Sunday, January 2, 2011

iPhone alarms in New Year glitch

A glitch on Apple's iPhone has stopped its built-in alarm clock going off, leaving many people oversleeping on the first two days of the New Year.

Angry bloggers and tweeters complained that they had been late for work, and were risking missing planes and trains.

Apple has acknowledged the problem and says it will be fixed by 3 January.

The reason has not been given but the glitch appears to affect single alarm settings on the Iphone 4 and earlier models with software updates.

A similar problem hit the iPhone alarm when the clocks went back in November, again causing many users to be late for work or for transport arrangements.

"We're aware of an issue related to non-repeating alarms set for January 1 or 2," Apple spokeswoman Natalie Harrison said in a statement quoted by Macworld.

"Customers can set recurring alarms for those dates and all alarms will work properly beginning January 3."

More than 1.7m people around the world had bought iPhone 4 handsets by June 2010, in what was the company's most successful product launch.

Have you been affected by the glitch in the iPhone alarm clock? You can tell us what happened to you using the form below.



Online Business Consulting | Internet Business Consulting

E-mails go 'missing' from Hotmail

A number of people with Hotmail accounts have posted complaints on Microsoft forums complaining that their e-mails have been deleted.

Users around the world say e-mails are missing from their inbox and from other folders within their Hotmail accounts.

A spokeswoman for Microsoft said that the issue of missing e-mails was not a widespread problem.

The company said it is working to rectify the problem and apologised to customers for any inconvenience.



Online Business Consulting | Internet Business Consulting

Friday, December 31, 2010

Hackers crack open mobile network

Mobile calls and texts made on any GSM network can be eavesdropped upon using four cheap phones and open source software, say security researchers.

Karsten Nohl and Sylvain Munaut demonstrated their eavesdropping toolkit at the Chaos Computer Club Congress (CCC) in Berlin.

The work builds on earlier research that has found holes in many parts of the most widely used mobile technology.

The pair spent a year putting together the parts of the eavesdropping toolkit.

"Now there's a path from your telephone number to me finding you and listening to your calls," Mr Nohl told BBC News. "The whole way."

He said many of the pieces in the eavesdropping toolkit already existed thanks to work by other security researchers but there was one part the pair had to create themselves.

"The one piece that completed the chain was the ability to record data off the air," he said.

In a demonstration at the CCC, the pair took attendees through all the steps that led from locating a particular phone to seizing its unique ID, then leap-frogging from that to getting hold of data swapped between a handset and a base station as calls are made and texts sent.

Key to grabbing the data from the air were cheap Motorola phones which can have their onboard software swapped for an open source alternative.

"We used the cheap Motorola telephones because a description of their firmware leaked to the internet," he said.

This led to the creation of open source alternative firmware that, he said, has its "filters" removed so it could see all the data being broadcast by a base station.

This allows attackers to home in on the data they need to eavesdrop, said Mr Nohl. The encryption system that scrambles this data can be defeated using a huge list of encryption keys, called a rainbow table, that Mr Nohl generated in a separate research project.

"Any GSM call is fair game," he said.

GSM is the name of the technology used on the vast majority of mobile phone networks around the world. The GSMA, which represents operators and phone makers, estimates that there are more than five billion GSM mobiles in use around the world.

The GSMA has not responded to requests for comment about the research.

Playing around

Simeon Coney, a spokesman for mobile security firm Adaptive Mobile, said the work looked fairly thorough.

"Especially interesting is how the attack is aimed at a specific target phone, which could lead to malicious interest of high value targets," he added.

"This isn't an attack that is today readily repeatable yet by the anyone unfamiliar with the underlying technology," he said. "However, it does illustrate the manners in which the mobile phone system could be compromised in a focussed attack in less protected markets."

Mr Nohl said that before now commercial equipment that could spy on calls cost upwards of �35,000. The kit demonstrated at the Berlin event cost far less than that, he said. For instance, the Motorola phones used to grab data cost only 10 euros (�9) each.

Despite showing off the entire eavesdropping kit, there were no plans to release all of it for others to use, said Mr Nohl.

However, recreating the missing parts would not be difficult for a tech savvy amateur, he added.

"I expect people to do it for the fun of doing it."

Mr Nohl said the motivation for carrying out the research was to create awareness around the problem and perhaps prompt operators to improve security.

A few simple steps could make it much harder for eavesdroppers, he said.

"Raising their awareness is the most likely outcome, but the technical changes would be better."



Online Business Consulting | Internet Business Consulting

Thursday, December 30, 2010

Software bug behind Skype crash

Server overloads and a bug in Skype for Windows caused the two-day outage for the net phone firm.

Details of what caused the service to be unusable for millions of users prior to Christmas have been posted on the firm's blog.

