Want to search

Google
 

Sunday, June 1, 2008

I spy your PC: Researchers find new ways to steal data

Researchers have developed two new techniques for stealing data from computers that use some unlikely hacking tools: cameras and telescopes.

In two separate pieces of research, teams at the University of California, Santa Barbara, and Saarland University in Saarbrucken, Germany, describe attacks that seem ripped from the pages of spy novels. In Saarbrucken, the researchers have read computer screens from their tiny reflections on everyday objects such as glasses, teapots and even the human eye. The Santa Barbara team has worked out a way to analyze a video of hands typing on a keyboard in order to guess what was being written.

Computer security research tends to focus on the software and hardware inside the PC, but this kind of "side-channel" research, which dates back at least 45 years, looks at the physical environment. Side-channel work in the U.S. was kicked off in 1962 when the National Security Agency discovered strange surveillance equipment in the concrete ceiling of a U.S. Department of State communications room in Japan and began studying how radiation emitted by communication components could be intercepted.

Much of this work has been top secret, such as the NSA's Tempest program. But side-channel hacking has been in the public eye too.

In fact, if you've seen the movie Sneakers, then the University of California's work will have a familiar ring. That's because a minor plot point in this 1992 Robert Redford film about a group of security geeks was the inspiration for their work.

In the movie, Redford's character, Marty Bishop, tries to steal a password by watching video of his victim, mathematician Gunter Janek, as he enters his password into a computer. "Oh, this is good," Redford says, "He's going to type in his password, and we're going to get a clear shot"
Redford's character never does get his password, but the UC researchers' Clear Shot tool may give others a fighting chance, according to Marco Cova, a graduate student at the school.

Clear Shot can analyze video of hand movements on a computer keyboard and transcribe them into text. It's far from perfect -- Cova says the software is accurate about 40% of the time -- but it's good enough for someone to get the gist of what was being typed.

The software also suggests alternative words that may have been typed, and more often than not, the real word is in the top five suggestions provided by Clear Shot, Cova said.

Clear Shot works with an everyday webcam, but the Saarland University team has taken thing up a notch, training telescopes on a variety of targets that just might happen to catch a computer monitor's reflection: teapots, glasses, bottles, spoons and even the human eye.

The researchers came up with this idea during a lunchtime walk about nine months ago, said Michael Backes, a professor at Saarland's computer science department. Noticing that there were a lot of computers to be seen in campus windows, the researchers got to thinking. "It started as a fun project," he said. "We thought it would be kind of cute if we could look at what these people are working on."

It turned out that they could get some amazingly clear pictures. All it took was a $500 telescope trained on a reflective object in front of the monitor. For example, a teapot yielded readable images of 12-point Word documents from a distance of 5 meters (16 feet). From 10 meters, the researchers were able to read 18-point fonts. With a $27,500 Dobson telescope, they could get the same quality of images at 30 meters.

Backes said he has already demonstrated his work for a government agency, one that he declined to name. "It was convincing to these people," he said.

That's because even though the reflections are tiny, the images are much clearer than people expect. Often, first-time viewers think they're looking at the computer screen itself rather than a reflection, Backes said.

One of his favorite targets is a round teapot. Looking at a spoon or a pair of glasses, you might not get a good view of the monitor, but a spherical teapot makes a perfect target. "If you place a sphere close by, you will always see the monitor," he said. "This helps; you don't have to be lucky."

The Saarland researchers are now working out new image-analysis algorithms and training astronomical cameras on their subjects in hopes of getting better images from even more difficult surfaces such as the human eye. They've even aimed their telescopes and cameras at a white wall and have picked up readable reflections from a monitor 2 meters from the wall.

Does Backes think that we should really be concerned about this kind of high-tech snooping? Maybe, just because it's so cheap and easy to do. He said he could see some people shelling out the $500 for a telescope just to try it out on their neighbors.

So how to protect yourself from the telescopic snooper? Easy. "Closing your curtains is maybe the best thing you can do," he said.

Mass SQL injection attack hits Chinese Web sites

The attack has implanted malware on thousands of Web sites
Web sites across China and Taiwan are being hit by a mass SQL injection attack that has implanted malware in thousands of Web sites, according to a security company in Taiwan.

First detected on May 13, the attack is coming from a server farm inside China, which has made no effort to hide its IP addresses, said Wayne Huang, CEO of Armorize Technologies Inc. in Taipei.

"The attack is ongoing," Huang said. "Even if they can't successfully insert malware, they're killing lots of Web sites right now, because they're just brute-forcing every attack surface with SQL injection, and hence causing lots of permanent changes to the victim Web sites."

In a SQL injection attack, an attacker attempts to exploit vulnerabilities in custom Web applications by entering SQL code in an entry field, such as a log-in. If successful, such an attack can give the attacker access to data on the database used by the application and the ability to run malicious code on the Web site.

A screenshot of a Web site belonging to the Mackay Memorial Hospital in Hsinchu, Taiwan, showed that the rendering of the site had been affected and displayed the SQL string injected by the attack, Huang said.

Thousands of Web sites have been hit by the attack, he said, noting that 10,000 servers alone were infected by malware on Friday. Most of the affected servers are in China, while some are located in Taiwan, Huang said. The attackers appear to be using automated queries to Google Inc.'s search engine to identify Web sites vulnerable to the attack, he said.

Among the sites hit by the attack on Friday were SouFun.com, a real estate Web site, and Mycar168.com, a site for automobile enthusiasts. Mass SQL injection attacks have increasingly become a security threat. In January, tens of thousands of PCs were infected by an automated SQL injection attack. That attack exploited a vulnerability in Microsoft Corp.'s SQL Server.

The attackers in the more recent outbreak aren't targeting a specific vulnerability. Instead, they are using an automated SQL injection attack engine that is tailored to attack Web sites using SQL Server, Huang said. The attack uses SQL injection to infect targeted Web sites with malware, which in turn exploits vulnerabilities in the browsers of those who visit the Web sites, he said, calling the attack "very well designed."

The malware injected by the attack comes from 1,000 different servers and targets 10 vulnerabilities in Internet Explorer and related plug-ins that are popular in Asia, Huang said.

The vulnerabilities are MS06-014 (CVE-2006-0003), MS07-017 (CVE-2007-1765), RealPlayer IERPCtl.IERPCtl.1 (CVE-2007-5601), GLCHAT.GLChatCtrl.1 (CVE-2007-5722), MPS.StormPlayer.1 (CVE-2007-4816), QvodInsert.QvodCtrl.1, DPClient.Vod (CVE-2007-6144), BaiduBar.Tool.1 (CVE-2007-4105), VML Exploit (CVE-2006-4868) and PPStream (CVE-2007-4748).

New attack trend pushes POS encryption to the fore

Vendors offer new tools to try to help retailers stop data-in-transit thefts
The relatively scant attention that retailers have paid to securing their point-of-sale systems over the past few years is making the POS setups increasingly attractive targets for cybercrooks who are looking to steal payment card data.

Hoping to help merchants address that situation are a handful of vendors who have begun offering new products aimed at making POS environments a lot harder to crack.

The biggest of those vendors is VeriFone Holdings Inc., which last month released a security tool designed to let merchants encrypt credit and debit card data from the moment a card is swiped at a merchant's PIN entry device all the way to the systems of the company's external payment processor.

VeriFone's VeriShield Protect software is based on patented technology from Semtek Innovative Solutions Corp., which makes appliances for securely decrypting data. VeriFone said that Semtek's technology, called the Hidden Triple Data Encryption Standard, can be used to encrypt personal account numbers and the so-called Track 2 data stored on the magnetic stripe located on the back of payment cards. That information includes card numbers and their expiration dates.

A key feature in VeriShield Protect is that it encrypts payment card data in such a way that the information will still be recognizable as valid card data by other POS applications, said Jeff Wakefield, vice president of marketing at VeriFone. As a result, merchants won't need to tweak or modify their POS systems in any way to accommodate the encryption technology, he claimed. But at the same time, encrypting the card data will render it totally useless to anyone who steals the information, Wakefield said.

A separate device — which could be installed by either a retailer or its payment processor — then would be used to decrypt the data before transactions are processed.Merchants using newer models of VeriFone's PIN entry devices can have the encryption function "injected" into them for less than $50 per device in license and service fees, Wakefield said. He added that the vendor doesn't have a published list price for new PIN devices that support the technology, because per-device prices can vary depending on the individual installation.

