Thursday, August 11, 2011

Internet » The Rise of We-Commerce

Posted by echa 5:39 PM, under | No comments

The Rise of We-Commerce | The Rise of We-Commerce Can't decide what to buy? Ask a friend, or your mom. Shopping's always been a social activity, and social shopping sites are now harnessing the power and promise of networks. They are evolving along with consumer expectations and desires, shaping a new world for e-commerce.

It just makes sense that consumers tend to trust the opinions and recommendations of friends before they trust those of advertisers, promoters and retailers. Social shopping sites, which combine features of social networking 6 Ways to Use Social Media for Business. Free Guide. with online sales, seek to capitalize on the sharing and trust that exist between friends.

"Sharing is one of the inherent human behaviors," explained social shopping site ShopSocially's founder and CEO Jai Rawat. "People share all the time. It's a natural thing for them to do. People love telling other what they bought."

Consumer-to-Consumer Channel

Traditionally, the model of selling goods has relied on a one-way communication channel between retailer and customer, via advertising, targeted emails, or even texts, but new social shopping behaviors are throwing that model into question.

"ShopSocially is creating a consumer-to-consumer marketing channel for online retailers," Rawat told the E-Commerce Times.

ShopSocially calls itself a "shopping recommendation engine," meaning that it gives consumers a way to recommend purchases to their friends via social networking sites. Retailers can purchase a subscription to ShopSocially's service, which, among other things, embeds a social widget on their checkout pages so customers can share their purchases on Facebook, Twitter and via email. Consumers can also post purchase information and recommendations through ShopSocially's site.

Networked Fashion

Social shopping lends itself particularly well to the fashion world, which has spawned several sites and services. One of the largest, Kaboodle, lets users create profiles, save wishlists, and communicate with other shoppers.

"Like Facebook, it allows you to build profiles and connect with other people," Kaboodle's CMO Steve Chien told the E-Commerce Times. "But people are coming to Kaboodle to talk specifically about fashion."

Comparing dresses, purses and shoes -- the kind of social banter that typically takes place in the shopping mall -- happens virtually on Kaboodle, which has about 1.5 million users.

"The power of Kaboodle is tapping into the word-of-mouth marketing that's happening in real life," explained Chien. "There is an element of social discovery that we are replicating online."

It's also just a good way of keeping track of multiple items from various online retailers, and creating a wish list for holidays, birthdays, weddings and other events.

"It's useful to organize your shopping," said Chien. "You can build a wishlist that crosses multiple retailers."

WingTipIt.com is another social shopping site that allows consumers to save items, create lists, and interact with friends, and it also sends out daily emails with information about products consumers have saved, including tips about sales.

we commerce


"We looked at how consumers were shopping in bricks-and-mortar stores and gave them the gratification they were getting there online," explained WingTipIt's cofounder Carla Holtze. "We built our product on consumer and retailer insights."

Most social shopping sites have business models that rely in part on commissions from sales referred from these sites to retailers, and in part on other continuously evolving strategies such as advertising, direct marketing, cross promotions and data analytics.

Members-Only Model

Another model, used by Gilt Groupe, gives a sense of exclusivity to the experience of social shopping. This site offers invitation-only access to sales and special promotions to its members, who can register for the site for free.

"Gilt Groupe provides access, by invitation only, to its members to the most inspiring merchandise, culinary offerings, and luxury experiences every day, many at up to 60 percent off," explained Jyothi Rao, general manager of women's at Gilt Groupe.

"Gilt works directly with the brands as often as we can, including fashion for women, men, and children; home decor; artisanal ingredients; hotels and travel experiences on every continent; and unique activities to make sure that we offer our members the best deals," Rao told the E-Commerce Times.

As a curated flash sales site, Gilt Groupe gives its members opportunities not available to non-members, while at the same time offering a sense of community.


"I think they enjoy it because it gives them a nice break in the middle of the day. It's something to look forward to," said Rao. "The mystery of what is going to be in the sales each day gives a nice sense of discovery and anticipation. Also, there's a gaming quality to shopping on Gilt.com -- the items are available for only for 36 hours and in limited quantity."

New Models for E-Commerce

All social shopping sites are evolving along with consumer expectations and desires, and they are shaping a new world for e-commerce.

As Deena Varshavskaya, the founder of social shopping site Wanelo, explained to the E-Commerce Times, her site came about because she was trying to conceive of a new model for advertising, marketing and selling.

"The idea for it came out of a conversation with a friend about the future of advertising," said Varshavskaya. "My main thought was that with users getting more and more control of what and how they consume, there's no way that advertising will be the future, at least in its current form. So how will people find out about new relevant things? Through each other, of course."

Internet » The Social Game Changers

Posted by echa 5:34 PM, under | No comments

The Social Game Changers | Game Changers For far too long, the Web has struggled to make sense of users by applying metrics that were mere proxies of player behavior. As the social Web expands, a paradigm shift based on previous user behavior metrics will follow. The analytics company that best packages, distills, and helps its clients understand how to better monetize users within the paradigm will gain the biggest share of this new market.

Once considered the red-headed stepchild of the gaming industry, social gaming is finally taking its rightful place at the table. Over the past several years, the free-to-play (F2P) model has surged to the forefront of next-generation gaming, while console game companies and traditional game developers have faltered by the wayside.

