Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Thursday, 25 April 2013

Partial Lunar eclipse to be visible on thursday night


The first of the three lunar eclipses of the year will occur on Thursday, giving astro enthusiasts all over the country an opportunity to witness the celestial event.

A tiny sliver of the Moon will be covered by the Earth's umbral shadow at maximum of the partial lunar eclipse, N Sri Raghunandan Kumar of Planetary Society of India said.

This is the third shortest partial eclipse of the Moon for the 21st century, lasting just 27 minutes.

According to NASA, the shortest partial lunar eclipse of the 21st century will be on February 13, 2082, lasting only 25.5 minutes.

NASA data also indicates that on September 28, 2034, the second shortest partial eclipse will last for 26.7 minutes. The April 25-26, 2013, partial lunar eclipse will last for 27 minutes, making it the third shortest lunar eclipse of this century.

The lunar eclipse in various phases will begin at 11.32 pm tomorrow night and end at 03.43 am on April 26.

The noticeable Umbra phase will begin at 1.22 am and end at 1.53 am. Middle of eclipse, or when it is maximum, will occur at 1.37 am, he said.

The eclipse will be visible in the region covering Australia, Asia (except N.E. part), Africa, Europe and Antarctica, Kumar said.

This year, a total of five eclipses, three lunar and two annular, will occur.

Unlike an eclipse of the sun, star gazers do not need protective eye equipment to observe a lunar eclipse, he said.

Wednesday, 24 April 2013

7-inch phablet with 3G powered by Asus


Aiming to tap the Indian tablet and smartphone market, notebook maker Asus today launched a 7-inch phablet called Fonepad running on Android 4.1 platform with 3G connectivity and powered by an Intel processor.

Phablet are a class of smartphones with screen sizes ranging from 5-8 inches and designed to combine functions of a phone and tablet.

"By incorporating 3G mobile data connectivity with full telephony support, Asus Fonepad is the prefect combination of a tablet and phone in a single device," Asus India Regional Director South Asia and Country Manager System Business Group Peter Chang said here.

Powered by an Intel Atom processor Z2420, Fonepad comes in a sleek metallic design weighing 340 grams and has a slim 10.4 mm profile. Besides, it has 8 GB internal memory and comes with a microSD slot for up to 32 GB additional storage.

The phablet has up to nine hours of battery life, Chang claimed, adding that it has a 1.2 mega pixel front camera and a 3 mega pixel rear camera with 720p HD video recording.

Fonepad also sports ASUS SonicMaster audio technology with MaxxAudio 3 processing audio technology for clear sound quality, he said.

"Fonepad has been competitively priced at Rs 15,999 and it will be available from next week," Chang added.

Speaking at the launch, Intel South Asia Managing Director (Sales and Marketing) Debjani Ghosh said Fonepad is a great example of bringing to the market an innovative product that addresses the emerging market with a large screen size in a mobile device that runs fast with responsive applications.

"We will significantly increase the urgency to introduce a range of innovative and differentiated offerings that will shape the future of this segment. India will be 50 per cent market for phablets in the APAC (Asia Pacific) region in the coming time," she added.

Beware of internet virus that steals bankaccount and password



NEW DELHI: A new virus has been found to be "spreading widely" in the Indian cyberspace which cleverly steals bank account details and passwords of the user once it is clicked. 

Country's cyber security sleuths have alerted Internet users in the country about the new and suspected variant of malware family called 'Win32/Ramnit'. 

"Ramnit worm spreads by infecting or modifying files existing on target systems such as (EXE, dll or html) and creating a new section so as to modify the entry point to that section," an advisory issued by country's premier cyber security agency -- Computer Emergency Response Team-India (CERT-In) -- said. 

The malware, the advisory states, "steals credentials like file transfer protocol passwords, bank account logins, infects removable media, changes browser settings and downloads and executes arbitrary files". 

The virus is so deadly and potent, cyber sleuths say, that it has ability to hide itself from anti-virus solutions and acquires various aliases to attack a genuine system or Internet-based connection which works to play emails and other user services. 

The virus is such lethal in its operations that it "infects the removable media by copying itself to its recycle bin and creates an autorun.inf file," the advisory said. 

Once the system is infected, the malware injects its code into windows executables, html files or dlls to communicate with its command and control server, thereby compromising the security of the online system. 

The agency has also advised some counter measures in this regard. 

