Jump to content

Recommended Posts

Posted

If Windows 8 was a Microsoft gambit to grab a share of the tablet market, here's another suggestion that the move may backfire:

Windows XP End Could Bring More Bad News For PCs

Many consumers and businesses using XP simply will roll the dice and continue using those PCs until they break down, analysts say. But they might not replace them with Microsoft Windows PCs when they do, despite hopes late last year that corporate sales were stabilizing.

"I was in one warehouse location where they had fixed terminals that were on XP and they're now going to iPads," said Victor Janulaitis, CEO of tech consulting firm Janco Associates. "So they're never going to do anything with those PCs. They're just sitting there. It's like an old-time punch-card time clock in a factory."

[...]

When those PCs break down, they'll get new machines, but they might not be Windows-based PCs, he said. In addition to Apple (AAPL) iPads and Google (GOOG) Android-based tablets, computer makers now are selling low-cost computers running Google Chrome OS and even Android.

So instead of claiming a share of the tablet market, the attempt to push Metro on customers with Windows 8 may end up (further) decreasing their overall share of computing devices. Whereas before, users may have considered moving on to a new Windows desktop OS to replace their aging XP systems, now in many cases Microsoft will be out of the running for the replacement machines.

When Microsoft came out with its well-received Windows 7 in October 2009, businesses and consumers started to switch. But upgrades stalled when Microsoft released Windows 8 in October 2012. Customers rejected Windows 8 because of its radical redesign, which made use of touchscreens even though few PCs at the time had them.

And another bit of promising news:

Meanwhile, Microsoft is hoping its next version of Windows, code-named "Threshold" and likely to be called Windows 9, will erase the memory of Windows 8. Windows 9 is rumored to return the PC operating system to the traditional look and feel of the computer desktop, last seen in Windows 7.

Paul Thurrott's sources back up this report:

"Threshold" to be Called Windows 9, Ship in April 2015

At the BUILD developer conference in April 2014, Microsoft will discuss its vision for the future of Windows, including a year-off release codenamed "Threshold" that will most likely be called Windows 9. Here's what I know about the next major release of Windows.

[...]

I previously wrote about Threshold in Microsoft to Take Windows to the "Threshold", Further Changes Coming in Windows "Threshold" and Big Changes Are Coming to Windows. This is the release my sources previously pegged as being the one that will see the return of the Start menu and the ability to run Metro-style apps on the desktop alongside desktop applications.

But Threshold is more important than any specific updates. Windows 8 is tanking harder than Microsoft is comfortable discussing in public, and the latest release, Windows 8.1, which is a substantial and free upgrade with major improvements over the original release, is in use on less than 25 million PCs at the moment. That's a disaster, and Threshold needs to strike a better balance between meeting the needs of over a billion traditional PC users while enticing users to adopt this new Windows on new types of personal computing devices. In short, it needs to be everything that Windows 8 is not.

[...]

In some ways, the most interesting thing about Threshold is how it recasts Windows 8 as the next Vista. It's an acknowledgment that what came before didn't work, and didn't resonate with customers. And though Microsoft will always be able to claim that Windows 9 wouldn't have been possible without the important foundational work they had done first with Windows 8—just as was the case with Windows 7 and Windows Vista—there's no way to sugarcoat this. Windows 8 has set back Microsoft, and Windows, by years, and possibly for good.

Interesting, that bit about Microsoft's casting Win8 as the next Vista. Who was the Metrotard who wrote something about shooting the next guy who compared Windows 8 to Vista? He'll need a truckful of ammo to cut his way through Redmond. That is, if he doesn't first beat his head on the wall with rage at this official betrayal of the glorious Metro ideal.

--JorgeA


Posted

On other news, the EU DRAFT about NSA is not very tender with our overseas friends.

DRAFT REPORT
on the US NSA surveillance programme, surveillance bodies in various
Member States and their impact on EU citizens’ fundamental rights and on
transatlantic cooperation in Justice and Home Affairs
Based on this assessment, the rapporteur would like to submit to the vote of the Parliament the
following measures:
A European Digital Habeas corpus for protecting privacy based on 7 actions:
Action 1: Adopt the Data Protection Package in 2014;
Action 2: Conclude the EU-US Umbrella agreement ensuring proper redress mechanisms for EU citizens in case of data transfers from the EU to the US for law-
enforcement purposes;
Action 3: Suspend Safe Harbour until a full review is conducted and current loopholes are remedied making sure that transfers of personal data for commercial
purposes from the Union to the US can only take place in compliance with EU highest standards;
Action 4: Suspend the TFTP agreement until i) the Umbrella agreement negotiations have been concluded; ii) a thorough investigation has been concluded
based on EU analysis and all concerns raised by the Parliament in its resolution of 23 October have been properly addressed;
Action 5: Protect the rule of law and the fundamental rights of EU citizens, with a particular focus on threats to the freedom of the press and professional
confidentiality (including lawyer-client relations) as well as enhanced protection for whistleblowers;
Action 6: Develop a European strategy for IT independence (at national and EU level);
Action 7: Develop the EU as a reference player for a democratic and neutral governance of Internet;

Document available here:

http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/moraes_1014703_/moraes_1014703_en.pdf

jaclaz

Posted

Meanwhile back on the security front. Just saw this today and thought I would pass it on.