With its risk-free adoption, discoverability, and virtual goods format, the F2P model demonstrates how billions of smaller transactions, coupled with lower go-to-market costs and data-driven design, offer compelling game experiences to a market segment the traditional gaming companies persistently ignored.

Facebook is the dominant platform of choice for large social game developers like Zynga, Playdom, Playfish, Crowdstar, PopCap, and Kabam, among others. The ability to tap into a social graph of more than 750 million users to leverage network effects and shared interests has allowed the F2P business model to explode onto the gaming scene within a veritable blink of an eye.

User analytics have also changed, evolving from measuring and optimizing applications that sent hugs and vampire bites to games that had more complex game mechanics like Zynga's "FarmVille," the current linchpin of big data's social gaming success. Today's emerging social Web has the potential to leapfrog even Zynga's accomplishments as it expands beyond the traditional social networking 6 Ways to Use Social Media for Business. Free Guide. platforms.


Tectonic Shift

Viral growth no longer means frequent news feeds or spammy invites. Instead, it's a more developed player request that's embedded with progress mechanics. Monetization has gone from a fragmented, company-specific currency to an ecosystem of native Facebook credits. As a result, developers are retuning their games and earnings expectations around this new, 30 percent revenue share model.

With all of these rapid platform changes, a shifting advertising ecosystem, and the blossoming of new game engines and genres, analytics companies have had to keep their finger tightly on the market pulse in order to correctly anticipate the next level of visibility and insight.

From optimizing around virality (K-factor) a year ago, the focus has shifted to engagement and retention optimization, as we see games with deeper engagement narratives pushing the envelope in leveraging custom behavioral insights to create games with ever-increasing average revenues per user. This raises the bar for everyone in the space and leads to higher quality game experiences that benefit the entire industry.

Social Gaming Evolution²

Facebook's success as a social gaming platform means more and more competitors are actively working to accommodate social game developers and their ad budgets. Google+ is currently the latest potential rival to Facebook, both as a social network and as a social gaming platform.

Mobile social networks like Openfeint are attempting to create networks within the fragmented mobile ecosystem. Venture capital keeps flowing into the industry with new studios popping up almost every day.

Industry veterans from traditional game companies are jumping ship, recognizing the new epoch where both the medium and the means players have for influencing the development and direction of their experience are completely unlike anything the industry has ever seen before.

Social and mobile game companies are also witnessing an explosion of data that's both technically challenging to process and intellectually challenging to translate into smart business decisions. Critical, real-time decisions now mandate seeing games not as a product but as a service -- a service that is constantly tweaking and optimizing the user experience for both new and existing players. Developers must quickly make sense of this data deluge in order to successfully iterate and capitalize on opportunities arising from user behavior.

The Evolving Social Web

As fluency for interpreting sizeable data sets increases, so will the number of events a developer will want to measure in gaming applications. Analytics must adapt to this fluency, to begin commensurately scaling for these new and unforeseen demands.

Many big data companies will try to step in to provide these services, recognizing that whether it is a social game, website or an application on a PC, smartphone or tablet, they must go where the users are going in order to build a holistic and accurate picture of cross-platform user behavior.

As more non-gaming companies perceive how Zynga leverages sophisticated analytics for data-driven design and optimization, the demand for similar analytics platforms will explode. Mobile devices are the next arena where exponential growth is already happening and companies have already introduced products specifically built for the mobile developer.

Successful social analytics companies will continue adapting. They will move beyond the on-demand dashboards to provide not only the infrastructure that handles the next generation of social Web data but also the common-sense best practices for executives navigating this new, opportunity-filled field.

For far too long, the Web has struggled to make sense of users by applying metrics that were mere proxies of player behavior. As the social Web expands, a paradigm shift based on previous user behavior metrics will follow. The analytics company that best packages, distills, and helps its clients understand how to better monetize users within the paradigm will gain the biggest share of this new market.

Accessible and actionable insights; these are the goals analytics companies must achieve in this evolving Web ecosystem. We must reach beyond page views into user behavior to better understand what drives people to play and interact within their games and their social and interest graphs.

We must deliver flexibility for measuring user behavior, while also delivering the best practices discovered in our years of research and data mining that organizations can interpret and act on.

Finally, we must move with the social graph as it progresses from its social network beginnings into the wider Web. By doing so, we will be where people buy and share real-world items on their PCs and mobile devices, while also acting as a catalyst for discovery and influence through these shared interests. In short, companies need to understand their users -- and we need to understand what companies need to know about their users. After all, we're in this game together.

Internet » What Would Linus Do About GNOME 3? Why, Use Xfce

Posted by echa 5:31 PM, under | No comments

What Would Linus Do About GNOME 3? Why, Use Xfce | Linus "It really seems that OS designers in general, and window manager designers especially, have forgotten what an OS is for: to allow me to get work done," said Slashdot blogger Gerhard Mack. "Fancy 3D spinning cubes to change virtual desktops might amaze other people, but they are actually SLOWER than just having the desktop switcher on the bar. Xfce seems to get this."

Debates are always plentiful here in the Linux blogosphere, and the topic of desktop environments is no exception.

That may be more true now than ever before, in fact, thanks to GNOME 3, which has come to rival only Unity in the controversy it has caused.