The combat steps against this virus stipulate that users should not download and open attachments in emails received from untrusted users or unexpectedly received from trusted users, one should exercise caution while visiting links to web pages and users should not visit untrusted websites. 

"Enable firewall at desktop and gateway level and disable ports that are not required, avoid downloading pirated software, keep up-to-date patches and fixes on the operating system and application softwares and keep up-to-date anti-virus and anti-spyware signatures at desktop and gateway level," the advisory stated.

TCS,Infosys and Wipro accused of abusing H-1B system



WASHINGTON:Amidst Congressional debate on the comprehensive immigration reform, a top US Senator has accused big Indian IT companies - TCS, Infosys and Wipro - of abusing the H-1B visa system.

"There are some specific abuses of H-1B," Senator Richard Durbin, said during a Congressional hearing on immigration reform by the powerful Senate Judiciary Committee on Monday, during which the lawmakers discussed threadbare the H-1B visa issues.

In fact, Senator Durbin went on to brand the top Indian IT companies as outsourcing firms.

"These outsourcing firms like Infosys, Wipro, Tata and others -- Americans would be shocked to know that the H-1B visas are not going to Microsoft; they're going to these firms, largely in India, who are finding workers, engineers, who will work at low wages in the US for three years and pay a fee to Infosys or these companies," Durbin alleged.

"I think that is an abuse of what we're trying to achieve here. Most people would think, well, Microsoft needs these folks, and they'd be shocked to know that most of the H-1B visas are not going to companies like yours; they're going to these outsourcing companies," Durbin alleged.

He said this during the hearing in which two Indian Americans testified before the committee and supported the allegations of the Senator against Indian IT firms.

Brad Smith, general counsel and executive vice president, legal and corporate affairs, Microsoft, too supported the Senator on the issue.

"I personally think it's important that we both recognise the need for these firms to evolve their business model -- I've had these conversations myself with them in India -- that encourages them to focus on hiring more people in the US," he told lawmakers in response to a question.

The proposed comprehensive immigration bill if passed by the Congress and signed into law by the US President would bar companies from hiring people on H-1B visa if 50 per cent of their employees are not Americans.

The US India Business Council and Confederation of Indian Industry have opposed such a move and said that this is against the spirit of India US strategic relationship.

Tuesday, 23 April 2013

Apple profits falls for first time in nearly a decade


Apple Inc, the iphone maker, reported that its quarterly profit had dipped for the first time in nearly a decade despite a rise in revenue from the same period a year earlier.
Apple posted a profit of USD 9.5 billion on revenue of USD 43.6 billion in the first three months of this year, compared to a profit of USD 11.6 billion on USD 39.2 billion in the same quarter in 2012.

"We are pleased to report record March quarter revenue thanks to continued strong performance of iPhone and iPad," said Apple chief executive Tim Cook yesterday.
Apple also announced that its board of directors has endorsed a plan to more than double to USD 100 billion the amount of its stock it will buy back in the coming three years.
The board also approved a move to raise a coming stock dividend by 15 per cent to USD 3.05 per common share as the company worked to restore shareholder confidence.
"We are very fortunate to be in a position to more than double the size of the capital return program we announced last year," Cook said.
"We believe so strongly that repurchasing our shares represents an attractive use of our capital that we have dedicated the vast majority of the increase in our capital return program to share repurchases.
Apple shares jumped 5.5 per cent to USD 428.30 after the results were released.

BlackBerry Q10 to be available May 1 in Canada



TORONTO:BlackBerry expects a new version of the phone with a physical keyboard will be available in the US by the end of May. 
The company said on Tuesday that all four major US carriers will carry the Q10. It is available May 1 in Canada. 


A delay in selling the new keyboard BlackBerry has complicated the manufacturer's efforts to hang on to customers attracted by Apple's iPhone and devices running Google's Android system. The BlackBerry has fallen behind rivals, but many users have stayed loyal because they prefer a physical keyboard over the touch screen on the iPhone and most Android devices. Temptations to switch grow with each delay, despite favorable reviews for the new BlackBerry 10. The touchscreen Z10 launched in the US last month.

Three smartphone satellites in to Space successfully


Washington: NASA has successfully launched three smartphones into space to snap images of the Earth, and the handsets may prove to be the cheapest satellites ever flown into space.



Each smartphone is housed in a standard cubesat structure, measuring about 4 inches square. The smartphone acts as the satellite's onboard computer. Its sensors are used for attitude determination and its camera for Earth observation.