An online black market is operating which protects the users’ anonymity and operates across borders through the use of open source internet browers and payments systems which allow users to remain anonymous.

The above quote is from an elected official, where said official is calling for tighter controls on online activity. Either highly misguided or promoted to just above their intelligence level. Or... maybe the system is getting nervous, since all the revelations about spookdom over the last few months. :ph34r:

The short article is here: http://www.finegael.ie/latest-news/2013/odonovan-calls-for-crackd/index.xml

bpalone

Posted (edited)

As JorgeA would says ... "It just gets worse!" What does someone have to do ... keep your computer in "lead case" ?

NSA Reportedly Using Radio Waves to Snoop on Offline Computers Worldwide

January 15, 2014

http://www.foxnews.com/politics/2014/01/15/nsa-maps-pathway-into-computers-report-says/

The National Security Agency has placed software on nearly 100,000 computers around the world that allows the U.S. to conduct surveillance on those machines using radio frequency technology, The New York Times reported Tuesday.

The secret technology allows the agency to gain access to computers that other countries have tried to protect from spying or cyberattacks, even if they aren't connected to the Internet, The Times reported, citing NSA documents, computer experts and U.S. officials.

The software network could also create a digital highway for launching cyberattacks by transmitting malware, including the kind used in attacks by the U.S. against Iran's nuclear facilities, according to the report.

more at the link ...

Edited by duffy98
Posted

The actual NYT article, from which the above posted by duffy98 was taken:

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&_r=1

President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Expect the definition of extreme to be widened to comprise any form of electronic communication in 5, 4, 3, 2, 1 .... :whistle:

jaclaz

Posted (edited)

Well, it looks like I've stopped getting e-mail notifications of new posts -- again. I was afraid that activity on this thread had ground to a halt, turns out I just wasn't getting told about it. Glad to see you guys have been holding the fort.

I'll be back in action tomorrow.

--JorgeA

Edited by JorgeA
Posted (edited)

Company claims to have a "secure" phone ... maybe - maybe not. This is also from the article:

"The phone is carrier independent so we’re holding out for that T-Mobile upgrade. Of course, just because the company proclaims its immune to hacking, doesn’t mean some programmer isn’t figuring out a way to break into it. Also, it’s unclear if the phone remains encrypted when it’s only operating between two Blackphones."

Meet Blackphone, A Highly Secure Device Perfect For Paranoid Sext Fiends

Bonus: It doesn't support Path.

Jordan Valinsky 1/15

http://betabeat.com/2014/01/meet-blackphone-a-highly-secure-device-perfect-for-paranoid-sext-fiends/

It’s no Lumia, but this sounds impressive: A Madrid-based communications firm said it has created the first fully secure and encrypted smartphone that lets users send and receive calls (and texts) without being vulnerable to hackers or snoopers.

Dubbed the Blackphone, its sleek all-black case and touchscreen makes it look like it fell out of the pocket of James Bond’s blazer. The Android-based device uses an operating system named PrivatOS that promises highly secure privacy protection that would make the NSA wince. The yet-to-be-priced phone can transfer encrypted files and features a video chat option.

Edited by duffy98
Posted

Well, it looks like I've stopped getting e-mail notifications of new posts -- again. I was afraid that activity on this thread had ground to a halt, turns out I just wasn't getting told about it. Glad to see you guys have been holding the fort.

I'll be back in action tomorrow.

--JorgeA

Naah, the notifications are fine, it is the NSA that intercepts the messages and redirects them elsewhere ;).

@duffy98

http://www.zdnet.com/blackphone-a-smartphone-designed-to-stop-spying-eyes-7000025185/

Last time Silent Circle did something, it did not end too well :(.

http://www.zdnet.com/the-truth-about-why-silent-circle-silenced-their-secure-email-service-7000019300/

jaclaz

Posted (edited)

Thanks jaclaz ... maybe I posted an old article from a year ago that I thought was from yesterday. The article only had Jan 15 ... I added the 2013 which should have been 2014. Still messing up with the new year.

So we have a funny company here.

... your zdnet article has 2014 but the one I referenced has no year.

Edited by duffy98
Posted

Thanks jaclaz ... maybe I posted an old article from a year ago that I thought was from yesterday. The article only had Jan 15 ... I added the 2013 which should have been 2014. Still messing up with the new year.

So we have a funny company here.

... your zdnet article has 2014 but the one I referenced has no year.