It's one thing when a mere mortal user criticizes GNOME; however, it's quite another when none other than Linus Torvalds does. Yet that, it seems, is just what recently happened.


'Why Can't I Have Shortcuts?'

"The user experience of Gnome3 even without rendering problems is unacceptable," wrote Torvalds in a conversation late last month on Google+. "Why can't I have shortcuts on my desktop? Why can't I have the expose functionality? Wobbly windows? Why does anybody sane think that it's a good idea to have that 'go to the crazy activities' menu mode?

"I used to be upset when gnome developers decided it was 'too complicated' for the user to remap some mouse buttons," Torvalds added. "In gnome3, the developers have apparently decided that it's 'too complicated' to actually do real work on your desktop, and have decided to make it really annoying to do."

As an example of "the crazy," Torvalds cited the predicament facing a user who wants to open a new terminal window.

'That's Just Crazy Crap'

"So you go to 'activities' and press the 'terminal' thing that you've made part of your normal desktop thing (but why can't I just have it on the desktop, instead of in that insane 'activities' mode?)," he griped. "What happens? Nothing. It brings your existing terminal to the forefront.

"That's just crazy crap," he added. "Now I need to use Shift-Control-N in an old terminal to bring up a new one. Yeah, that's a real user experience improvement. Sure."

In short, blaming those and other "head up the arse" behaviors in GNOME 3, Torvalds has switched to Xfce, he said: "I think it's a step down from gnome2, but it's a huge step up from gnome3. Really."

'I Agree with Linus'

It took a few days for the news of Torvalds' comments to hit the wires of the Linux blogosphere, but once it did, "crazy" is a fair description of the speed at which it traveled. In no time at all, the topic dominated all others at every bar, saloon and watering hole in the Linux blogosphere.

Luckily, Linux Girl was ready, Quick Quotes Quill in hand.

"I agree with Linus here," opined Chris Travers, a Slashdot blogger who works on the LedgerSMB project. "GNOME 3 is an unholy mess. The interface requires too many clicks to find things and without 3D acceleration it is hardly usable. The GNOME 2 interface was good; GNOME 3 is both awkward and clunky."

Still, "it is nice to be reminded by Linus that we have a choice," Travers added. "I expect to help bring this choice to more of my Linux-using friends."

'A Beast I've Never Tamed'

Slashdot blogger yagu took a similar view.

"I don't care much what Linus does or doesn't do," yagu told Linux Girl. "But I must agree Gnome is a beast I've never tamed."

The proliferation of Linux desktops "blesses with choice," yagu added. "I choose simple. It took me a long time to leave Tom's Window Manager (twm), and I was long happy with FVWM (no idea what that stands for). Both were simple, functional, and highly configurable window managers, and I could basically create my own desktop experience."

'Noisy, Annoying and Distracting'

The "high octane desktop experience," on the other hand, "I find only a modest leap for many of the reasons Linus gives for dropping Gnome 3," yagu went on. "Highly textured and layered, these uber-window managers are interesting other choices for users, but I find them mostly noisy, annoying and distracting. Eye candy is nice but doesn't contribute to my productivity at the end of the day."

Yagu now uses KDE. He finds it "mostly functional," he noted, but "would beg off were it not for some apps I find necessary which require KDE to run.

"Therein lies the rub," yagu concluded. "I don't want technology bleeding into all of my activities to the point that I must run some monster to do simple tasks. Gnome seems to have always been that monster for me."

'I Love Xfce'

GNOME 3 is "going in a direction people don't want to go, where the set 'people' includes Linus," Hyperlogos blogger Martin Espinoza opined.

"I opted for Unity, so even people who like eye candy are dodging GNOME 3," Espinoza added. "I don't know where I'm going next; perhaps I'll go back to Enlightenment just to be contrary."

Consultant and Slashdot blogger Gerhard Mack, meanwhile, is an Xfce fan.

"I love Xfce and have been using it for years," he told Linux Girl.

'It Just Works'

"It really seems that OS designers in general, and window manager designers especially, have forgotten what an OS is for: to allow me to get work done," Mack pointed out.

"I don't want the single most used software on my system (the WM shell) to be written in an interpreted language," he added. "Fancy 3D spinning cubes to change virtual desktops might amaze other people, but they are actually SLOWER than just having the desktop switcher on the bar.

"Xfce seems to get this," Mack said. "It's written in a compiled language, the interface is light and it has just enough eye candy to look nice (shadows, etc.). I dump the dock thing and have as many menu bars as I want. Dual monitors are handled well."

In short, Xfce "just works and is efficient enough that I still have plenty of CPU/RAM left to get actual work done with my system," Mack concluded.

'If It Ain't Broke...'

Slashdot blogger hairyfeet marveled that Linus was ever using GNOME to begin with.

"Isn't Gnome the 'we know what's best for you' desktop?" hairyfeet pointed out. "It would seem like a kernel hacker would want more control than that."

In any case, too often in the world of FOSS developers seem to follow "the 'If it ain't broke we'll break it!' design mantra," hairyfeet opined. "Is a world without bling like a world without sunshine to these guys?"