Meanwhile, the decryption appliances, which are made by Semtek and sold by VeriFone, can cost from $50,000 to upward of a million dollars for high-throughput, fully redundant systems. Larger retailers that want to exercise direct control over all aspects of their payment card transaction process might invest in such systems themselves, Wakefield said. But, he added, most small and midsize merchants will likely look to their payment processors to handle the decryption component.

Another company targeting the POS security market is Merchant Warehouse, a credit card processing firm that provides services to about 50,000 retailers, most of them small or midsize. The company offers a product called MerchantWare, which like VeriFone's technology is designed to enable merchants to encrypt card data from the beginning to the end of the sales and payment process.

Although VeriShield Protect is focused on the PIN pad devices that are used by customers themselves to swipe their cards, Merchant Warehouse CEO Henry Helgson said that MerchantWare is aimed more at POS systems in which cards need to be handed over to a cashier.MerchantWare is based on technology from MagTek Inc., a rival of Semtek. Like VeriShield Protect, MagTek's product also encrypts data at the card reader. But integrating the technology into existing environments does require "minimal" updates to a company's POS software, Helgson said.

With MerchantWare, merchants never have to store any payment card data on their systems, according to Helgson. Instead, a retailer that needs to access payment transaction data to handle issues such as chargebacks or payment disputes would log into a MerchantWare payment gateway to get at the information.Helgson said that the recent disclosures of several data-in-transit thefts are helping to generate interest in technologies such as MerchantWare. "This is our way of getting new customers," he said. "We expect huge demand for this.

Also offering capabilities similar to MerchantWare is payment processor Element Payment Service Inc., which is using MagTek's technology to provide bundled encryption services to retailers, said Gartner Inc. analyst Avivah Litan. It's surprising, she added, that more vendors haven't already come out with similar products that can help retailers encrypt payment card data while it is inside their networks.

Currently, under the Payment Card Industry Data Security Standard mandated by the major credit card companies, merchants are required only to ensure that any payment card data being transmitted over a public network is encrypted. The lack of a rule requiring that data be encrypted while it is transmitted internally has been exploited in at least three major data breaches disclosed in the past few months.

The biggest of the breaches took place at Hannaford Bros. Co., a supermarket chain based in Scarborough, Maine. In March, Hannaford said that malware planted on the POS servers at nearly 300 grocery stores had been used to steal unencrypted payment card data on more than 4 million customers. Last month, Hannaford officials said that the grocer planned to spend "millions" of dollars on IT security upgrades in the wake of the breach.

Similar incidents have also been reported by Okemo Mountain Resort, a ski area in Ludlow, Vt., and by Dallas-based restaurant chain Dave & Buster's Inc., which said last week that credit and debit card numbers were stolen from 11 of its restaurants during 2007 by hackers who allegedly gained remote access to POS servers and then installed packet-sniffing software on them.
Such breaches highlight the need for companies to pay more attention to encrypting payment card data within their own network boundaries, Litan said. But thus far, she added, adoption of the available encryption technologies has been slow because many retailers appear unconvinced that encryption can be introduced at the POS level without requiring major changes. For instance, one concern is that encrypting data will make it harder for retailers to handle issues such as chargebacks.

"Most merchants are passive about this because their systems rely on card numbers for chargebacks," Litan said. "They need to be convinced that their systems need to change." In addition, many retailers have spent a lot of money, time and effort complying with the existing PCI requirements and are reluctant to implement even more security controls, she said.

10 essential (and free!) security downloads for Windows

Stay safe from prying eyes and bad guys
To use an Internet-connected computer is to be insecure and place your privacy in danger. Spyware, viruses, Trojans and assorted malware are everywhere on the Net, trying to hop onto your PC and cause damage. Snoopers want to get at your personal information for nefarious purposes, such as identity theft.

Operating systems of all kinds are under assault, but the prime target is Windows, because the vast majority of PCs worldwide use that operating system. If you use Windows, hackers have you in their cross hairs.

Luckily, there's plenty of free software for Windows that can help protect your privacy and security. I'm not talking about anemic, underpowered applications. I'm talking about industrial-strength tools that can do everything that expensive security software does.With all the free stuff out there, which software should you choose? I've selected 10 of my favorite programs that can protect your privacy and security. Download and install them, and you'll be far safer against all the nastiness out there.

1.Secunia Personal Software Inspector
Some of the biggest security holes in your PC aren't directly related to Windows — instead, they're in the applications you run. As often as not, that's how hackers and crackers can get into your PC. For example, in the recent "Pwn to Own" hacker challenge, it was application vulnerabilities, not Windows Vista itself, that allowed hackers to crack Vista.

The best way to protect yourself from this problem is to keep your applications updated with vendor-issued patches. But you don't want to spend your life cruising the Web, looking for updates for every app you use.

Instead, get this freebie that does it for you. As a security vendor, Secunia keeps track of software vulnerabilities and available patches. The company's Personal Software Inspector (PSI) scans your PC, downloads a current vulnerabilities file, and alerts you to any software on your machine that is missing security patches. It also warns you if any software is out of date and no longer supported by the vendor. Out-of-date software no longer gets security patches, and so may be more vulnerable to hackers.When you get a list of insecure software, you can get more details about each piece of software, open the folder where the software resides, or download a patch. Click the + sign next to the software, and you'll get even more details about it, often including links to any tools for uninstalling the software. You also have the choice of having Secunia constantly monitor your software use and notify you when patches are available.

Secunia says that some programs require tedious or confusing patching procedures, so by default it starts in a mode that shows you only "easy-to-patch" programs. It's a much better bet to have Personal Software Inspector tell you about all applications that need patches, not just ones that are easy to patch. To make the change, select Settings and uncheck the box next to "Show only 'Easy-to-Patch' programs."

Note that Secunia PSI is free for home use, but requires payment for business use.

2.SendShield (beta)
Microsoft Office documents often include data that can compromise your privacy or that you don't want others to see, such as hidden text or cells, document revision history, names of document authors and reviewers, and so on. When you send someone a document, they can easily see that information by viewing the version history and the document's properties, and in other ways.It can be time-consuming and impractical to remember to review every document you send out via e-mail to make sure it doesn't contain privacy-compromising information. Instead, get Unedged Software's SendShield.
Whenever you send PowerPoint, Excel or Word documents via Outlook, it examines them to see if they have any of private information. It then details what it finds and lets you remove the information with a single click. It deletes the information only from the copy of the file you send via e-mail, not the original on your hard disk. You can also have the documents turned into PDFs and sent that way instead of as Office documents.

SendShield is in beta, and for now is free. However, when it gets out of beta, there is a chance that it will become for-pay software. (The company provided no details on timing or pricing.)

3.Avast Antivirus
Many for-pay antivirus programs, such as Symantec's Norton AntiVirus, are system hogs, taking up far too much RAM and system resources, which slows down your PC unnecessarily. Not only that, but you have to pay an annual fee for using them.

There's a better way: Get the Avast Antivirus software from ALWIL Software. It's lightweight and takes up barely any RAM or system resources, it's simple to use, and it'll do everything you need by providing live, resident protection as well as scanning.The software uses a shield metaphor for its multiple types of protection. There's an antivirus shield, one that protects against Web-based threats, another for e-mail protection and so on. You can customize the sensitivity of each shield.

Avast includes automated updates of virus definitions. The independent testing site AV-comparatives.org rates its effectiveness as Advanced+, the top level. I've been using the program for well over a year and a half, and it's caught every threat that's come my way.
Note that Avast is free for home use, but requires payment for business use.

4.HijackThis
Everybody should be using spyware-detection tools such as Lavasoft Ad-Aware or Spybot Search & Destroy — preferably both. But some malware is so nasty that it escapes detection from any spyware scanners — and can't be removed by them, either.
So what can you do if your PC is acting strange and you suspect that you've been victimized by malware? Try downloading and using Trend Micro's HijackThis, and with the help of experts, you may be able to track down the source of the problem and then fix it.

The program examines your settings and the Windows registry, particularly those sections that are most likely to be vulnerable, and then saves all those settings in a log file. Those settings are the key to finding out if you've been infected. Experts can analyze the log, and from what they find, determine whether there's a spyware infection.

Where do you find the experts? The program lets you upload your log file to the HijackThis Web site, where others will examine it, let you know if there are any likely infections and tell you how to rid yourself of them. There are plenty of other discussion areas on the Internet that will do the same; a Google search will turn up plenty of them.