No, no the article is January 2014 alright, like this one I mentioned:

http://www.zdnet.com/blackphone-a-smartphone-designed-to-stop-spying-eyes-7000025185/

The reference was to the "old" Silent Circle service, that was shut down because they were seemingly not prepared to manage the success it had (or because the NSA foced them to shut it. like in the Lavasoft case, this is not clear at all IMHO).

The generic point is that when you want to sell a service (and in this case ALSO hardware) you must have "largish shoulders" and capability to manage an unexpected success in a dynamic, fastish way.

Besides, the same people seemed on the "old" article:

http://www.zdnet.com/the-truth-about-why-silent-circle-silenced-their-secure-email-service-7000019300/

worried about metadata besides actual content, and since with a phone you have to get a carrier anyway, the metadata will be accessible as well.

Now, to see the thing the other way round, if something does not become "common" it is "distinctive". :w00t:

I mean if I were one of the good NSA guys, and I was trying to protect and serve, what I would do if there is some stale on the targeting directives?

  1. Hmmm, let's check all the people with an iPhone or a Nokia ....
  2. Hmmm, let's check all the people with a BlackPhone ....

:unsure:

jaclaz

Posted

More snow flakes from Mr. Snowden. From the Guardian:

NSA collects millions of text messages daily in 'untargeted' global sweep

• NSA extracts location, contacts and financial transactions
• 'Dishfire' program sweeps up 'pretty much everything it can'
• GCHQ using database to search metadata from UK numbers

I have friends that think I am a bonafide member of the tin hat society. But, every day or week, there is more information revealed about just how deep into our daily lives, that the various governments have burrowed. The only reason that I even have a cell phone, is that it has become a necessary evil. Even at that, there are day or even weeks, that I don't even turn the thing on. What finally pushed me over the edge, was that Pay Telephones were no longer available.

The brave new and without privacy world, is becoming quite scary these days. Hopefully, the sheeple will wake up and demand better.

The whole article can be read here: http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep

bpalone

Posted (edited)

All these new appliances being brought into homes with these "smart chips" maybe could be a problem. I don't have a smart phone but maybe this is similar ... everything being connected? I didn't see this posted anywhere.

Hackers Have Used A Refrigerator To Attack Businesses. Security researchers at Proofpoint have uncovered the very first wide-scale hack that involved television sets and at least one refrigerator.

* The hack happened between December 23, 2013 and January 6, 2014, and featured waves of malicious email,

typically sent in bursts of 100,000, three times per day, targeting enterprises and individuals worldwide.

For The First Time, Hackers Have Used A Refrigerator To Attack Businesses

Julie Bort

Jan. 16, 2014

http://www.businessinsider.com/hackers-use-a-refridgerator-to-attack-businesses-2014-1

Security researchers at Proofpoint have uncovered the very first wide-scale hack that involved television sets and at least one refrigerator.

Yes, a fridge.

This is being hailed as the first home appliance "botnet" and the first cyberattack from the Internet of Things.

A botnet is a series of computers that seem to be ordinary computers functioning in people's homes and businesses, but are really secretly controlled by hackers. The Internet of Things, is a new term in the tech industry that refers to a concept where every device in your house gets its own computer chip, software, and connection to the Internet: your fridge, thermostat, smart water meter, door locks, etc.

To a hacker, they all become computers that can be hacked and controlled.

In this case, hackers broke into more than 100,000 everyday consumer gadgets, such as home-networking routers, connected multi-media centers, televisions, and at least one refrigerator, Proofpoint says. They then used those objects to send more than 750,000 malicious emails to enterprises and individuals worldwide.

In the press release, Proofpoint explains:

* The hack happened between December 23, 2013 and January 6, 2014, and featured waves of malicious email,

typically sent in bursts of 100,000, three times per day, targeting enterprises and individuals worldwide.

* About three-quarters of the emails were sent by regular computers, but the rest, slightly more than one-quarter,

were sent by hacked home appliances.

* Hackers didn't have to be amazingly smart when breaking into home appliances. Many times they gained access

because the home owners didn't set them up correctly, or used the default password that came with the device.

Most homes are not yet a part of the Internet of Things, and looks like hackers will already be there to greet them when they arrive.

...

Edited by duffy98
Posted
Paul Thurrott's sources back up this report:

"Threshold" to be Called Windows 9, Ship in April 2015

... In some ways, the most interesting thing about Threshold is how it recasts Windows 8 as the next Vista. It's an acknowledgment that what came before didn't work, and didn't resonate with customers. And though Microsoft will always be able to claim that Windows 9 wouldn't have been possible without the important foundational work they had done first with Windows 8—just as was the case with Windows 7 and Windows Vista—there's no way to sugarcoat this. Windows 8 has set back Microsoft, and Windows, by years, and possibly for good ...

elephant-in-the-room1.jpg

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...