In the cases of both KDE3 and GNOME 2, for example, "you had well-vetted, well-maintained, low-resource code that most of the major bugs had been worked out of," he explained. "So what happened? Did seeing Aero and the latest OSX builds just cause everyone to be so dang bling-deprived they couldn't wait to toss stuff away?

"Slow and steady wins the race," hairyfeet concluded. "If it ain't broke, DON'T FIX IT!!!"

'They Have the Choice'

Blogger Robert Pogson, on the other hand, took a higher-level view.

"GNOME 3, like Ubuntu's Unity, is change for the sake of change," Pogson told Linux Girl.

Still, "if the users don't like it, they have the choice to use other interfaces," he added. "Linus and I both like XFCE4. It gets the job done and lets me do what I need to do."

Some people "do dangerous things; others do boring things," Pogson pointed out. "There's no explaining what people are motivated to do."

Nevertheless, "as long as we have plenty of choice and the freedom to change things, it's OK with me," he concluded.

Internet » Is Social Networking's Honeymoon Nearly Over?

Posted by echa 5:27 PM, under | No comments

Is Social Networking's Honeymoon Nearly Over? "I think that the reason [privacy] is not such a big topic -- or hasn't been in the past -- is that we're still in the honeymoon phase ... . People love sharing snapshots of their lives, letting people know what they've been up to, connecting, networking, socializing with old friends, old flames -- meeting new people. It's very fun -- it's very exciting. It's all about instant gratification."

Technology analyst Scott Steinberg answers the question, "Why is it that privacy is not a huge topic in social media?"

The recent launch of Google+, which offers users a convenient way of managing who gets to see what, addresses the social networking 6 Ways to Use Social Media for Business. Free Guide. privacy issue to an extent. However, the vast majority of Facebook's multitudes are still not terribly concerned -- they're having too much fun.

There's a need to pay more attention to privacy, though, and Steinberg is confident that social networkers are awakening to that fact and becoming less blase about the potential ramifications of sharing so much of their personal lives online.

Internet » How Anonymous Could Attack Facebook - If It Really Wants To

Posted by echa 5:22 PM, under | No comments

How Anonymous Could Attack Facebook - If It Really Wants To | Facebook Should Facebook be afraid of Anonymous? A message purportedly from a member of the group has threatened an attack on the social networking site for Nov. 5. Tweets from another Anonymous channel claim attacking Facebook wouldn't be the group's style. But if someone really did want to wallop Facebook, could it be done? Possibly -- there are more ways to screw up a site than a DDoS blitz.

Could Facebook be the next target in hacker group Anonymous' crosshairs?

A tweet from the Twitter handle "OP_Facebook" -- which is labeled "Anonymous" yet had only a single tweet in its history as of mid-day Wednesday -- urged readers to go to a Pirate Bay Web page or watch a YouTube video in which a threat is made to attack Facebook on Nov. 5.

It's perhaps worth noting that the tweet was originally posted nearly a month ago. News of the threat has only recently been widely circulated.

Whomever controls one of Anonymous' main public communication channels, however, doesn't seem to support the effort. The AnonOps Twitter feed later stated that the so-called OpFacebook plan to take down the social networking 6 Ways to Use Social Media for Business. Free Guide. site is being organized by some Anons, that not all of Anonymous agrees with it, and that attacking the messenger is not Anonymous' style.

Schisms aside, just out of curiosity, how might a group of hackers such as Anonymous attack Facebook?

Attacks Against Facebook

Back in 2009, Facebook, along with other social media sites including Twitter and LiveJournal, were hit by massive distributed denial of service (DDoS) attacks.

Facebook reportedly said the target was a pro-Georgian blogger with the username "Cyxym."

However, Facebook services weren't too badly disrupted, and its engineers have publicly stated that a successful DDoS attack against their site would require a botnet so large that it might be traceable. The social networking site has other protections in place.

"One would imagine Facebook would have incredible redundancy and capacity to resist a denial of service attack," Chris Harget, senior product manager at ActivIdentity, told TechNewsWorld.

While a full assault on Facebook's front door may prove extremely difficult, there are other ways in which attackers could try to hurt the social network. Facebook is a favorite of cybercriminals whose attacks include setting up fake accounts or accounts with links to malicious sites, and spoofing or hijacking the accounts of legitimate users and sending out emails with either embedded malicious links or requests for financial help.

"I don't consider DDoS or spoofing an account a 'hack,'" Randy Abrams, an independent security consultant told TechNewsWorld.

Taking Down Facebook's Walls

There are three primary means of attack, Abrams said.

One consists of spear phishing and planting malicious code that gains access to victims' accounts or computers. This has worked against Google (Nasdaq: GOOG) and other large organizations, and "I doubt that Facebook is immune," Abrams stated.

The second is exploiting a zero-day vulnerability.

The third is guessing a weak password. "We know from research into past data breaches that even some security experts don't use good passwords," Abrams said.

A good password, by the way, is one that has a combination of at least six to eight letters and numbers randomly mixed. A weak password would be something that's easily guessed, such as someone's date of birth or marriage or their car license plate number, for example.

Advance, Friend and Be Recognized

Passwords are likely to be the most critical weakness and the easiest way for someone to launch an attack on Facebook.

"Anonymous has managed to scoop up no small number of users' credentials during their forays," Cameron Camp, a researcher at ESET, told TechNewsWorld.