The smartphones destined to become low-cost satellites rode to space on Sunday aboard the maiden flight of Orbital Science Corporation's Antares rocket from NASA's Wallops Island Flight Facility in Virginia.



The trio of "PhoneSats" is operating in orbit, and may prove to be the lowest-cost satellites ever flown in space.



The goal of NASA's PhoneSat mission is to determine whether a consumer-grade smartphone can be used as the main flight avionics of a capable, yet very inexpensive, satellite.



Transmissions from all three PhoneSats have been received at multiple ground stations on Earth, indicating they are operating normally.



The PhoneSat team at the Ames Research Center in Moffett Field, California, will continue to monitor the satellites in the coming days. The satellites are expected to remain in orbit for as long as two weeks.



"Smartphones offer a wealth of potential capabilities for flying small, low-cost, powerful satellites for atmospheric or Earth science, communications, or other space-born applications," said Michael Gazarik, NASA's associate administrator for space technology.



They also may open space to a whole new generation of commercial, academic and citizen-space users," Gazarik said.



Satellites consisting mainly of the smartphones will send information about their health via radio back to Earth in an effort to demonstrate they can work as satellites in space. The spacecraft also will attempt to take pictures of Earth using their cameras.



Amateur radio operators around the world can participate in the mission by monitoring transmissions and retrieving image data from the three satellites.

NASA's off-the-shelf PhoneSats already have many of the systems needed for a satellite, including fast processors, versatile operating systems, multiple miniature sensors, high-resolution cameras, GPS receivers and several radios.


NASA engineers kept the total cost of the components for the three prototype satellites in the PhoneSat project between USD 3,500 and USD 7,000 by using primarily commercial hardware and keeping the design and mission objectives to a minimum.



The hardware for this mission is the Google-HTC Nexus One smartphone running the Android operating system.



NASA added items a satellite needs that the smartphones do not have - a larger, external lithium-ion battery bank and a more powerful radio for messages it sends from space. The smartphone's ability to send and receive calls and text messages has been disabled.

India to be global diesel engine hub for Honda


Kolkata: Honda Cars India Ltd will export diesel engine components to Asian and European markets from India, besides lining up three-four new models of cars with diesel engines to boost its sales.


“We will export diesel engine components to Europe and South East Asian markets from India. This fiscal, the target is Rs 500 crore against Rs 332 crore registered in 2012-13,“ Honda Cars India senior vice president, Jnaneswar Sen said here on Monday at the launch of its new sedan, Amaze, in the city.

Sen said the company remains optimistic about the success story of diesel cars. Though the decision to remove the subsidies on diesel by India took us by surprise but demand for diesel cars will continue, he said.

He said the four new models in compact SUV -seven seater multi-purpose vehicle, new Jazz and new City — expected to be launched in the next twothree years, may be introduced with 1.5 or 1.6 litre diesel engines along with petrol variant.

He did not wish to predict on the volatile car market, but said the capacity of the company in India will double to 2.4 lakh units with the new Rajasthan plant built at a cost of Rs 2,500 crore, which is expected to become operational by mid 2014.

Earlier, during the launch of Amaze in Hyderabad, Sen had said, “The government should create a level playing field for the auto industry in the country. The India-EU free trade agreement is going to remove that level playing field. Europe (automobile market) is not growing now. It is only de-growing.

It is very easy for some of them to sell the same cars here,” he said on the proposed India-EU free trade agreement.

Big 4 IT's


New Delhi: The country’s four top IT firms — TCS, Infosys, Wipro and HCL Technologies — have seen their combined cash chest swell to a whopping $8 billion (Rs 43,200 crore), even as the overall business trends remain sluggish for the entire sector.


While Tata Consultancy Services (TCS) and HCL Tech managed to post strong financial numbers for the quarter ended March 31, 2013, the results were mostly disappointing from Infosys and Wipro. However, all the four companies have maintained a strong cash balance as on March 31, 2013.

Tata group’s IT arm, N.  Chandrasekaran-led TCS closed the latest fiscal with total cash and cash equivalents of $1.24 billion with an increase of $100 million during the year ended March 31, 2013.

Its closest rival, S.D. Shibulal-led Infosys also saw its cash balance soar by $300 million to a humongous $4.34 billion at the end of fiscal year 2012-13.