The software will also delete suspicious items, and it includes other useful tools, such as one that will generate a log of all programs that run on start-up. Keep in mind that if you're not an expert, you shouldn't try to use this program on your own. Think of it as a last resort when standard anti-malware tools fail.

5.SpywareBlaster
Of course, the best way to protect yourself against spyware is to make sure that it doesn't install in the first place. That's where SpywareBlaster from Javacool Software comes in. It stops the installation of ActiveX-based spyware, browser hijackers and other malware, and can also block spyware cookies. It includes extras as well, such as disabling Flash running in Internet Explorer. And it also lets you create a system snapshot, so that if at some later point you get infected with spyware, you can always revert to a clean system.Note that if you don't use Internet Explorer, there's no need to install this software, because Firefox, Opera and Safari don't use ActiveX.

6.F-Secure BlackLight Rootkit Eliminator
Rootkits are the most nefarious of all malware, giving hackers access to your entire PC without your knowledge. They use special techniques to hide themselves from many antivirus and anti-malware programs, which makes detecting and killing them exceedingly difficult. Because of that, just using antivirus software isn't enough. Instead, you need a specialized rootkit detector and killer.

That's exactly what F-Secure's BlackLight Rootkit Eliminator does. It scans your PC for hidden processes, folders and files, then reports on what it finds. If your PC is clean, it will tell you so. If it finds anything hidden, it tells you that as well and lets you clean it up. Double-click any entry, and you'll get more information about it, such as the file location, a description and company information. To kill a rootkit you've discovered, you have a choice of renaming or deleting the file using BlackLight's built-in tools. It's a good idea to first rename suspicious files, which gives them a .ren extension and prevents them from executing. Next, do a Google search for the file names to see whether they really are malware. Rootkits often hide legitimate files and processes, such as Explorer.exe, so make sure not to get rid of any legitimate ones. If you confirm that files are malware, then delete them.

Warning: Only very experienced users should attempt to clean their PC with this software, because if you rename or delete valid files, you can cause serious problems. If you're at all unsure about what you're doing, you might want to try a different free anti-rootkit tool called RootAlyzer, from the same folks who bring you Spybot Search & Destroy. It checks your PC for rootkits but doesn't offer tools for deleting them. (Note that RootAlyzer is still in the preview stage.)

7.NoScript
JavaScript, Java, plug-ins and other code found on Web pages can do serious damage to your PC. They can deliver interactivity and other useful features, but they can also be used to wreak a great deal of havoc. To keep yourself safe on unfamiliar Web sites, you'll want to turn them off, but doing so means that you'll lose some of the nifty features on some of your favorite Web sites.
The answer? A great Firefox extension called NoScript, which not only blocks scripts, plug-ins and various types of code, but also protects against cross-site scripting attacks. It lets you block scripts, plug-ins, and code on a site-by-site basis. You can control it to an exceptional degree, including whether to block scripts on sites on a one-time basis or permanently.

8.Comodo Firewall Pro
The firewall that ships with Windows XP or Vista simply isn't good enough to keep you safe — you need better protection. There are plenty of free firewalls out there, but my favorite is Comodo Firewall Pro, which provides top-notch protection from both inbound and outbound threats. It offers other types of protection as well, including what it calls Defense+, which keeps you safe in several ways, including locking down certain files and folders so that they can't be altered.Note that this firewall is more aggressive than many in asking whether you should allow connections. So when you first run it, expect to see a good many pop-ups asking whether you want to let through a particular application. To help cut down on the pop-ups, run its Clean PC mode, which lets you scan your PC for applications and then register them as safe so that you're not inundated with quite so many pop-ups. In addition, there's an "install mode" that disables certain types of pop-ups for 15 minutes, allowing you to easily install new software.

Another very good free firewall is Online Armor. Computerworld editor in chief Scot Finnie prefers its paid version to any other firewall. The free version is excellent as well, with one shortcoming: To install a new version, you first have to uninstall the old version, then install the new one.

9.McAfee SiteAdvisor
The Web is filled with sites that harbor adware, spyware or worse. It can be almost impossible to know ahead of time whether you've visiting such a site. Making matters worse is that many of these sites also have legitimate information and software for download.

McAfee SiteAdvisor is a great way to make sure you steer away from those sites. When you do a search in Google or Yahoo, it places a small icon to the right of each search result, indicating whether the site is safe, questionable or known to be harmful. A red X indicates danger, a green check indicates the site is safe, and a yellow exclamation mark indicates that it's questionable. If McAfee hasn't assessed a particular site, it displays a question mark.
Move your mouse over the icon, and you'll get a pop-up with details about the dangers, including whether it has dangerous downloads, whether it links to other dangerous sites, and whether it will send spam if you register at the site.

Click More Info from the pop-up, and you'll get much more information, including a list of the dangerous downloads and malware or adware that infects it, what sites the site links to and more. It even tells you the site's "annoyances," such as what third-party cookies it installs.
The SiteAdvisor software works even when you don't do a search. As you browse the Web, a small icon sits at the bottom of the screen and tells you whether the site is dangerous or not.

10.CCleaner
CCleaner does double duty: Not only does it help protect your privacy, but it also keeps your system clean and running well. To protect your privacy, it removes traces of your Internet history, such as your temporary Internet files, browsing history, autocomplete form history, and cookies. In addition, it cleans Windows' Recent History list. It's great at cleaning your system as well. CCleaner gets rid of many different kinds of unneeded files, such as temporary files, Windows log files, chkdsk file fragments and a lot more. It can also check your Registry and clean it of bad or broken entries and help you stop programs from running on start-up. For anyone who wants to keep their browsing life private — and keep their system clean and running smoothly — this is a must-have download.

Opinion: Top 10 Google flubs, flops and failures

Among all the success stories of the huge and unorthodox Internet company are some that are, uh, not so much
Google Inc. is arguably the most successful Internet company today. But Google didn't get to where it is without takings risks -- some of which have failed spectacularly.

For example, remember the Google Accelerator, which was supposed to speed up Web surfing? (A dubious claim, but least it was free.) But you had to pay to get a Google Answer, and eventually people stopped asking. Google Video did so well that the company finally gave up and shelled out big bucks to buy YouTube LLC. If you can't beat 'em, buy 'em.

Some Google flops lasted no more than a day and then vanished without a trace. Other Google efforts have been left to languish like a neglected orphan inside Google's labyrinth of Web services. Still other dogs were released as betas nearly five years ago and are still trapped in Google Labs with apparently little hope of escaping the test tube.

A Google X-File: Google X
One of the most mysterious of Google's flops was its Google X site, a redesigned Google search home page that was styled after the Mac OS Dock user interface on OS X. On the bottom of the page was written "Roses are red. Violets are blue. OS X rocks. Homage to you." The site, which launched in 2005, lasted one day before being shuttered by Google for no public reason. Google X may have been pulled because of worries that Apple's copyright lawyers might not appreciate the "homage." But Google X has lived on with many Internet users cloning the interface for anyone to use.

Google Catalog: Ready for recycling
Interested in seeing what the latest prices for USB flash-based drives are? Google Catalog's top search result links you to a 2001 Micro Warehouse catalog where a 256MB Trek ThumbDrive Pro will run you $595. Google Catalog has been in a perpetual state of beta since 2002, and currently its most recent catalog offering for a search on "laptops" delivers a Cyberguys Spring 2006 catalog. Google Catalog now works more like the Internet Archive's Wayback Machine than like a place to browse and see before you buy.

Google Video Player is off the air
At one time, Google thought we needed yet another application to download and play videos on our computers. Married to the company's online service Google Video, the Google Video Player's chief advantage was that it could play back video encoded using Google Video File (yet another video file format that Google thought we needed). But it supported video playlists, and it allowed you to skip ahead in a Google Video even if that portion hadn't downloaded yet. It turned out that the Web was already being well served with video players. Critics dinged the Google player for poor organization of video clips, paid content that varied too much in price and its inability to transfer video content to portable devices. In August 2007, Google yanked the player from the Google Video Web site.

Google Web Accelerator: Time saver or waste of time?
Google's Web Accelerator is a combination of something you don't really need and something that may compromise your privacy. The software is still offered by Google and promises to speed up page load times of Web pages by as much as a less-than-stunning 20%.

Reviewers said that the target audience for Google Web Accelerator, broadband users, already can retrieve Web sites fast enough. And from the start, privacy activists such as Richard Smith accused Google of using Web Accelerator as a market research tool. Smith said, "They'll be looking at what people are doing on the Internet, what they're reading, what they're buying? There's potentially a lot of information just from the click-stream of the URLs people visit."