"Since it's common for people to use the same credentials on multiple sites, this becomes a potential attack vector, but not just for Facebook," Camp elaborated. Users should update their passwords regularly to minimize the possibility of hackers using these as an attack vector, Camp recommended.

Facebook spokesperson Gwendolyn Belomy declined comment on the purported threats from Anonymous.

What's a Hack, Anyhow?

If Anonymous were to attack Facebook, it may choose not to steal user information.

It's fairly common to use phishing or key logging to steal Facebook user credentials, but that's true of any site which uses static passwords, and it wouldn't let Anonymous make a "big noticeable splash" unless the group had been collecting user credentials for a long time, ActivIdentity's Harget said.

Instead, Anonymous would be more likely to disrupt the social networking site's operations or steal large amounts of data from the company itself, Harget opined.

However, like other security experts, Harget doubts the authenticity of the threat against Facebook.

"This claim seems suspect on the face of it," Harget said. "An equally plausible explanation is that some group figured out how to hack Facebook and so they are grasping for a justification to show off and make a big splash on a very popular site," he added.

"It's really hard to say if this is a broadly endorsed Anonymous plot or something from a particular subset of Anonymous members or even if it's valid at all," Azita Arvani of the Arvani Group told TechNewsWorld.

Internet » Kindle Cloud Reader Rains on Apple's In-App Fee Parade

Posted by echa 5:18 PM, under | No comments

Kindle Cloud Reader Rains on Apple's In-App Fee Parade | Kindle Cloud Amazon has found a way to give iPad users easy access to their Kindle books -- and the Kindle Store -- without having to give Apple a 30 percent cut of its revenue. Other content providers, including Walmart and textbook company Kno, are following suit. The trick? HTML5 Web apps with caching features that allow offline access. The apps also work with PCs and Android tablets equipped with browsers that support HTML5.

Amazon (Nasdaq: AMZN) unveiled a new HTML5 Kindle Web app on Wednesday. Kindle Cloud Reader, which is already up and running, provides access to books offline and online via a Web browser with no download or installation needed.

Currently the service works with Google (Nasdaq: GOOG) Chrome and Safari, both on PCs and the iPad. As with all Kindle apps, the cloud reader synchronizes with the user's Amazon Kindle Library.

Without leaving the app, customers can start shopping in the Kindle store, giving Amazon a way to circumvent Apple's (Nasdaq: AAPL) policy on in-app purchases, which requires that companies fork over 30 percent of their revenues to Apple.

Great Out of the Gate

Amazon is attempting to bring the simplicity and functionality of the Kindle app into a browser-based setting. Amazon is also guiding users on how to use the app on iPads.

"The Kindle Cloud Reader is a good first effort at a Web-based version of the app. It has a lot of the functionality of the main Kindle app," said Azita Arvani, principal of the Arvani Group.

"Amazon has done a pretty good job of informing the users what they need to do to make it work right," she told TechNewsWorld. "The user has to grant permission on the iPad to set aside 50 MB of space. The user is also informed on how to make the app icon become part of the home screen."

The Kindle app is still more user friendly and seems faster, Arvani noted. "The Kindle Cloud Reader presents the book as a linear sequence of text, [whereas] the Kindle app looks more fine-tuned for the iPad device."

The Kindle Cloud Reader gives Amazon another way to grant access to its wealth of Kindle texts.

"From a business perspective, Kindle Cloud reader is better for Amazon for two key reasons," said Arvani.

"For one, Amazon or any company developing an app could do a Web-based app (HTML5-based) and expect it to run fairly consistently across multiple devices. Of course, the actual consistency will depend on the support of HTML5 on the particular browsers on the device. Developing one Web-based app and being able to run it on multiple devices will drastically cut down on the development costs for Amazon," she explained.

"The second reason is that by not using the app store for distribution, Amazon can avoid paying app store taxes to Apple or Google or any other app store vendor for sales of any Kindle books," said Arvani. "So, they can pocket the 30 percent fees or share the savings with the users."

These two reasons will give app developers cause to look hard at HTML5 and the Web as a way to develop and distribute their apps, she suggested, but "that, of course, has to be balanced with the user friendliness and functionality of the Web apps versus the native apps."

Textbooks Go Through Facebook

Digital textbook company Kno also announced new Web reader capabilities on Wednesday. It will offer 100,000 digital textbooks over Facebook and through Know for Web, which works on computers and tablets using any major Web browser. The company already offers a Textbooks for iPad app.

Students can now purchase textbooks via the Kno website and access them using the Kno Facebook app or Kno for Web. The Facebook app allows them to share text with friends and study online together.

Students will also now be able to access Kno textbooks online via a Web browser, so students with laptops or Android tablets can also access their books. The Kno apps include a journal that allows the user to transfer notes, highlights, images and text into a portable digital notebook for studying on the fly.

Kno has also implemented a quiz game to help students better grasp material. To get the ball rolling on its e-textbook offerings, the company is giving away US$1 million worth of textbooks in a Facebook game called the "Wheel of Knowledge."

Virtual Study Groups

The Kno application's debut on Facebook is fitting, since Facebook started out as a college-based social media 6 Ways to Use Social Media for Business. Free Guide. site.