Azim Premji-led Wipro, which posted slowest sequential growth in revenues in the quarter ended March 31 among the four companies, also managed to end the fiscal with cash and cash equivalents of $1.56 billion.

HCL Technologies, the country’s fourth largest IT firm, ended January-March quarter with cash and cash equivalents, (including deposits) of $762 million, a sharp rise from $398 million at the end of March, 2012.
TCS has posted annual revenue of more than `50,000 crore for 2012-13, as against about `39,000 crore of Infosys and Wipro’s `34,500 crore.

HCL Tech follows a financial year of July-June and its total income in the last fiscal ended July 30, 2012 stood at about `9,000 crore. In the quarter ended March 31, 2013 — the third quarter of the current fiscal 2012-13, it posted total income of over `3,000 crore.

Expessing their opinion on the trend, experts said that the top Indian companies need to make investments rather than protecting their cash hoard. One way is to invest in shifting the business model. Se-cond, Indian IT’s big four need to expand their presence in “intense geographies and markets” such as the United States and the United Kingdom.

They said, “IBM and Accenture led the change to value-added services after realising that without large Indian operations, they ran with the risk of losing large bases of business. Indian firms too need to face up to this reality, but they don’t see themselves in the same dire shape and therefore, psychologically, this shift is harder to make. The firms need to shift on their own before they are forced to do it.”

Monday, 22 April 2013

How to control tablet with your thoughts


A phone company is exploring ways to bring mind control to its mobile devices in hopes of allowing people with mobility impairments to communicate and function more easily in modern society.

But the ultimate goal of the brain-controlled computer project is to broaden the ways in which all people can interact with devices, researchers in the Samsung’s Emerging Technology Lab told MIT Technology Review.

The Samsung researchers are testing how people can use their thoughts to open an application, communicate a message, select a song from a playlist, or turn on or off a Samsung Galaxy Note 10.1.

The researchers are working on the new brain-controlled technology in ollaboration with Roozbeh Jafari, an assistant professor of electrical engineering at the University of Texas, Dallas.

The early-stage research, which utilizes a plastic cap covered with EEG-monitoring electrodes and a tablet device, shows how a brain-computer interface could help someone with mobility issues complete tasks that otherwise could not be done.

In using EEG-detected brain signals to control the interface, the researchers monitored typical brain activity patterns that occur when people are shown repetitive visual patterns. 

The Samsung and UT Dallas researchers found that people could launch an application and make selections within it by concentrating on an icon that was blinking at a distinctive frequency.

Discovering new ways to interact with mobile devices has been a driving force behind the project, Insoo Kim, Samsung’s lead researcher, told Technology Review.

Friday, 1 March 2013

Generator Powered By Human Urine

Here is an innovative idea put forth by a group of teenage engineers from Nigeria. A new generator has been developed by four students that is powered by human urine. Hydrogen gas is separated from human urine through electrolysis process that generates power. Working of generator with the help of human urine can be considered as the cheapest and an always available energy resource.

By 2050 th Year:There might be a Japanese elevator to space


Decades ago, people only dreamed about traveling to space. Then they only dreamt about landing on the moon. Both of these became reality though. And then humans built a space station. So it would make sense that things that we can only dream about today will someday be real. One such thing is an elevator to space. Sound crazy? The Japanese are currently working to create just that. More specifically, Obayashi Corp is hoping to build an elevator to space by 2050.

The contraption would carry passengers to space at 124 mph and deliver them to a space station 22,000 miles above the earth. This trip would take a little longer than a week to complete. A cable would be anchored on earth and stretch to an altitude of 60,000 miles above earth (about halfway to the moon). At the end of the cable would be a counterweight that would anchor the cable in space. Will this ever happen? Will people travel to space like they currently travel to the top of a skyscraper? Only time will tell.

Thursday, 28 February 2013

TOP 10 TIPS to keep your Password Secure

Rarely does a week go by without news of another hacking incident, whether it's Chinese hackers accused of breaking in to The New York Times' computer systems or Burger King finding its Twitter account taken over by pranksters.

Security threats aren't new and have long been part of online life. But the increased attention on them makes now a good time to review ways you can protect yourself. If nothing here feels new, that's good, as it means you've been doing the things you need to do to keep your accounts safe from hackers. Although there's no way to completely eliminate threats, minimizing them will go a long way.