Question: What happened to Google Answers? Answer: It flopped
For five years, Google Answers allowed anyone to post a question along with a bid price they were willing to pay for a researched answer. A prescreened group of Google Answer researchers would accept the fee (or not) and if they did accept the offer, answer the question.

Along with well-heeled high school and college students, I was a big fan of the site. Answers were usually complete, well researched and well written. But quality isn't always rewarded on the Internet. Google just couldn't compete with Yahoo Answers, a free service that relied not on paying customers, but on a mammoth and loyal Yahoo community. Google's official Google Answers response to the question "What has happened to Answers?" is "There is no answer at this time." Google may not be accepting your questions, but you can still search the database of answers.

Google Coupons: Expires 2006
It almost seems as if Google Coupons is Google's equivalent to a white rhino -- they both exist but few have seen one. Google Coupons is a feature within the Google Local Business Center service that allows companies to create Web-based coupons and display them within Google Maps.

The idea behind Google Coupons is that when you are searching for a local business using Google Maps, a local company can deliver a coupon enticing you to do business with it. The coupon would be displayed next to the Google Map and could be printed out and redeemed.
It's a nifty idea, but as an avid user of Google Maps, in the two years Google Coupons has been available, I've never come across one when using a map. Have you?

Google hangs up on Google Voice Search
From the Google department of way-before-its time came Google Voice Search. The service, which was originally an experiment within Google Labs, was launched in 2003 and worked like this. First, visit the Google Voice Search site. Next, call the phone number on the screen and speak your keyword search query. Then go back to your browser, click on the link on the Google Voice Search site, and bingo, a window with the search results appears.

No wonder this service got nixed. Searching the Web like this is comparable to calling up your brother-in-law to drive across town and brush your teeth for you before you go to bed. On the other hand, this cool technology experiment was a precursor to mobile phone services of today such as ChaCha and Google's own, very handy Google 411 service.

Google Viewer: I'm not seeing it
The idea behind the Google Viewer software program was that you could type in a query, press submit, and then sit back and watch as it loaded actual Web pages that it found. Next, Google Viewer displayed the results to you as a slide show. The program, which PC World reported on in 2002, was eventually abandoned.

The idea of sneaking a peak at a Web page before clicking on the link eventually came to fruition -- it just didn't require a software download to do it. Today, you can preview pages in search results delivered by Ask.com, Powerset and Yahoo, no application required.

eBay users check in, but they don't (Google) Checkout
In June 2007, thousands of eBay loyalists descended on Boston for eBay's annual sellers convention. And in hopes of promoting its new Google Checkout payment system -- which would be competing directly with eBay's PayPal subsidiary -- Google organized a party to be held during the eBay show, inviting eBay sellers to attend. In addition, the Google party was supposed to be a protest against eBay for barring merchants from using Google Checkout.

When eBay got wind of Google's plan, it promptly canceled all of its U.S. ads running on the search engine for more than a week. At the time, eBay was the single largest buyer of search ads on Google.

Google canceled its Boston tea party.

Orkut: The Hoff of social networks
Actor David Hasselhoff is worshipped in Germany, but his talents are less appreciated here in the U.S. The same might be said of the domestically underappreciated Google Orkut. Introduced in 2004, the social networking site is a big hit in Brazil, but in the U.S., Orkut has lagged in popularity behind Facebook and MySpace.

Google Orkut's lack of popularity in the U.S. has been attributed not only to strong competition from the other services, but also to such factors as its early "invite only" policy, a lack of support for blogging tools and an absence of video features.

Failure will you get you everywhere
All employees at Google are supposed to spend 20% of their time working on personal projects of interest. Google says that the policy encourages creativity. And without Google's willingness to take risks and not be afraid of tripping, stumbling and sometimes falling flat on its face, the company might not be what it is today. Perhaps Google's greatness can be measured by its failures as well as its successes.

Sunday, May 25, 2008

Infosys set to join TCS in 1,00,000-employee club

A key milestone is just weeks away. The country's showpiece software giant, Infosys, is set to cross the one-lakh-employee mark, catching up with industry leader Tata Consultancy Services.

While the twosome together would be within kissing distance of worldwide headcounts at IBM or Accenture, the two global leaders are also putting pressure at home with their own aggressive hiring. Infosys now has 82,000 employees on its rolls, but clearly sights 100,000 after job offers made in 1,050 engineering colleges across India.

"We have given 18,000 offers. This shows our confidence in the business.
We will soon employ in excess of one lakh people in India," TV Mohandas Pai, director, human resources, Infosys told reporters in Mumbai. IT and business process firms together employ 20 lakh workers in India.

While IBM has 3.68 lakh employees and Accenture has 1.
72 lakh people on its rolls spread worldwide, TCS and Infosys have most of their employees based in India. Thanks to lower costs in India, IBM and Accenture have been expanding in India, prompting a war for talent that is yielding fruits for employees and mid-level managers.

Infosys is overhauling its manpower strategies to battle attrition. Under the new performance-linked pay structure, the difference in compensation between average and top performers would be 35 to 40 per cent.

This difference earlier was 15-20 per cent. "Our attrition is 13.
4 per cent and we want to get it in single digits," says Nandita Gurjar, group head, HR, Infosys. The company is planning to go for stringent employee assessment standards.

"We are tightening our assessment of top performers. We would also introduce variable pays for middle and senior-level management," said Pai.

Infosys has embarked on a hiring spree when there have been retrenchments in the IT sector due to a slowdown in the US economy (which contributes 70 per cent of Indian IT companies' revenues). "Headcount addition is in line with their guidance and shows the business confidence despite question marks over the US economy" said Apurva Shah, an IT analyst with Mumbai-based brokerage Prabhudas Lilladher.

Opinion: A new kind of Web — don't miss these 11 sites

Check out these examples of how the Web is evolving to present information in new ways


Call them Web 2.0 sites or mashups — or come up with your own trendy term. Whatever you call them, there are sites popping up all over the Web that process information in new ways rather than just present it.

Some of them work with information you supply, letting you manipulate, track and share data, such as your schedule or your to-do list. Others, so-called mashups, draw data from different sites and reassemble it to make something new. They're all part of how the Web is evolving beyond just a bunch of point sources for information. Here are 11 examples that show what the new Web can do, from helping you organize your life to adding some personalized fun to it.

Personal assistants
GrandCentral
You can use GrandCentral to sort and filter incoming calls and direct them to ring some or all (or none) of your phones.Click to view larger image.
Ever wish you could exercise the same control over incoming phone calls as you do over e-mail? GrandCentral — now a Google operation — gives you a new phone number and forwards incoming calls to any other number or numbers you specify.
Depending on who the call is from, you can have it ring through to your work phone, home phone, cell or all at once. You can also direct some calls right to voice mail — with different greetings for different callers — and retrieve your voice mail via any browser. Perhaps best of all, you can permanently block calls from anyone you don't want to hear from ever again.
Highrise keeps track of your relationship with your customers, providing a place to track and share their contact information, background notes and records of interactions.Click to view larger image.
Highrise is an online CRM tool. Basically, it's an easy-to-use database for contacts, reminders and notes. Because it's online, you can share it across your company or team anywhere there is access to a browser.
Highrise offers a free account for up to two users that can store 250 contacts, a Max account at $149 per month for unlimited users and 50,000 contacts, and several levels in between. You can even forward e-mails to a drop box associated with your account, and Highrise adds it as a note on the sender's or recipient's contact page, along with any attached files.

Use your mobile phone to call in a reminder — for instance, that you need to pick somebody up after school — and Jott will send you an e-mail reminder, plus display it on your Jott home page.Click to view larger image.
Jott is for those times when you're away from your computer — but not from your phone — and you think of something you need to do the next day or want to be reminded of next week. You just call Jott and dictate your message. Jott translates your message to text and e-mails it to you or anyone else whose name and address you've registered.
If the event is in the future, you can tell Jott to send you an e-mail or text message as a reminder. You can also use Jott to post to your blog or to Twitter, or to add tasks to your to-do lists on Remember the Milk (see below) and other such sites.