Kno is "giving students instant access to textbooks where they are already spending a large portion of their time," spokesperson Jennifer Stephens told TechNewsWorld. "With this new option, students can study alone or with their Facebook friends. They can even post questions from their textbook to their news feed."

Besides via Facebook, students can access their Kno textbooks from a browser on PCs or tablets, or through the Textbooks for iPad app.

In the university world, there is a strong movement toward online-only and hybrid classes. Online textbooks make sense for the virtual classroom.

"We believe that today's news is just the first step in bringing the power of digital technology to textbooks," said Stephens. "Kno plans on adding more features and functionality to enhance the student experience."

Computing » The Future of Android, Part 2: Security Snafus

Posted by echa 5:15 PM, under | No comments

The Future of Android, Part 2: Security Snafus | Android As the Android world grows, it becomes an increasingly juicy target for malware. Infected apps have been spotted in various Android app outlets on numerous occasions. The platform is less restricted than Apple's, for example, and with those freedoms sometimes come security dangers. Critics say Google could address Android's security issues with a few tighter control policies.

The Future of Android, Part 1: The Legal Squeeze

The number of attacks on Android devices has been rising over the past few months.

The malware has exotic names such as "Zitmo," "DroidDreamLight," "Hong Tou Tou," "DroidKungFu," "YZHCSMS," "Geinimi" and "Plankton."

In January 2010, Google (Nasdaq: GOOG) removed more than 50 fake banking apps from the Android market, and in March of this year, it removed another 50 infected apps, Amit Sinha, chief technology officer at Zscaler, told LinuxInsider.

Meanwhile, Android smartphones are growing in popularity. They have extended their lead in the United States and Canadian markets, according to IDC's worldwide mobile phone market report for Q2, 2011.

That will make for a bigger pool of targets.

"Android has the potential to become the dominant OS for smartphones," Sinha said. "And ... hackers will aggressively target Android."

Add in Google's support for NFC -- near field communications -- in Android; its launching of Google Wallet, which is undergoing field tests now; and PayPal's using NFC on Android to make payments easier, and we could have a bit of a problem.

But that's not all. Even if e-wallet features don't take off, NFC has another ace in the hole -- it lets owners of NFC-capable smartphone transfer documents by touching their devices together.

You can watch a YouTube video demoing that feature on the Nokia (NYSE: NOK) N9 smartphone here.

The implications for enterprise security are vast, especially when you recall that the increasing consumerization of IT means people are using their own mobile devices at work.

Is Google's to blame for the increasing number of attacks on the Android OS because of Android's design and the hands-off policy Google maintains towards the OS? Will Android survive and be made more secure? Or will Google's laissez-faire attitude finally kill off the OS?

Google did not respond to requests for comment by press time.

Follow the Money

In September, Fortinet came across a banking Trojan it named \u201cZitmo.\u201d That Trojan steals one-time banking passwords. It resurfaced in July.

The mobile malware threat is expected to grow, security experts warn.

"In addition to mobile banking, many retail commerce transactions are expected to take place on mobile phones, and the cybercriminals will go where the money is," Neil Daswani, CTO and co-founder of Dasient, told LinuxInsider.

However, we may have some time before mobile banking really becomes a major security issue.

Many banks still haven't enabled mobile transactions on their websites, indicated Mickey Boodaei, CEO of Trusteer.

"Since online fraud is mostly a big numbers game, attacking mobile bankers is not yet a profitable fraud operation," Boodaei remarked.

That situation will change soon. Trusteer predicts that within 12 to 24 months more than 5 percent of all Android phones, iPads and iPhones could become infected by mobile malware.

Preparing for the Mobile Malware Rush

Device makers and app developers have to shape up in preparation for the expected flood of attacks on NFC-enabled devices once mobile banking takes off.

"The NFC Forum defines the contactless protocol between devices, so much of the security is the responsibility of application providers and manufacturers," Debbie Arnold, the forum's director, told LinuxInsider.

The forum's role is just to define the contactless protocol between devices, Arnold said.

Was Android Built Wrong?

The problem lies in Android's security architecture, and the proof is that it's easy to build applications that can get access to sensitive operating system resources such as text messages, voice, location and more, Trusteer's Boodaei told LinuxInsider.

However, not everyone agrees this is really an issue.

"While the security architecture of Android as well as other mobile OSes can certainly be improved, just as desktop OS security has improved over the decades, the security architecture itself isn't responsible for malware propagation," Daswani said.

Tens of thousands of new malware binary variants are created for Windows and Mac OS, for example, Daswani pointed out. The problem of security isn't going away any time soon, he opined.

Permissions Are a Hollow Protection

In its defense, Google has repeatedly pointed out that all downloaded apps request permission to access resources on uses' smartphones, and users can just say no.

That isn't enough, Boodaei contends.

Users usually just say yes because many applications request access to an "extensive list" of resources, Boodaei explained.

Google could make Android's permissions model more fine-grained, Dasient's Daswani suggested.

For example, when an Android app requests access to the Internet, it gets access to everything, including malicious domains and websites, Daswani said. Instead, Google should perhaps restrict an app's access to the Internet to only what it actually needs.

"That follows the principle of least privilege, which is well-known in the security community,\u201d Daswani remarked.