The two events combined to create a cascade of problems that managed to knock out much of the network underpinning the phone service.

Skype is assessing how its network is built to stop the problem recurring.

Traffic cascade

Writing on the Skype blog, Lars Rabbe, chief information officer at the company, said the problems started on 22 December, when some of its servers that handle instant messaging started getting overloaded.

This meant that the responses they sent to Windows machines running Skype were slightly delayed. Unfortunately, a bug in one version of Skype for Windows meant this delay caused the program to crash.

About 50% of all Skype users ran the buggy 5.0.0.152 version of the software, said Mr Rabbe.

This caused problems for Skype because of the way the network supporting it is organised. Some of the data travelling round Skype's network are passed through all those machines logged on to the service.

Those participating machines act as what Skype calls "supernodes" and carry out some of the administrative tasks of the global network and help to ensure calls get through.

With a huge number of these machines offline because of the crash, the rest of the network quickly became overloaded.

Mr Rabbe wrote that the disappearance of the supernodes meant the remaining ones were swamped by traffic.

"The initial crashes happened just before our usual daily peak-hour and very shortly after the initial crash," wrote Mr Rabbe, "which resulted in traffic to the supernodes that was about 100 times what would normally be expected at that time of day."

Traffic levels were so high that they blew through the safe operating specifications supernodes usually use. As a result, more supernodes shut down.

Compensation offer

The "confluence of events", said Mr Rabbe, led to Skype being offline for about 24 hours as engineers put in place hundreds of dedicated supernodes and gradually brought the service back to life.

To ensure the outage does not happen again, Mr Rabbe said Skype would look at its update policy, to see if it should automatically move users to newer versions of its software.

A version of Skype for Windows that is free of the bug already exists, but is not automatically given to users.

It said it would also look at its network to improve capacity and get on with an investment programme that would boost this resilience.

Mr Rabbe apologised again on behalf of the company and added: "We know that we fell short in both fulfilling your expectations and communicating with you during this incident."

Skype has offered compensation to customers in the form of vouchers for pre-pay users and a free week of service for subscribers.



Online Business Consulting | Internet Business Consulting

Phone firms back common chargers

Keeping a smartphone fully powered could soon be easier as manufacturers back common standards for chargers.

Technical specifications for chargers drawn up by the European Commission have won the backing of 14 phone firms.

Firms that have pledged to make chargers to the common standard include Nokia, Research In Motion, Apple and Samsung.

The first chargers produced to the specifications are expected to be available in early 2011.

The common chargers will be based around micro-USB technology and could see the end of proprietary power ports on handsets.

The process to create common chargers began in June 2009 when the Commission won pledges from phone firms to back any standards it drew up.

Following that agreement it started work on the specifications that have now been completed and sent out to handset makers.

The EU said many Europeans wanted to be able to use chargers for different smartphones and resented the inconvenience incompatible chargers caused.

Also, it said in a statement, eliminating the need to get a new charger when a phone was replaced had environmental benefits as it reduced the need to dispose of an old, but probably fully functional, charger.

The specifications only cover chargers for smartphones because, said the Commission, these are likely to be the most widely used type of phone in Europe within the next two years.

Antonio Tajani, European Commissioner for industry and entrepreneurship, welcomed the publication of the standards and said: "Now it is time for industry to show its commitment to sell mobile phones for the new charger."

The Commission is also talking to regulators with a view to getting the European specifications adopted worldwide.



Online Business Consulting | Internet Business Consulting

Ariane 5 makes final 2010 flight

Europe's heavy-lift rocket, the Ariane 5, has completed its sixth and final mission of 2010, putting two satellites high above the Earth.

The launcher powered skyward from its Kourou spaceport in French Guiana at 1827 local time (2127 GMT).

Ariane's biggest "passenger" was Hispasat-1E, a 5.3-tonne platform that will deliver a range of video and data services to Europe and the Americas.

The 2.7t Koreasat-6 will handle TV and telecoms services for South Korea.

"It's the 41st consecutive success of Ariane 5 and in 2010 we will have launched a total of 12 large telecommunications satellites out of a world total of 20," said Jean-Yves Le Gall, the chairman and CEO of the rocket's operator, Arianespace. "This gives us a market share of 60%."

The vehicle's first outing of 2011 is likely to be a re-supply mission to the International Space Station (ISS).

Ariane will be used to put Europe's 20-tonne space freighter, ATV-Johannes Kepler, in a low-Earth orbit. The flight is scheduled for 15 February.

After separating from the Ariane, the freighter will use its own thrusters to get to the orbiting outpost.

It will be carrying more than six tonnes of fuel, air, food and equipment for the station's astronauts.