One of the best things you can do is to make sure your password is strong.
Ways in which you can keep your password strong to ward off that initial intrusion.
Top 10 must-know tips on how to keep your passwords strong and secure
AP Photo

If someone's able to guess the password to your email or Facebook account, that person can post or send embarrassing things on your behalf. Someone was able to access Burger King's Twitter account recently and changed its profile picture to a McDonald's logo. If a banking or Amazon account is involved, someone could pay bills or buy iPads under your name - with your money.

What's worse, getting a password to one account is often a stepping stone to a more serious breach. Someone can use your email or Facebook account to send spam and scam messages to your friends, for instance. And because many services let you reset your password by sending an email to your address on file, someone with access to your email account can reset passwords and gain access to all sorts of things. If the compromised password is one you use for work, someone can snoop around for files on your employer's network with trade secrets or customers' credit card numbers.

Here are ways you can keep your password strong to ward off that initial intrusion:

1. Make your password long. The recommended minimum is eight characters, but 14 is better and 25 is even better than that. Some services have character limits on passwords, though.

2. Use combinations of letters and numbers, upper and lower case and symbols such as the exclamation mark. Some services won't let you do all of that, but try to vary it as much as you can. "PaSsWoRd!43" is far better than "password43."

3. Avoid words that are in dictionaries, even if you add numbers and symbols. There are programs that can crack passwords by going through databases of known words. One trick is to add numbers in the middle of a word - as in "pas123swor456d" instead of "password123456." Another is to think of a sentence and use just the first letter of each word - as in "tqbfjotld" for "the quick brown fox jumps over the lazy dog."

4. Substitute characters. For instance, use the number zero instead of the letter O, or replace the S with a dollar sign.

5. Avoid easy-to-guess words, even if they aren't in the dictionary. You shouldn't use your name, company name or hometown, for instance. Avoid pets and relatives' names, too. Likewise, avoid things that can be looked up, such as your birthday or ZIP code. But you might use that as part of a complex password. Try reversing your ZIP code or phone number and insert that into a string of letters. As a reminder, you should also avoid "password" as the password, or consecutive keys on the keyboard, such as "1234" or "qwerty."

6. Never reuse passwords on other accounts - with two exceptions. Over the years, I've managed to create hundreds of accounts. Many are for one-time use, such as when a newspaper website requires me to register to read the full story. It's OK to use simple passwords and repeat them in those types of situations, as long as the password isn't unlocking features that involve credit cards or posting on a message board. That will let you focus on keeping passwords to the more essential accounts strong.

The other exception is to log in using a centralized sign-on service such as Facebook Connect. Hulu, for instance, gives you the option of using your Facebook username and password instead of creating a separate one for the video site. This technically isn't reusing your password, but a matter of Hulu borrowing the log-in system Facebook already has in place. The account information isn't stored with Hulu. Facebook merely tells Hulu's computers that it's you. Of course, if you do this, it's even more important to keep your Facebook password secure.

7. How do you keep track of these passwords? There are programs you can buy, if you're willing to put your trust in them. I use an Excel spreadsheet, but I encrypt it with its own password - a rather complex one. I am well aware that if the file gets compromised, all my services go with it. In fact, I once had it on a USB drive, which I had in a backpack that got stolen. I had to spend several hours changing passwords on all my accounts, just in case someone managed to break the password to that file. As a precaution, don't name that file "passwords." Name it something generic and boring.

8. Ideally you'll have a system for creating and remembering passwords without needing the spreadsheet. For example, you might have a string that's constant, such as "?t7q1b9f8j2o0t0l1d!" (the acronym for "the quick brown fox jumps over the lazy dog" with my area code and ZIP code reversed and a few special characters put in). To vary it, you could add the first two letters of the website you are using to the front and the next four to the end. Or put the consonants in front and the vowels at the end, with every other letter capitalized and the letter O replaced with the number zero. So for Amazon, it would be "mZn?t7q1b9f8j2o0t0l1d!Aa0." Just try to guess that!

Of course, I'm not smart enough to have a system like that for myself.

9. Whatever system you adopt, it's good to change your password - and system - from time to time. And if there's reason to believe your password might have been compromised, change it immediately.

10. One other thing to be aware of: Many sites let you reset your password by answering a security question, such as the name of your pet or the name of your high school. Of course, these violate good password practices by requiring you to use something that can be easily looked up. Others ask for your favourite movie or hobby. That might not be easily looked up, but your tastes change over time. Furthermore, because these questions get repeated from site to site, the answers you use violate the rule against repeating passwords.