Google's Slow Anti-Malware Shuffle

In addition, Google doesn't check apps before letting their authors post them on the Android Market. Also, Google has sometimes been criticized as slow to respond to complaints about apps containing malware.

"Distributing fraudulent Android applications is trivial," Trusteer's Boodaei alleged. "There are no real controls around the submission process that could identify and prevent the publication of malicious applications. Compared to Apple's (Nasdaq: AAPL) App Store, the Android Market is the Wild West."

Further, a Google Web page requesting that Google review and take down inappropriate apps from the Android Market is hard to find, Boodaei said.

The form doesn't appear to be of much use, either, he said.

"We used it a few times with no results," Boodaei groused. "In order to have an application on the Android Market taken down, we had to use contacts within Google who are not available to the average user."

Google needs to make "major improvements" in its process of identifying and removing malicious apps from the Android Market, Boodaei said.

"Google already has a kill switch to remotely remove malicious apps, but this approach is reactive," ZScaler's Sinha stated. "They need a more proactive approach to screening and testing apps prior to allowing them on the market."

Further, Google should control the installation of apps from other app stores such as Amazon.com (Nasdaq: AMZN) because "this approach, while open-source friendly, makes the attack surface too big to protect," Sinha said.

Computing » PiTiVi: A Solid B-Lister of a Movie-Maker

Posted by echa 5:11 PM, under | No comments

PiTiVi: A Solid B-Lister of a Movie-Maker | PiTiVi PiTiVi may not have quite the same variety of features and functions found in certain other open video editing applications. However, more complex video apps can be downright intimidating to use, and PiTiVi's interface is simple enough for newbies to handle. The application's motto of "anything in/anything out" is a good clue to the degree of flexibility this film editor provides.

PiTiVi is a GTK-based film editor that shows promise but lacks enough refinement to be much more than a "lite" version of other film packages. Its interface is simple enough to use as it was designed, with both newbie and seasoned film fanciers in mind.

A Solid B-Lister of a Movie-Maker
 PiTiVi

PiTiVi was created in 2004 by a team of student developers. Recent versions are rewritten in Python and wrap around the GStreamer Multimedia Framework. The latest version, 0.14.0, was released in June 2011. It solves a bevy of missteps but still has room for improvement.

PiTiVi's overall simplicity earns it kudos for usability. Still, this app is not yet a perfect replacement for some of the more more established film editing alternatives. These include AvideMUX, Cinepaint, Kino, Viva and FFmpeg. But its new-kid-on-the-block status does not mean that PiTiVi is a poor choice for film editing.

Instead, the application's motto of "anything in/anything out" is a good clue to the degree of flexibility this film editor provides. If the file format is supported by the GStreamer Multimedia Framework, PiTiVi can import and export any film format you have. Learning to use its feature set is easy. The Framework manipulates importing and and runs the multimedia functions.

Good GUI

The Graphical User Interface (GUI) is one of the design tricks that makes PiTiVi work so well. You can import video clips to PiTiVi's Media Library by clicking the Import button and selecting the file or files to import. Complete the import by clicking on the Add button in the file selector window that appears. A faster method is to drag the file directly into the media library box.

The video files display by file name or thumbnail in the media library window on the top left portion of the application's display. The right click button on the mouse also accesses the import file command as well as the Remove Clip command.

The running view of the clip plays in the viewer space on the upper right portion of the application window. To start the process, right click on the thumbnail or the file name in the media library. Basic control buttons under the running clip are forward/reverse and start/stop/pause the playback. A digital running time readout is to the right of these buttons.

The entire bottom portion of the application window shows a time line with the video and audio segments of the running clip. They display as a series of still previews. To do any editing, drag the video clip from the media library into the editing workspace below the time line. This also loads the clip into the viewing window.

Easy Startup

PiTiVi does not require much in the way of setup decisions. The preferences are divided between the Appearance and the Behavior panels.

The only choice for the Behavior is setting the snap distance in pixels. The options for appearance resemble settings for a text editor. You can set the clip audio and video background colors, the clip font and the selection color.

The only other appearance choices are showing or hiding video thumbnails and audio waveforms. You can also set the thumbnail gap in pixels.

Using It

PiTiVi is surprisingly intuitive to use. By default, the app separates the video and audio channels into separate displays under the timeline. This makes it handy to edit each element individually. But the app also by default moves or deletes linked audio and video tracks so the editing process is unified when you want it to be.

You can do simple cut and paste operations very easily using the tool bar buttons at the bottom of the application window. You can also render video in many formats with minimal effort. This again is where the well-designed GUI kicks in.

Two small buttons cut clips into editable segments. You can delete them as well as detach an audio clip from video or attach a new audio clip to the video. To arrange clips just click and drag a video segment to a new location. Other editing choices are buttons for group/ungroup clips, linking arbitrary clips together and breaking linked clips.

Once you drag a clip next to another segment, they are linked or stuck together. Use the small slider bar on the left side of the time line to stretch or shrink it. This process lets you view finer segments or pull back for a bigger view.

Project Settings

One of the most detailed settings options is found in the Project Settings menu. This opens a panel that lists video and audio export choices and export requirements. It is really a neat approach to cataloging information about the film project you create. For example, you can enter the project (file) name and provide a detailed description of the contents.