Online Business Consulting | Internet Business Consulting

Wednesday, December 29, 2010

Apple sued over app 'data leaks'

Two groups of iPhone and iPad users are suing Apple saying apps for the gadgets leak personally identifiable data.

The groups want to stop personal data being passed around without owners being notified or compensated.

Apple is just one of six application makers being pursued by the two groups of consumers.

The legal firm putting together one class action lawsuit said it might also take action against Google over data leaking from Android applications.

Backflip Studios, the Weather Channel, Dictionary.com and others were named in court papers supporting the lawsuits.

The papers allege that many applications collect so much personal data that users can be individually identified. This is despite Apple operating a policy that allows data to be shared with third parties only if an app requires the information to keep running.

The complainants said many firms, including advertisers, were managing to track and identify individuals via the unique device ID Apple assigns to every gadget. Apple does not do enough to enforce its privacy policy or restrict use of unique IDs, they allege.

Apple has yet to respond to requests for comment.

The law firm behind one of the class action lawsuits said it was considering whether to prepare a case against Google, saying that many Android applications leak personal data too.

Despite the filing of separate lawsuits, some experts suggest the court cases will not succeed.

"If this were a major issue, all web browsers would have to shut down and there would not be any advertising on the internet," Trip Chowdhry, Global Equities research analyst, told Reuters.



Online Business Consulting | Internet Business Consulting

Attack hits Anonymous activists

The notorious message board 4Chan has been taken offline by an overwhelming web attack.

Thanks to the attack, the discussion boards of the site have been hard to reach or offline for almost 24 hours.

The attack might be retaliation for similar attacks that some 4Chan members, as part of the Anonymous group, mounted in support of Wikileaks.

It is not yet clear who is carrying out the attacks and no-one has come forward to claim responsibility.

News about the large-scale web attack, known as a Distributed Denial of Service (DDoS) attack, came to light via a message posted on Twitter by Moot, the founder of 4Chan.

He wrote: "Site is down due to DDoS. We now join the ranks of Mastercard, Visa, Paypal, et al - an exclusive club!"

A DDoS attack involves bombarding a server behind a website with data in an attempt to knock it offline.

Many members of 4Chan work together in the guise of a group called Anonymous to carry out attacks on websites they deem to be enemies of freedom of speech.

Most recently, Anonymous members took action in support of whistle-blowing site Wikileaks. Anonymous used a DDoS tool to hit the corporate websites of Mastercard, Visa and Paypal because the firms had cut off payment connections to Wikileaks.

Paul Mutton, a security analyst at site watching firm Netcraft, said the attack on 4Chan was ongoing.

"For most of the past 24 hours, the site has either been very slow to respond or has been completely unreachable," he said.

Statistics gathered by Netcraft show 4Chan was hit hard early on Wednesday but that it recovered towards the afternoon.

A blog showing the status of the various elements of 4Chan suggests the image boards, the most heavily used part of the site, have been down for hours.

Early reports suggested that a hacktivist known as the Jester was behind the attack. Before now, some members of Anonymous said they would target the Jester with DDoS attacks after he declared an ambition to knock Wikileaks offline.

However, in a Twitter message, the Jester denied any involvement in the attack.



Online Business Consulting | Internet Business Consulting

Tuesday, December 28, 2010

Scientists aim to simulate Earth

It could be one of the most ambitious computer projects ever conceived.

An international group of scientists are aiming to create a simulator that can replicate everything happening on Earth - from global weather patterns and the spread of diseases to international financial transactions or congestion on Milton Keynes' roads.

Nicknamed the Living Earth Simulator (LES), the project aims to advance the scientific understanding of what is taking place on the planet, encapsulating the human actions that shape societies and the environmental forces that define the physical world.

"Many problems we have today - including social and economic instabilities, wars, disease spreading - are related to human behaviour, but there is apparently a serious lack of understanding regarding how society and the economy work," says Dr Helbing, of the Swiss Federal Institute of Technology, who chairs the FuturICT project which aims to create the simulator.

Knowledge collider

Thanks to projects such as the Large Hadron Collider, the particle accelerator built by Cern, scientists know more about the early universe than they do about our own planet, claims Dr Helbing.

What is needed is a knowledge accelerator, to collide different branches of knowledge, he says.

"Revealing the hidden laws and processes underlying societies constitutes the most pressing scientific grand challenge of our century."

The result would be the LES. It would be able to predict the spread of infectious diseases, such as Swine Flu, identify methods for tackling climate change or even spot the inklings of an impending financial crisis, he says.

But how would such colossal system work?

For a start it would need to be populated by data - lots of it - covering the entire gamut of activity on the planet, says Dr Helbing.

It would also be powered by an assembly of yet-to-be-built supercomputers capable of carrying out number-crunching on a mammoth scale.