Remember the Milk
Remember the Milk keeps your to-do list organized and sends you reminders in your choice of formats.Click to view larger image.
Remember the Milk is an online to-do list manager with a clean, straightforward interface that raises it above some of its competitors.
As with any desktop calendar program, you create a list of tasks and set due dates — which you can do with natural-language modifiers such as "tomorrow" or "in two weeks" — and, if you want, set them to repeat according to a regular schedule. You can add tasks by entering them in your browser or by e-mailing them to Remember the Milk.
Where Remember the Milk beats most desktop programs is its ability to send you a reminder via e-mail, SMS or instant messenger. You can also share your lists with family or team members and let them add tasks too, something impossible with a desktop program outside a server environment.

Information visualizers
Pageflakes
You know those portal pages that you can customize with different information sources, such as a Yahoo start page or iGoogle? Pageflakes is the most customizable portal page you can imagine.
The "flakes" on your page can contain almost anything, from the familiar news, weather and sports sites to RSS feeds and blogs, to podcasts, to a Facebook notifier — there are more than 200,000 available flakes at the moment.
You can also load special-interest pages created by other users and publish as Pagecasts, such as the one set up for tracking the recent March Madness basketball tournament.
With Pageflakes, you can customize a personal Web page to follow the news, find new recipes, keep track of your Facebook Pokes and lots more.Click to view larger image.
The fact that there's no user-controlled way to delete your account will be a deal-breaker for some, and understandably so. Hopefully, the developers will take note of what happened to Facebook and build that capability in. But if you like the idea of a personal Web start page, Pageflakes is the best way to get one.
Pick a band or a movie, and Liveplasma displays related artists. Did you know Herman's Hermits were only two degrees of separation from Donna Summer?Click to view larger image.
Opening a Liveplasma map is like entering a solar system of related musical acts or movies. After you enter the name of a band, for example, Liveplasma generates a field of spheres with your band in the center and other similar bands sprinkled around it.
The size of the sphere relates to the popularity of the artist, and its color conveys how similar it is to your target band. Lines connecting the spheres let you track the connections.
The sorting process is a little opaque, and the database has some holes — entering "Lily Allen" got me a map based on Woody Allen, for example. But it's an amusing way to explore similarities between artists and a visually stunning example of a new way to display information.

WeatherBonk
WeatherBonk will tell you everything you need to know about the weather in Pittsburgh — or anywhere else — including pictures.Click to view larger image.
WeatherBonk, on the other hand, is far from visually stunning, but it'll satisfy anyone who really wants to know what's going on weatherwise.
WeatherBonk pulls data from national weather services such as Weather Underground and the National Weather Service, as well as from numerous personal weather stations run from homes and schools. It displays a screen showing the current forecast, a Google map with temperature data and streams from webcams in your target region. You can even overlay radar and cloud information and animate it. The result ain't pretty, but measured by information per square inch, it's a winner.

Maps mashups
CommunityWalk
You know those little tabs you see when you search in Google Maps for something like "pizza near 90210"? CommunityWalk lets you make your own map with tabs you set by entering addresses or by just clicking on the map.
You can also enter a label and notes for each location. I've used it to make a map of where the members of a local Internet forum live and to plot the locations of a bunch of open houses I wanted to hit one weekend. You can categorize the locations and choose a different icon — basic or silly — for each category. And you can make the map Private; Shared, so that anyone you send the URL to can see it; or Public, which lists it on the site and makes it available to search engines.
With CommunityWalk, you can create your own custom Google map and, if you want, share it with the world. Here jpiehowski shows us where they're biting in Minnesota.Click to view larger image.

Gmaps Pedometer
Want to know how far that walk you took today was? Curious about the distance of your regular morning run? Just go to this site, bring up the Google map of where you do your perambulating and start clicking to place points along your route.
Trace out the route of your morning jog on a Google map, and the Gmaps Pedometer will tell you how much ground you covered and how many calories you burned.Click to view larger image.
The Gmaps Pedometer will calculate the total distance and, if you enter your weight, even give you an estimation of the number of calories you've burned. That's what it's for, but you can use it to measure any distance. I compared the length of the northern and southern borders of Wyoming (they're not the same, you know) by "walking" the length of them on the map.

HousingMaps
HousingMaps combines Craigslist For Rent data with Google maps to help you find a place to live in the perfect neighborhood.Click to view larger image.
So where are all those apartments on Craigslist, anyway? Go to housingmaps.com, choose a city served by Craigslist from the drop-down menu, enter a price range, number of bedrooms and other sorting criteria that Craigslist offers, and you've got a map showing where all the matching listings are located.
You also get a list of all the postings along the side of the map. Click on the icon next to any post to get a pop-up on the map showing title and address, or click on the listing title to go right to Craigslist. It's helpful if you're planning to move to a new house or apartment, but it's also a great way to pass the time dreaming about moving to a whole new city.

Just for fun
Fly your little biplane over Nôtre Dame de Paris — or any of several other scenic locations — with the Google Maps plus Flash mashup Goggles.Click to view larger image.
Load the map of your hometown or someplace you just feel like visiting and fly your little Flash-animated biplane around to your heart's content. You can even strafe old workplaces or other locations you have a grudge against.
If you get lost, just dive until you crash into the ground and start over. Goggles opens with a list of 22 locations to start from, including New York and Los Angeles; Helsinki, Finland; Heraklion, Crete; and Mars and the Moon (though I couldn't get maps for the latter two.) There's also a way to set your own start location, though it's a complicated, multistep process. But if you can't find the location you want, just fly there.

Wednesday, May 21, 2008

Will Microsoft deliver Windows 7 next year?

Recent statements hint at possible arrival of next OS in 2009

Microsoft Corp. has dropped two strong hints in the past two days that the next version of its Windows operating system will arrive in 2009, shaving up to a year off previous expectations.
It could also be a signal that Microsoft intends to cut its losses with Windows Vista, which has been poorly received or shunned by customers, especially large companies.

Microsoft has long said it wants to release Windows 7 about three years after Vista, which was released to manufacturing in November 2006 but not officially launched until January 2007. Given Microsoft's recent track record - Vista arrived more than five years after XP -- most outsiders had pegged sometime in 2010 as a safe bet for Windows 7's arrival.

But News.com reported today that Microsoft Chairman Bill Gates answered a question at a business meeting in Miami about Windows Vista by saying "Sometime in the next year or so we will have a new version."

And during its announcement yesterday that it would extend the availability of Windows XP Home for low-cost laptops, Microsoft said it would retire the operating system only after June 30, 2010, or one year after the release of Windows 7, whichever comes later.

That implies that Microsoft is targeting the middle of next year for some sort of release milestone for Windows 7 -- the only codename known at the moment -- though whether that would be a final release to consumers or an RTM, which allows businesses and resellers to start installing it, is unknown.

A Microsoft spokeswoman, in an e-mail, said the company "is in the planning stages for Windows 7 and development is scoped to three years from Windows Vista Consumer GA." She said the company was providing early builds of the new operating system to gain user feedback, but otherwise was not providing further information.

Gates also said that he was "super-enthused about what [Windows 7] will do in lots of ways" but didn't elaborate.

What could those be? Microsoft has divulged a few things. Responding to criticism that Windows has become unnecessarily bloated, the company has 200 engineers developing a slimmed-down kernel called MinWin that uses 100 files and 25MB, compared to Vista's 5,000 files and 4GB core and is so small it lacks a graphical subsystem.

Microsoft has also confirmed that the operating system will come in consumer and business versions and in 32-bit and 64-bit editions

Screenshots of early betas of Windows 7 are also appearing. Blogger Paul Thurrott yesterday put up screenshots from Build 6519 of Windows 7 released in December, which he said looks like "a slightly enhanced version of Windows Vista."

To prepare its millions of reselling partners, Microsoft needs to start generating excitement about its software months or years in advance.

But if it talks up Windows 7 too much, it runs the risk that large companies -- Microsoft's most profitable customer segment -- will hold onto their Windows XP machines and skip Vista entirely in favor of Windows 7.

That appears to be happening. A recent enterprise survey by Forrester Research Inc. showed that only 6.3% of enterprises were running Vista at the end of December, with most of the upgrades coming at the expense of aging machines running Windows 2000, not XP. The vast majority of the 100 million copies of Vista that Microsoft has sold so far have gone to individuals and small businesses purchasing new PCs.

The least-loved version of Windows has long been Windows Millennium Edition, a buggy minor upgrade that was superseded by XP within a year of its release. Despite its far greater -- some would say, too great -- technical ambition, Vista may end up lumped together with ME as one of the blips on Windows' long-term road map.

