kings, AOL has had a large swath of its IP addresses added to the Mail Abuse Prevention Systems (MAPS) Real-time Blackhole List (RBL). The RBL is used by many corporations and large ISPs to filter spam. MAPS evidently started blocking the AOL mail servers less than 24 hours after filing a complaint with AOL's abuse desk. The block was initiated in response to spam emanating from AOL mail servers."
Social Security Administration opened files after 9/11
In a startling admission, the U.S. Social Security Administration says that it made it's account files available to the FBI in their investigation of the 9/11 disaster:
"The Social Security Administration freely opened its files to the FBI and other police agencies after the attacks on Sept. 11, 2001. In a letter dated Sept. 13, 2001, SSA's general counsel signed off on the police agencies' request, saying the information should be released for 'investigations of the above terrorism acts.'"
Posted by
Declan McCullagh to the
C|Net Politics blog.
Whatever happened to machines that think?
I just read a pretty good article over lunch by Justin Mullins in the New Scientist entitled "Whatever happened to machines that think?" The article provides an overview of the current state of Artificial Intelligence development, as well as a pretty good historical timeline of AI development over the course of the past 70 years, beginning in 1936, when Alan Turing completed his paper "On computable numbers" which paved the way for artificial intelligence and modern computing. Worth a read.
The article begins with the definition of "The Sigularity" from Wikipedia, and then:
"CLEVER computers are everywhere. From robotic lawnmowers to intelligent lighting, washing machines and even car engines that self-diagnose faults, there's a silicon brain in just about every modern device you can think of. But can you honestly call any machine intelligent in a meaningful sense of the word?"