The video output options are in a scrollable list that includes formats for PAL DV/DVD, NTSC, 720p HD, 1080p full HD, QVGA, VGA, SVGA, XGA and custom Making -- that last choice lets you specify width, height and frame rate.

The Audio output choices are less more limited. You can select CD or custom. The custom choice opens options to select two-channel stereo or mono sound track. You can also select from among six frequency rates. Four sound depth options available are 8 bit, 16 bit, 24 bit and 32 bit.

Export container options include more than two dozen formats.These include Ogg Muxer, ASF Muxer, MJ2 Muxer, 3GPP Muxer and a long list of FFmpeg varieties. The audio codec is automatically selected based on the container format choice you make. Video codec selection offers choices only when the selected container offers them.

Bottom Line

PiTiVi is a good starting point for video editing. Its intuitive design gets you working quickly. Its included tool set is fine for light-to-moderate skill levels. But what it does not include makes it too limiting for more advanced skill levels.

I would think twice about using this application for professional-strength editing. But if the film tasks are within its boundaries, PiTiVi can be a very workable tool for editing and creating film projects.

Computing » Nokia Goes All In With Windows Phone in North America

Posted by echa 5:06 PM, under | No comments

Nokia Goes All In With Windows Phone in North America | Nokia
Feature phones and Symbian devices will no longer be on Nokia's North American menu. The handset maker is putting all its chips on Microsoft's Windows Phone platform for its North American operations, abandoning a fading operating system as well as the cheap phones that earned the company few points with major U.S. wireless carriers.

Nokia (NYSE: NOK) revealed a bold move Wednesday as it announced its North American operations will stop selling cellphones based on its Symbian operating system and introduce from now on only smartphones based on Microsoft (Nasdaq: MSFT) Windows Phone 7.

The head of Nokia's U.S. subsidiary, Chris Weber, broke the news in an interview with the Wall Street Journal's AllThingsD.

The move means Nokia will stop selling in North America all Symbian-based handsets. This includes both smartphones and feature phones -- inexpensive mobiles running simpler operating system versions like S40.

While Nokia will stop selling Symbian phones in North America, it will continue to support the users who already have the mobiles, Nokia spokesperson Karen Lachtanski told the E-Commerce Times.

Carrier Disfavor

"Nokia has a lot of history in the U.S. It just hasn't been a successful history, unfortunately," ABI Research's Mobile Devices Analyst Michael Morgan told the E-Commerce Times.

Nokia, he maintained, catered disfavor with U.S. carriers by selling low-priced cellphones. "Using those low-priced handsets allowed them to circumvent the need for carrier subsidization," he said. "The handsets were cheap enough to go directly into the pre-paid market."

While Nokia's spin on its exclusive move to Windows Phone 7 in North America is that it allows the company to make a clean break with its past and a fresh start for its future, Morgan argued that the Finnish handset maker may be trying to impress North American carriers that it's turning over a new leaf.

"There's a bit of a political play here," he said. "They're saying to the carriers that they're going to stop circumventing and putting out these cheap handsets that don't get subsidized through your channel."

Moreover, losing the feature phone business won't have much impact on Nokia's North American business, according to Morgan, who estimated that feature headsets represent only 2 to 5 percent of Nokia's business on the continent.

"They can lose it and not blink an eye considering what they're losing in other places at this point in time," he declared.
RIP Feature Phone?

Furthermore, the handwriting is on the wall for feature phones in the United States, according to IDC Senior Research Analyst Ramon Llamas. "A lot of people are abandoning their feature phones and moving to smartphones," he told the E-Commerce Times.

Other handset makers are changing their portfolios to reflect that change, he continued. "Nokia is the only one that's making a clean break," he said. "Everybody else is stuck in the middle of a transition."

The U.S. market is heading rapidly toward being a smartphone-only market, agreed Gartner (NYSE: IT) Analyst Nick Jones.

"We'll see very low-cost Android devices -- (US)$100 and below -- over the next few years, which will make feature phones irrelevant in the U.S.," he told the E-Commerce Times. "By 2015 we expect over 80 percent of the handsets sold in the U.S. will be smartphones, so the feature phone market is evaporating."

"Symbian is a dead platform," he added. "So as Symbian had very little traction in the U.S. and it's being abandoned, it makes no sense to spend any time and effort on it."
Needed Boost for WinPho7

Nokia's decision to place all its North American eggs in the Windows Phone 7 basket is not only important for the Finnish firm, but for Microsoft as well, maintained Rob Sanfilippo, research vice president for Directions on Microsoft.

"I think that Microsoft's partnership with Nokia is critical to the success of the Windows Phone platform, so Nokia's move to focus on Windows Phone in North America is a good sign for the platform," he told the E-Commerce Times.

"Windows Phone 7 is a great product," he said. "However, the delivery of superior technology may not be enough to gain substantial share in the complex smartphone market. Other factors such as market momentum, OS licensing, operator affinities, developer mindshare, and customer-perceived 'coolness' have driven smartphone sales trends."

"The Nokia partnership is the only potential catalyst for Windows Phone success," he continued. "If Nokia's transition to Phone 7 goes smoothly and quickly, and Nokia is able to preserve its customer base, Phone 7 could be given the boost it needs to achieve sales numbers similar to iPhone and Android-based phones."

Related Posts Plugin for WordPress, Blogger...