I try to make these answers complex just like passwords, by adding numbers and special characters and making up responses. Unfortunately, some sites won't let you do that, and you'll be stopped if you try to enter a numeral when asked for a city name, for instance. These services will often send an email when a password gets reset this way, so be sure the address on file is current. Change your password and security questions immediately if you're notified of a reset you didn't initiate. You might want to contact the service as well.

While you're at it, make your username complex, too, if you're allowed to choose one. Banking sites typically do.

Some services such as Gmail even give you the option of using two passwords when you use a particular computer or device for the first time. If you have that feature turned on, the service will send a text message with a six-digit code to your phone when you try to use Gmail from an unrecognized device. You'd need to enter that for access, and then that code expires. It's optional, and it's a pain - but it could save you from grief later on. Hackers wouldn't be able to access the account without possessing your phone. Turn it on by going to the account's security settings.

Beyond passwords, here are a few other things to help you stay safe:

1. Software flaws. Many break-ins result from flaws in the software program you use, whether it's the Windows or Mac operating system, a Web browser or a video player. It's a good idea to let those programs automatically check for software updates, as those updates may contain fixes to known flaws. You can also check this government website to learn of the latest threats and fixes: http://us-cert.gov .

2. Malicious software. Even if the software you're using is flawless, hackers may create a security opening by tricking you into installing a malicious program. That can happen if you click on a bad email attachment or link in your email. In rare cases, visiting a problematic website can cause the software to download. Should malicious software get on your computer, a hacker might be able to use the opening to look around for sensitive data, or record your keystrokes to capture your complex passwords. To minimize the threat, use caution when visiting unknown sites or opening mysterious email.

3. Security software. Many companies sell anti-virus and other software to protect your computer from malicious software. There's a free one available at http://www.avg.com . Windows and Mac computers also come with firewalls to block some threats. Be sure it's turned on.

Think of these measures as layers of defence. If one gets breached, there's another to back you up. But eventually, the intruders will get through. Slow them down by making each layer as strong as possible.

Tuesday, 26 February 2013

Mobile Charging with Hot Water...! Super

While researchers are busy finding newer sources of energy and ways of harvesting it, Ryan Johnstone, an independent inventor based in Nairobi, Kenya, has invented a solution that could help mobile phone users charge their devices with just the power of hot water. Ryan has developed the Bottle Charger, as he likes to call it, an apparatus that utilises the power of hot water to run a small turbine, which in turn produces electric current potent enough to charge small devices.

Explaining its working, Ryan said to The Mobile Indian, "The Bottle Charger works like a small wind turbine. Instead of natural wind currents, the pressurised air is created by expansion and contraction due to the presence and absence of hot water."

This change in air pressure is then used to run a small turbine that sits inside the apparatus and generates electricity for charging mobile devices. The inventor claims that the Bottle Charger creates electricity as long as you have access to hot water of around 100 degrees Celsius. With this the Bottle Charger enables users to charge smaller electronic devices such as mobile phones, MP3 players and so on for 15-30 minutes depending on surrounding temperatures.

Credit Card is replacing with Finger ...!What a technology

Futurists have long proclaimed the coming of a cashless society, where dollar bills and plastic cards are replaced by fingerprint and retina scanners smart enough to distinguish a living, breathing account holder from an identity thief.
What they probably didn't see coming was that one such technology would make its debut not in Silicon Valley or MIT but at a small state college in remote western South Dakota, 25 miles from Mount Rushmore.
Two shops on the School of Mines and Technology campus are performing one of the world's first experiments in Biocryptology - a mix of biometrics (using physical traits for identification) and cryptology (the study of encoding private information). Students at the Rapid City school can buy a bag of potato chips with a machine that non-intrusively detects their hemoglobin to make sure the transaction is legitimate.