Friday, May 16, 2008

Six steps to a faster broadband connection

How to test your speed, troubleshoot any problems and tweak your system for optimum performance
If you're serious about the Internet, chances are you spend anywhere from $30 to $99 per month for a broadband Internet connection. But regardless of how much you pay, are you getting all the speed that your ISP promised you? And does your connection persist reliably without dropping out frequently or requiring modem reboots? With our quick guide, you can squeeze every last kilobit-per-second (kbit/sec.) of throughput out of your broadband modem and keep your connection running smoothly.

1. Test Your Connection Speed
Before you start tweaking, get a baseline reading of your downstream and upstream connection speeds at Speedtest.net. If possible, measure the speeds at different times of day, especially during the hours when you use the connection most frequently, and at least once after midnight or 1:00 a.m. (when competition for bandwidth is likely to be at its lowest level).

2. Update Your Firmware or Get a New Modem
If your cable or DSL modem is more than a couple of years old, ask your Internet service provider for a new one. The exchange will probably be free; and if there is a fee, you can usually waive it by agreeing to a new one-year contract. The latest cable modems meet the DOCSIS 2.0 (Data Over Cable Service Interface Specification) standard. If you have a 1.1 modem and a high-throughput plan, you'll likely experience a large speed increase just by swapping modems.
Even with a brand-new modem, make sure that you have the latest firmware installed. I upgraded my two-year-old Efficient Networks 5100b DSL modem from firmware version 1.0.0.39 to 1.0.0.53, and immediately saw my Speedtest throughput increase from 5.3 mbit/sec. to 5.9 mbit/sec., just a hair below the 6 mbit/sec. that I'm paying for. Cable providers such as Comcast usually push new firmware to modems, so there's no need for most cable modem users to perform upgrades themselves.
To update your DSL modem, you'll have to connect to its Web interface, which means that you'll need to know the IP address of the modem on your local network. This information should be in your user manual; alternatively, you can find default settings for most modems on the Internet. The address will probably look something like 192.168.100.1 or 192.168.0.1. Enter this character string into your browser, and the Web interface should come up. You'll likely have to sign in, using either a security code printed on the bottom of the modem or a default username and password (unless you previously changed it). Write down the log-in information for future reference.
Once you've logged in, check the firmware number on the status page, and see whether a newer version of the firmware is available on the manufacturer's site. If it is, download this more recent firmware to your PC, and then find and run the firmware update procedure from the modem's browser utility. Reboot, rerun Speedtest, and see whether your data is traveling faster. Besides boosting transfer speeds, using a new modem or updated firmware can solve a host of nagging connection issues, such as intermittent dropouts.
3. Check Your Modem Parameters
While you're updating the firmware, check some key parameters. First, the maximum allowed speeds (both downstream and up) should match your service plan. If they don't, your ISP didn't set your service up properly. Give your ISP a call and ask it to fix the setup remotely.
Second, look for signal-to-noise ratio (or SN margin) and line attenuation, both measured in decibels (dB). The lower the signal-to-noise ratio, the more interference you have, and the greater the number of packets that will need to be re-sent because they didn't come through the first time. For this reason, a noisy line can dramatically cut throughput. Line attenuation measures the drop in voltage that comes with splitting the signal (especially for cable modems) and with long runs of cable or older wiring. Excessive signal loss will cause a drop in throughput.
For DSL modems, anything above about 50 dB for line attenuation is poor, and 20 to 30 dB is excellent. For signal-to-noise ratio, 7 to 10 dB is marginal, and 20 to 28 dB is excellent. My modem's SN margin registered at 12.5 dB, barely reaching the good range, and its line attenuation reading was 30.5 dB, which rates as very good. Note that acceptable ranges may vary depending on your service level and modem type (faster connections need to be cleaner), so check with your cable or DSL provider to see what numbers you should look for.

4. Troubleshooting Line Quality
If your off-peak Speedtest numbers didn't measure up to your plan's specifications, and if you found poor signal-to-noise or line attenuation numbers, it's time to troubleshoot your wiring. Excessive noise may cause intermittent dropouts, too.
Your first task is to determine whether the signal is already degraded when it reaches your house or whether your own wiring is at fault. To test this, move your cable modem as close as you can to where the wire first splits. If possible, take a laptop and power cord for your modem outside to the junction where it connects to the house. Retest and see if things improve. If they don't, call your cable company. If your own wiring looks to be at fault, reduce the number of splits that occur before the wiring reaches your modem, and/or replace the wire itself, which may be faulty. The ultimate solution for cable modems is to create a split directly after the junction box, and then run a clean new cable directly to your modem, using the other split for all of your TVs (which are less affected by noise).
For DSL modems, noisy inside wiring tends to be due to the other phone equipment on your line. This interference is supposed to be controlled by the filters placed between the wall jack and each device. Make sure that they are all in place. If you still have too much noise, the best solution is to install a "DSL/POTS splitter" immediately after the phone box, where the wiring comes into the house, and then run a dedicated "homerun" wire straight to the modem. This arrangement will completely isolate your modem from the regular phone wiring--and the new wire should help too. If you don't want to do this job yourself, you can ask your cable or phone company to perform both tasks for a fee.
Finally, improper grounding can be a source of noise, especially on cable. Make sure that all of your TV equipment is plugged into properly grounded outlets, with polarized plugs oriented in the right direction, and without any three-prong-to-two-prong adapters. If you have an electric outlet tester, use it to check for excess voltage on your cable wiring. An electrician can find and fix any grounding problems, which are safety concerns as well.
5. Optimize Software Settings
Now that your cable or DSL line is as clean as you can make it, you're ready to tweak your system and applications for maximum performance, too. For optimizing network performance parameters in Windows XP or Vista, we like TotalIdea Software's Tweak-XP Pro Premium and TweakVI Premium. Both programs simplify optimization without requiring you to understand Registry editing or hidden Windows settings. Both packages include dozens of tweaks in addition to network and browser adjustments. The Pro version of Network Magic, an excellent network monitoring utility, includes optimization capabilities as well.
System-level optimization is less important in Vista than in XP, since Vista tunes your TCP stack dynamically. In fact, Vista users can probably get away with just optimizing specific applications, especially their browsers. To speed up Firefox page displays, try Firetune or Fasterfox. Both are free and one-click easy. Fasterfox adds a few more customization options for expert users. Both tweak low-level Firefox settings such as cache memory capacity, maximum simultaneous connections, and "pipelining" (performing multiple data requests simultaneously)
6. Accelerate Your Downloads
Frequent downloaders can save huge amounts of time by using a download manager like our favorite, FlashGet. FlashGet creates multiple simultaneous download links, and then puts the file together afterward. All you do is click or drag download links to the FlashGet window; the program does the rest. It integrates with Internet Explorer and Firefox using a companion utility called FlashGot.

Thursday, May 15, 2008

10 broken technology ideas -- and how to fix them

Here are 10 high-tech ideas that sound good but don't work out so well in practice
Sometimes a technology idea is too good to be true. A flexible keyboard, Internet voting and watching feature films on your smart phone are examples. Today, these concepts are still evolving, but they're broken right now. I'll tell you why and what could be done to fix them once and for all.

1. Ultracompact PCs
Call them whatever you want: ultramobile PCs (UMPC), mobile information devices (MID) or subnotebooks. I call them small PCs, and they are almost indistinguishable from a good smart phone. For example, the BlackBerry 8820, with its built-in GPS capability and excellent e-mail client, is a better device than the Samsung Q1 Ultra, described by the company as an "ultramobile personal computer." The only real difference is that you squint less with the Q1. But most people don't use a Q1 for gaming or writing long business documents. As Jon Stewart pointed out at the Oscars, small-screen video is not fun on a device such as the iPhone.The Apple iPhone is a smarter, sexier, more useable computer than just about any MID, such as the new Toshiba prototype. Meanwhile, there's more power in the OQO, than a regular UMPC, but the screen is just as tiny. I figure that in less than three years, Apple will release a successor to the iPhone that works more like a Mac and will become the first company to make a true pocket computer -- one that runs any Mac OS X application natively, with a mini-DVI port.