Although the hardware has not yet been built, much of the data is already being generated, he says.

For example, the Planetary Skin project, led by US space agency Nasa, will see the creation of a vast sensor network collecting climate data from air, land, sea and space.

In addition, Dr Helbing and his team have already identified more than 70 online data sources they believe can be used including Wikipedia, Google Maps and the UK government's data repository Data.gov.uk.

Drowning in data

Integrating such real-time data feeds with millions of other sources of data - from financial markets and medical records to social media - would ultimately power the simulator, says Dr Helbing.

The next step is create a framework to turn that morass of data in to models that accurately replicate what is taken place on Earth today.

"Start Quote

We don't take any action on the information we have"

End Quote Pete Warden OpenHeatMaps

That will only be possible by bringing together social scientists and computer scientists and engineers to establish the rules that will define how the LES operates.

Such work cannot be left to traditional social science researchers, where typically years of work produces limited volumes of data, argues Dr Helbing.

Nor is it something that could have been achieved before - the technology needed to run the LES will only become available in the coming decade, he adds.

Human behaviour

For example, while the LES will need to be able to assimilate vast oceans of data it will simultaneously have to understand what that data means.

That becomes possible as so-called semantic web technologies mature, says Dr Helbing.

Today, a database chock-full of air pollution data would look much the same to a computer as a database of global banking transactions - essentially just a lot of numbers.

But semantic web technology will encode a description of data alongside the data itself, enabling computers to understand the data in context.

What's more, our approach to aggregating data stresses the need to strip out any of that information that relates directly to an individual, says Dr Helbing.

That will enable the LES to incorporate vast amounts of data relating to human activity, without compromising people's privacy, he argues.

Once an approach to carrying out large-scale social and economic data is agreed upon, it will be necessary to build supercomputer centres needed to crunch that data and produce the simulation of the Earth, says Dr Helbing.

Generating the computational power to deal with the amount of data needed to populate the LES represents a significant challenge, but it's far from being a showstopper.

If you look at the data-processing capacity of Google, it's clear that the LES won't be held back by processing capacity, says Pete Warden, founder of the OpenHeatMap project and a specialist on data analysis.

While Google is somewhat secretive about the amount of data it can process, in May 2010 it was believed to use in the region of 39,000 servers to process an exabyte of data per month - that's enough data to fill 2 billion CDs every month.

Reality mining

If you accept that only a fraction of the "several hundred exabytes of data being produced worldwide every year… would be useful for a world simulation, the bottleneck won't be the processing capacity," says Mr Warden.

"Getting access to the data will be much more of a challenge, as will figuring out something useful to do with it," he adds.

Simply having lots of data isn't enough to build a credible simulation of the planet, argues Warden. "Economics and sociology have consistently failed to produce theories with strong predictive powers over the last century, despite lots of data gathering. I'm sceptical that larger data sets will mark a big change," he says.

"It's not that we don't know enough about a lot of the problems the world faces, from climate change to extreme poverty, it's that we don't take any action on the information we do have," he argues.

Regardless of the challenges the project faces, the greater danger is not attempting to use the computer tools we have now - and will have in future - to improve our understanding of global socio-economic trends, says Dr Helbing.

"Over the past years, it has for example become obvious that we need better indicators than the gross national product to judge societal development and well-being," he argues.

At it's heart, the LES is about working towards better methods to measure the state of society, he says, which would account for health, education and environmental issues. "And last but not least, happiness."



Online Business Consulting | Internet Business Consulting

1m children 'without computers'

More than a million school children in the UK still lack access to a computer at home, research suggests.

And almost 2m are unable to go online at home, according to leading digital education charity, the E-Learning Foundation.

It also claims those from the poorest families are two-and-a-half-times less likely to have the internet at home than children from the richest homes.

The government would not comment on the findings.

The E-Learning Foundation, which works to ensure that all children have access to the internet and a computer at home, has analysed the latest government spending survey.

It found that while computer access is growing in better-off households, those from low-income families are being left behind.

'Get worse'

It is warning that many of the UK's poorest children face being severely educationally disadvantaged by their lack of access to technology as a result.

In November more than half of teachers who took part in a survey for the Times Education Supplement said pupils without access to internet or a computer at home were hampered in their learning.

The foundation's chief executive, Valerie Thompson, said: "With so many children swamped with gifts from family and friends over the Christmas period it is important we reflect on the fact that millions of children live in poverty in this country.

"For those at school, this translates into very tangible disadvantages when it comes to completing homework, researching topics, independent learning, and communicating with teachers and classmates on the school learning platform.

"Without the use of a computer and the ability to go online at home the attainment gap that characterises children from low income families is simply going to get worse."

The Department for Education was not prepared to comment on the findings.



Online Business Consulting | Internet Business Consulting