Yahoo chief Stops working from home

Since Marissa Mayer became chief executive of Yahoo, she has been working hard to get the Internet pioneer off its deathbed and make it an innovator once again. She started with free food and new smartphones for every employee, borrowing from the playbook of Google, her employer until last year. Now, though, Yahoo has made a surprise move abolishing its work-at-home policy and ordering everyone to work in the office. A memo explaining the policy change, from the company's human resources department, says face-to-face interaction among employees fosters a more collaborative culture - a hallmark of Google's approach to its business. In trying to get back on track, Yahoo is taking on one of the country's biggest workplace issues whether the ability to work from home, and other flexible arrangements, leads to greater productivity or inhibits innovation and collaboration. Across the country, companies like Aetna, Booz Allen Hamilton and Zappos.com are confronting these trade-offs as they compete to attract and retain the best employees. Bank of America, for example, which had a popular program for working remotely, decided late last year to require employees in certain roles to come back to the office. Employees, especially younger ones, expect to be able to work remotely, analysts say. And over all the trend is toward greater workplace flexibility. Still, said John Challenger, chief executive of Challenger Gray & Christmas, an outplacement and executive coaching firm, "A lot of companies are afraid to let their workers work from home some of the time or all of the time because they're afraid they'll lose control." Studies show that people who work at home are significantly more productive but less innovative, said John Sullivan, a professor of management at San Francisco State University who runs a human resource advisory firm. "If you want innovation, then you need interaction," he said. "If you want productivity, then you want people working from home." Reflecting these tensions, Yahoo's policy change has unleashed a storm of criticism from advocates for workplace flexibility who say it is a retrograde approach, particularly for those who care for young children or aging parents outside of work. Their dismay is heightened by the fact that they hoped Ms. Mayer, who became chief executive at 37 while pregnant with her first child, would make the business world more hospitable for working parents. "The irony is that she has broken the glass ceiling, but seems unwilling for other women to lead a balanced life in which they care for their families and still concentrate on developing their skills and career," said Ruth Rosen, a professor emerita of women's history at the University of California. But not only women take advantage of workplace flexibility policies. According to the Bureau of Labor Statistics, nearly as many men telecommute. The bureau says 24 percent of employed Americans report working from home at least some hours each week. And 63 percent of employers said last year that they allowed employees to work remotely, up from 34 percent in 2005, according to a study by the Families and Work Institute, a nonprofit group studying the changing work force. During the recession, the institute expected employers to demand more face time, but instead found that 12 percent increased workplace flexibility, said Ellen Galinsky, its president and co-founder. She attributed this to companies' desire to reduce real estate costs, carbon footprints and commuting times. Technologies developed in Silicon Valley, from video chat to instant messaging, have made it possible for employees across America to work remotely. Yet like Yahoo, many tech companies believe that working in the same physical space drives innovation. A Yahoo spokeswoman, Sara Gorman, declined to comment, saying only that the company did not publicly discuss internal matters. The company's memo, written by Jackie Reses, director of human resources at Yahoo, and published on All Things D, a blog on digital issues, said: "Some of the best decisions and insights come from hallway and cafeteria discussions, meeting new people and impromptu team meetings. Speed and quality are often sacrificed when we work from home." In part, the memo looks like an effort to bring a Google spirit to Yahoo, said Colin Gillis, an analyst at BGC Partners who covers both companies. "Marissa's trying to increase the energy and output and change the culture of the company," he said. "She brings all the Google lessons to the table, and Google is very focused on having your life revolve around their campus so you can spend a significantly larger chunk of time at work." Still, Google, as well as Facebook, does allow people to work remotely on a case-by-case basis. But both companies also strongly stress in-person collaboration. Standard Silicon Valley perks like cafeterias with free food, shuttle buses, gyms, ice cream parlors and dry cleaners not only make employees' lives easier, but keep them on campus during the day and promote contact with other employees. Nearly all tech companies have desks packed tightly together without walls and communal work areas with sofas and beanbags. Zappos, the e-commerce company owned by Amazon.com, previously allowed some customer service agents to work from home, but now has a rule against working remotely. The company locks all office doors except one so employees are forced to run into more people on the way out, and budgets fewer than 100 square feet per employee, versus the standard 120 square feet or more. "It's to maximize those serendipitous encounters," said Zach Ware, who oversees campus development at the company. "The success of our company is built on our culture, and our perspective is you can't really do that on e-mail." Some companies outside the tech industry are also re-evaluating flexible work arrangements. In addition to Bank of America, certain industries that deal with sensitive client information, like health care and finance, have more restrictions on working remotely. Yet more companies embrace flexibility. At Aetna, 47 percent of workers telecommute, up from 9 percent in 2005. The company provides secure Internet and phone connections, locked file cabinets and shredders. During that period, the policy has saved the company $78 million in real estate costs, said Susan Millerick, an Aetna spokeswoman. At Booz Allen, employees can work at home or sign up to work at a desk in another branch, called "hoteling." The policy has been vital to employee retention, said Christopher Carlson, a senior associate in human resources at Booz Allen. He works from his home in Florida, where he moved from the Washington, D.C., region to care for his aging parents. "It allows me to integrate my work and life and be successful at both," Mr. Carlson said. "And I spend less money on gas."