2. Satellite Internet
My main problem with satellite Internet providers is their fair use policies, which penalize users who download too much by throttling their speed back to almost nothing, and then slowly adding more speed over a 24 hour period. Both WildBlue and HughesNet do this, and they claim it helps all users. However, the Internet is not just for e-mail and simple browsing anymore, it's a pipeline for television, network back-ups, remote access and a myriad of other activities -- not to mention Web apps and streaming media. Other ISPs -- such as Charter Communications and Qwest-- don't throttle your speed at all. Others, such as Comcast, may use "network management" techniques such as throttling BitTorrent traffic, but they aren't as aggressive as the satellite providers.
Another issue is that the stationary modem that you need for satellite Internet is a bulky device and uses coaxial cable that most people need a technician to install. Also, the required antenna is bigger than a wheel rim, but there's no reason it couldn't be reduced to a size that works with your laptop. Yet I like the satellite concept because it could make the Internet much more ubiquitous across large swathes of the U.S. Satellite Internet has slowly increased in speed, starting out at only 512Kbit/sec. and currently at about 1.5Mbit/sec. If the technology and speed improve, it could be a solid option.
3. Contact managers
I'd like to retrieve the lost hours spent building up a contacts database. Not long ago, I stopped meticulously entering names, addresses, phone numbers and e-mails and now rely on other methods. For example, I search Gmail.com for names and addresses. When I want to send a new e-mail, I just type a portion of a name to get the full address, type the message, and send.
For names not in my Gmail archive, I use an online address book such as YellowPages.com or LinkedIn.com. However, a good contact manager could work like the iPhone: It would see phone number in an e-mail and allow me to right-click and add the name and phone number to a database automatically within Gmail. The database would be smart enough to know if a phone number already matches an existing name, and it would weed out duplicates automatically. I'd never have to type in contacts, because this "auto-database" would work as easily as a mobile phone, support any e-mail client and work in the background. Some contact managers come close -- such as Now Up-to-Date & Contact -- but it still involves a manual process.

4. Digital streaming adapters
They have names like Apple TV, Netgear Digital Entertainer and Sonos, but they all do the same thing: move music, video and photos from your PC in the office to the HDTV in your family room. They are supposed to solve a persistent dilemma: a PC just doesn't work with a television. A keyboard and mouse are meant for a desk, not a sofa. These adapters add another appliance to an overcrowded entertainment center bulging with DVRs and game consoles. Putting the digital media adapter in the TV, like this MediaSmart TV, makes sense -- less clutter in your entertainment room.

The fix? Put them right into the television itself. Hewlett-Packard Co. started this with the MediaSmart TV, but I'd like to see it as a standard feature that is more open -- not just based on Windows Media Extender, but supporting any media format over Wi-Fi.
5. Video on a phone
A phone screen is too small for video, and even the iPod Touch can cause eye strain when you watch a two-hour feature film. I'm convinced that anything you only do once or twice in dealing with new technology and find it hard to do -- like load a smart phone with video clips or swap contacts with your laptop over Bluetooth -- is just a novelty and often not worth the effort. I will likely never do it again; it's not worth the time. Even the iPhone is a poor movie viewer unless you are desperate for a Jason Bourne flick on the bus. But solid-state memory is finally getting cheaper, and it makes sense to load up a mobile device with movies.

What I'd like to see is Bluetooth built into HDTVs so that I can beam a high-resolution movie from my phone or projector in the phone (like the Pico technology being developed by Texas Instruments Inc.) or a mini-DVI port.

6. Web 2.0
For the past two years, the promise of the Semantic Web -- a concept where the Web is smarter and lets you tag information for better searchability -- has reached a crescendo that is finally coming down to earth. I believe there is no clear definition of Web 2.0 or any sites that fit easily into that box. Instead, Web 1.0 is in a constant state of evolution. Imagine Amazon.com in its infancy -- over the past 10 years, it has been updated with hundreds of new features as Web technology has steadily advanced. Web aggregators like Pageflakes point to a day when HTML may be replaced by something much more powerful.

What I'm hoping for is a whole new framework for the Web: a wholesale HTML replacement, something like AJAX (Asynchronous JavaScript and XML) that's faster and more reliable. Or, I'd like to see sites like Pageflakes expand even more so that Web 2.0 dies altogether and gives way to Internet widgets running on a true Internet operating system.

7. Electronic books
A promising technology, or a snake-oil sales pitch? E-books like the Amazon Kindle and Sony eReader could eventually reduce our reliance on paper books. I must admit the crisp 120DPI screens look remarkably like printed material. In some ways, the Web is a gigantic e-book with an endless amount of information -- even if some of it is unreliable (see Wikipedia.org). Yet, nothing beats a printed book: you can find your place instantly with a dog-ear, it's practically disposable, you can loan it to anyone, and it causes very little eye strain. Yes, you can load one of 90,000 books on the Kindle and check your e-mail in between chapters of the latest Stephen King novel. But before an e-book reader becomes a major hit with consumers, it must cost about the same as a real book. I'd like a throwaway e-book that's a plastic sheet with electronic ink (like the newspapers in Minority Report) and costs about $30.

8. Internet voting
I like the idea of Internet voting because the easier you make the process, the more people who will vote. Right now, the concept is in a preliminary stage because fingerprint readers or some other form of biometrics hasn't become ubiquitous or foolproof. I have noticed that just about every enterprise laptop has a fingerprint reader. In the same way that Hollywood studios don't trust the Internet for delivering movies unless they are crippled with digital rights management, voting also needs some extra precautions to ward off fraud. The idea will finally work once all displays are multitouch (which might be sooner than we think), facial recognition is common and secure, and there is some way of encrypting the connection to assuage any doubts.

9. Video blogs
My main issue with video blogs is that they don't seem well suited for the Web. I'd watch "Rocketboom", "Mahalo Daily" and "WebbAlert" every day if I had the time. Often, with WebbAlert, I scan through the links -- it usually has a really good summary of the previous day and posts in my RSS reader before just about anyone else -- instead of watching the video blog. The Web is made for instant information (see Facebook, Wikipedia, etc.), and I have a hard time discerning how a video blog is really that different from a 2-minute update on G4 or CNN. Yes, there's the idea that a video blog has a "long tail" -- there can be a video blog for just about any taste, how to do underwater yoga, stuff that would never make it on a mainstream channel -- suited for any taste, but the farther you go out on the tail, the lower its quality seems to be. Where is this all going? I'd like to see satellite television providers like Dish Network and DirecTV offer more-flexible plans. I'd watch a video blog station for 10 minutes if it could hold my attention over breakfast and The Wall Street Journal.

10. Flexible keyboards
Flexible, foldable keyboards like the Brando or the Eleksen ElekTex sound like a good replacement for a standard keyboard and could help mobile users type faster when traveling with smart phones. Sure, they are mobile and new, but typing on a fabric keyboard like this Eleksen model is a real pain. In practice, it's almost impossible to type fast on these roll-away models. Is there a way to improve on a standard keyboard? Microsoft and Logitech International keep trying, adding extra buttons and features. (I have settled on the Microsoft Wireless Laser Keyboard 6000 V2 with its slight key curvature.)

I doubt we will be typing on multitouch screens any faster, judging by my speed on the iPhone. Speech recognition, even if it understood every word perfectly, still makes it hard to edit your mistakes. The Laser Keyboard is hinting at a true evolution: Eventually, all keyboards will become more tactile, with more responsive keys, a more ergonomic feel -- and someone may figure out how to make them fold up. Have I missed any technologies, or do you disagree with any of my choices? Let me know in the comments section at the end of this article.

The 10 most important technologies you never think about

You couldn't get through your day without them
The late science fiction author Arthur C. Clarke famously said that "any sufficiently advanced technology is indistinguishable from magic."

We certainly live in a magical world. We're surrounded by technology, yet we seldom stop to consider the amazing advances that we've come to rely on every day. Whether we're surfing the Web, making a call on our mobile phones or watching a DVD movie on our big-screen TVs, we take our modern conveniences for granted.

Here, then, is a peek inside the magician's hat at 10 technologies that are keys to our digital age. Without realizing it, you've probably used at least one -- if not all -- of them already today. But whether you're aware of them or not, without these technologies our world would be a very different place.

Unicode

We use computers for every kind of communication, from instant messaging to e-mail to writing the great American novel. The trouble is, computers don't speak our language. They're all digital; before they can store or process text, every letter, symbol and punctuation mark must first be translated into numbers. So which numbers do we use? Early PCs relied on a code called ASCII, which took care of most of the characters used in Western European languages. But that's not enough in the era of the World Wide Web. What about Cyrillic, Hindi or Thai?
Enter Unicode, the Rosetta Stone of computing. The Unicode standard defines a unique number for every letter, symbol or glyph in more than 30 written languages, and it's still growing. At nearly 1,500 pages and counting, it's incredibly complex, but it's been gaining traction ever since Microsoft Corp. adopted it as the internal encoding for the Windows NT family of operating systems.

Most of us will never need to know which characters map to which Unicode numbers, but modern computing could scarcely do without Unicode. In fact, it's what's letting you read this article in your Web browser, right now.

Digital signal processing

Digital music, digital photos, digital videos -- it's easy to forget that we live in a fundamentally analog world. Computers can cope with all that we see and hear only through the application of highly complex mathematics, a field known as digital signal processing (DSP). Wherever you find digital media, DSP is at work, facilitated by a whole subcategory of specialized chips and circuits. DSP algorithms correct for errors while your optical drive reads the music off a CD. They're at work again as you compress the audio into an MP3 file, and again when you play it back through your surround-sound speakers.

DSP is to digital media as gears and springs are to a pocket watch. It works its magic below the surface: invisible, yet totally essential. It's safe to say that without it, virtually none of the digital technologies that we take for granted today -- from DVDs to mobile phones, ink-jet printers to DSL broadband -- would be possible.

Managed code

Programming is a lot more complicated than it used to be. Modern operating systems are like onions, with layers upon layers of subsystems to interconnect and manage. Worse, bugs and unnoticed security flaws, even ones that may have once seemed trivial, can be serious threats in the Net-connected era.For a growing number of developers, the solution is to use platforms designed to relieve some of the burden. Programs written for such managed-code environments as Java and Microsoft's .Net don't run on the bare hardware the way traditional programs do. Instead, a virtual machine acts as an intermediary between the software and the system. It's like a robot nanny for computer programs, silently taking care of memory management and other housekeeping drudgery while keeping an eye out for potential security violations before they happen.

To an end user, a managed-code program may seem no different than a traditional one, but software that runs in a virtual machine makes for a more reliable, stable and secure computing experience. And with .Net rapidly becoming the preferred platform for Windows development, managed code may soon be the norm, rather than the exception.

Transistors

Later this year, Intel Corp. plans to unveil the world's first integrated circuit to contain 2 billion transistors. Moore's Law says that the number of transistors we can put into integrated circuits will double approximately every two years. That's a lot of transistors -- but what do they all do?Simply put, the transistor may well be the greatest invention of the 20th century. It's really nothing more than a voltage-controlled switch, but that humble description hides incredible power. Linked together in various ways, transistors can form circuits that are the basis of every type of digital logic, right up to the CPUs that power our modern PCs and servers.

What makes today's chips so powerful is the industry's ability to cram components ever closer together. The transistors on the processor inside your PC might be only about 100 atoms across, and improvements in manufacturing technology will keep them shrinking -- at least, for the time being. Someday, optical chips or even quantum processors may replace current chip designs and outperform them many times over. For now, we'll have to content ourselves with continuing to improve upon an oft-ignored technology that has served us for 50 years and counting.

XML

Though you may never have encountered it directly, XML is everywhere. Now in its tenth year, it has become virtually the lingua franca of data exchange. XML stands for "extensible markup language" -- extensible because developers can add to it to suit the needs of particular applications. But what makes it really valuable is the fact that it's a language, much like HTML. Unlike some data formats, XML files aren't just streams of incomprehensible numbers. XML is designed to be read by humans as well as machines. A developer who "speaks XML" can look at a document written in an unfamiliar XML dialect and still understand what it's trying to say.

This powerful combination of features makes XML incredibly useful for all kinds of applications. But perhaps its biggest coup was Microsoft's decision to switch to XML-based file formats for Office 2007. As it turns out, you actually may have XML documents sitting on your desktop right now, without realizing it.

Nonvolatile RAM

Isn't it strange? Your pockets stay the same size, yet you can carry more and more in them every year. In 1956, IBM's first hard drives used disks that were 2 feet wide. It's hard to believe that today's microscale drives use essentially the same technology. Incremental advances, such as the discovery of giant magnetoresistance and the invention of perpendicular recording heads, have produced staggering results. Between 1990 and 2005, magnetic hard drives increased their storage capacity a thousandfold, putting even Moore's Law to shame.

But even with those astounding improvements, hard drives hit a wall when it came to portable devices. They were still too big and too fragile for many gadgets. Enter solid-state drives based on nonvolatile RAM. The technology has been used for storage since the 1970s, but it remained phenomenally expensive until manufacturing processes caught up with the demand. Now it is everywhere -- in MP3 players like the newest Creative Zen and in digital cameras, cell phones and even some laptops.

Manufacturers aren't sitting still; cutting-edge technologies such as "racetrack memory" could lead to solid-state storage that is smaller, faster and more reliable than ever.

Lithium-ion batteries

When we were kids, our toys came "batteries not included." With our grown-up, high-tech toys, on the other hand, the battery is often one of the most important features. As essential as mobility has become to how we use technology, it simply wouldn't be possible if our choices were still limited to D, C and AA. The invention of lithium-ion batteries was the key. The earliest rechargeables were made with lead -- hardly a prescription for portability. But because lithium is the lightest metal, lithium-based batteries can store more energy at a given weight than any other variety. Lighter batteries mean smaller, lighter devices; beginning in the 1990s, you could actually put a phone in your pocket.

Running time remains an ongoing challenge, but researchers have no shortage of solutions. In addition to improved lithium-ion batteries that use nanotechnology, a number of battery alternatives are slowly coming to market, including ultracapacitors and fuel cells. In fact, pardon me for saying that battery technology is poised for its next big explosion -- and personal technology is sure to advance because of it.

Voice over IP

You've made a few Skype calls, and you've looked into digital phone service from your broadband provider, but that's as close as you've gotten to voice-over-IP (VoIP) technology. Or so you think. In truth, VoIP is revolutionizing the telecommunications industry, blurring the lines between voice calls and digital networks. Those prepaid calling cards that offer rock-bottom international rates? VoIP makes them possible. Similarly, a growing number of businesses use VoIP behind the scenes to eliminate long-distance charges between branch offices.

Routing calls over the Internet circumvents traditional telephone company charges, and fewer fees and taxes mean lower prices. Digital calls are easier to direct and manage, which makes them attractive even to traditional telephone companies. Don't be surprised if soon the land line you've lived with forever is replaced by an all-digital alternative -- though you'll likely be none the wiser.

Graphics acceleration

Thought your fancy video card was only good for gaming? Think again. Its graphics processing unit (GPU) is really like a second, highly specialized CPU. When it comes to certain kinds of complex math, its performance puts your desktop CPU to shame. Until recently, all that power went to waste when you weren't chalking up frags. But computer scientists are finding novel ways to use GPU acceleration to speed up applications off-screen, as well. For example, a Stanford University project -- which uses many PCs around the world acting together as a supercomputer to assist protein-folding-related disease research -- can offload calculations to the GPU to multiply its performance many times.

Because the kind of calculations used to draw 3-D graphics are also applicable to many other problems, GPU acceleration is potentially useful for a wide variety of applications, from math-intensive science and engineering to complex database queries. Newer, even more complex chips -- such as nVidia Corp.'s Aegia physics engine -- can do even more. No wonder nVidia has begun working on chips for the workstation market.

Increasingly, your PC's performance won't depend on the speed of any single chip. As Advanced Micro Devices Inc. and Intel get into the game, expect future desktop CPUs to incorporate CPU and GPU capabilities into a single, multicore package, bringing the best of both worlds to gamers and nongamers alike.

High-speed Net access

Where would we be without fast Internet access? It's easy to forget that just 10 years ago, most of us were still using ordinary modems. The broadband revolution ushered in streaming video, MP3 downloads, Internet phone calls and multiplayer online gaming. And we owe it all to TV. In the 1980s, cable companies were promising 500 channels of round-the-clock programming. Cable was poised to become the most important wire into the house, but the telephone companies had an ace up their sleeve. A new technology could push high-frequency signals over ordinary phone lines, which previously had been good only for low-bandwidth voice calls. The telephone companies saw this as an opportunity to offer video on demand and to compete with the cable companies at their own game.

Or so they thought. The plans of the telcos for video on demand dried up by the mid-1990s, but the technology remained. Now called Digital Subscriber Line, it had morphed into a high-speed household on-ramp to the Internet. The cable companies followed suit with a comparable technology, and the broadband speed race -- for both DSL and cable -- began in earnest. Both cable and DSL still use traditional frequency signaling over copper wires, but new breakthroughs are poised to go mainstream. Fiber to the premises (FTTP) promises lightning-fast network speeds, and WiMax will push broadband into territories that wires can't reach today. As for what applications this next broadband revolution will bring -- well, we have only begun to imagine.