Sunday, 17 February 2013

Why Google's stores shouldn't look so much like Apple stores

Some engineers have never dated a real person.

They've tried to, but it's hard for them to appreciate that real people don't necessarily use data to make decisions -- especially when it comes to love.

Perhaps their most embarrassing moments come when they try to mimic what non-engineers do in order to make themselves more attractive.

This mirrors some of the little issues that the Google brand has had over the years in becoming, well, human.

When you've spent you life believing that facts are everything, it's hard to imagine that people might prefer, oh, rounded corners or that ephemeral thing sometimes known as taste.

Google has made progress through some of its advertising. The "Jess Time" ad for Chrome was one of the very best tech ads of the 2012.

Yet when Google has wandered into retail, it has either believed that all you need is online or that an offline store ought to look rather like Apple's.

This is something against which Microsoft also struggles. It was almost comical when one Microsoft employee explained to me that its store looked -- at first glance -- a lot like the Apple store because the company used the same design firm.

This week, rumors surfaced that Google wants to make the next step in coming toward humanity by having its own shopping-mall retail presence.

The evidence so far from its pop-up stores -- as the picture above shows -- is that Google isn't thinking different. Or, at least, different enough.

If it fully intends to come out to the people -- to be itself-- then instead of having nice, clean retail staff in blue T-shirts (what brand does that remind you of?), it should embrace its true heart.

It should have real house-trained nerds, replete with bedhead and bad taste clothing, there for all to see. Yes, you could have nice, normal members of staff there to translate for them.

But the purpose of a retail store isn't merely to sell. It's to create street theater. Apple has its own version. Google must find its own too.

Instead of the now almost cliched clean lines and permanent white, it should make its stores look like excitable, sophisticated college playrooms, where books about dragons and vast Hulk hands are lying about and episodes of "Star Trek" and "Game of Thrones" are playing on huge screens.

Facebook network hit by ‘sophisticated’ attack

Facebook has said its computer system was "targeted in a sophisticated attack" last month, but that it found no evidence of any user data being compromised.
The company said in a blog post that malware came from an infected website of a mobile developer and that "we
remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day."
The attackers used a previously unseen exploit taking advantage of a flaw in Java software made by Oracle, which was alerted to the situation and released a patch the first of February, according to Facebook.

The hackers appeared to be targeting developers and technology firms based on the website they chose to booby-trap with malicious code.
"Facebook was not alone in this attack," the Northern California-based company said.
"It is clear that others were attacked and infiltrated recently as well."
The US intelligence community has concluded that America is the target of a massive cyber-espionage campaign that is threatening its competitiveness, The Washington Post reported just days ago.
Citing unnamed officials, the newspaper said the conclusion is contained in the National Intelligence Estimate, a classified report that represents the consensus view of the US intelligence community.
The document, according to the Post, identifies energy, finance, information technology, aerospace and automotive companies as the most frequent targets of hacking campaigns that appear state sponsored.
Early this month Twitter said it was hammered by a cyber attack similar to those that recently hit major Western news outlets, and that the passwords of about 250,000 users were stolen.

"This attack was not the work of amateurs, and we do not believe it was an isolated incident," Twitter information security director Bob Lord said in a blog post at the time.

Lord said there was an "uptick in large-scale security attacks aimed at US technology and media companies," as he told of Twitter detecting attempts this week to get unauthorised access to data in the firm's network.

The attack coincided with the revelation of several high-profile security breaches. The New York Times and The Wall Street Journal said that they had been hacked, and pointed to attackers from China.

It was unknown whether the cyberattack on San Francisco-based Twitter was related to high-powered hacker assaults on Facebook, the Times or the Journal.

Brazen cyberattacks on America's most high-profile media outlets revived concerns over Chinese hackers, who analysts say are likely linked to the secretive Beijing government.

The Times and the Journal reported that their computer networks had been compromised, alleging it was an effort by the Chinese government to spy on news media operating in the country.

The administration of President Barack Obama is trying to counter the electronic theft of trade secrets by lodging formal protests, expelling diplomatic personnel, imposing travel and visa restrictions, and complaining to the World Trade Organization, the Post said.

Most Popular

Tag Cloud

Recent News

Archives