Email and Forum Questions Profiles in IT: Dr. Verner Vogels FCC appears to delay Net neutrality rules FCC Chairman Explains Four Principles of Net Neutrality Innovative Website of the Week: Richard Geller’s Site About Something iPhone Forensics YouTube to turn profit this year: NY Times
Email from Robert Taylor: Hey Doc, Still enjoying your show in Amarillo, TX. I heard David Byrd talking up his Iphone again while I was “actually” looking at the battery in my Samsung Omnia II. I did not need to change it but it is nice to know I can! The Omnia II is actually a pretty good phone that runs Windows mobile 6.5 and has been stable for the 9 months. My son has an iPhone and has had to reload the software on it about 4 times.
A quick question about Outlook 2007. I started to see an upswing in junk email so I wanted to use the junk email filter that allows you to create a block senders list. I have noticed that there was only one email address in there even after I added several. I have found that no matter how many addresses I add to the block senders list, they all disappear after shutting Outlook down and then restarting it, leaving only that one address. I looked on the web for a solution and only found one that says the key in the registry that controls that file was corrupt and to delete the key in the registry for the block senders list. This did not work and now I am out of ideas. Any suggestions on how to fix this? Thanks for any help and you still have the best techtalk show out there. Thanks. Robert Taylor
Tech Talk Answers: Did you upgrade to Outlook 2007? If you have upgraded to Outlook 2007 from Outlook 2003 or XP, chances are that the old addins are not compatible with 2007 and may be the reason behind sluggish performance for hanging up while exiting. Try opening Outlook in the safe mode (start -> Run dialog and type outlook /safe). Then add the addresses to the block sender list and exit.
Best solution: a fresh install, then an import of your old 2003 .pst file.
Email from Lauren: Dear Tech Talk, I own a HP G85 All-In-One fax/copy/print/scan printer. It has worked Great for many years. I have VoIP Phone service. I use to have Vonage and Could Send Faxes without any problem. I never had to do any adjustments with the fax settings. Just started a new account with a New phone company, NetTalk.
When I asked if I could send faxes, they said Yes!! But, they said I needed to set fax machine Baud rate to: 9600, and I did. They told me I needed to change the error correction mode to OFF. I did.
After all of that, the fax display says, "Off hook" I DID connect the phone line to the fax machine/G85 all in one. And I plugged it phone line into the phone device. Still this is not working. Please help. PS The tech support at NetTalk seems limited…Thanks, Lauren
Tech Talk Answers: VoIP has compression algorithms that interfere with faxing. In order to get the fax to work on Ooma, the VoIP service that I have, I must turn off VoIP compression by entering *99 before the number that I am faxing too. Without *99, the fax will not go through.
I went to the NetTalk support website. They said that, “You can use a fax machine. If you are keeping a land line just for your fax, get rid of it! Keep in mind, you must have fax machine that supports VoIP (Voice over Internet Protocol)”
They also have a footnote at the bottom of their home page. * Faxing on best effort basis due to VoIP technology.
The off-hook indicator is measuring the line impedance and thinks another phone on the circuit is off-hook. This should not be affected by the ECM or Baud rate settings.
Email from Angelica: Dear Tech Talk. What happens when my anti-malware tool quarantines something? How does the Quarantine function by an anti-malware software works? Specifically, when a malware is placed in quarantine, how is that malware rendered impotent? Is the quarantine escape-proof? Should we delete a malware from quarantine as soon as I am sure it’s not a false positive? Angelica
Tech Talk Answers: Even though "quarantine" is a common term among anti-malware tools, there’s actually not a consistent definition of exactly what it means. Malware being quarantined in all likelihood means this:
The file identified as containing malware is moved to a folder that Windows would normally not look in. The file is renamed. Much malware relies on the filename being similar to existing Windows files, and/or being a file type – such as ".exe" – that Windows would normally run as a program. Renaming the file removes both of those possibilities, preventing Windows from running the file, and making it obvious by it’s name that the file is in quarantine.
The file may also be marked as "hidden", or (if on a file system that supports it) the permissions on it may be reset such that the file cannot be opened by normal system processes.
The only way malware could return is if you manually restored it outside of the anti-malware software. I’m not aware of any malicious way that malware would return from the grave. , As a result, I don’t see a pressing need to delete malware from quarantine; it’s just not likely to come back from there. But then again I also don’t see a reason not to.
Profiles in IT: Dr. Verner Vogels
Dr. Werner Vogels is the Chief Technology Officer and Vice President of Amazon.com
Verner Vogels was born October 3, 1958 in Amsterdam, Netherlands.
Vogels received a Ph.D. in Computer Science from the Vrije Universiteit in Amsterdam.
He is the author of many conference and journal articles, mainly on distributed systems technologies for enterprise computing systems.
From 1991 through 1994 he was a senior researcher at INESC in Lisbon, Portugal.
From 1994 until 2004, Vogels was a scientist at the Computer Science Department of Cornell University, conducting research in scalable reliable enterprise systems
He joined Amazon in September 2004 as the Director of Systems Research.
He was named Chief Technology Officer in January 2005 and Vice President, World-wide Architecture in March of that year.
In charge of driving technology innovation within the company, Vogels has broad internal and external responsibilities.
He is the only executive apart from Amazon’s CEO Jeff Bezos to speak publicly on behalf of Amazon.com.
Vogels maintains a technology oriented weblog named “All Things Distributed” which he started in 2001 while he was still at Cornell.
Vogels described the deep technical nature of Amazon’s infrastructure work in a paper about Amazon’s Dynamo, the storage engine for the Amazon Shopping Cart.
He is in general regarded as one of the world’s top experts on ultra-scalable systems and he uses his weblog to discuss issues such as eventual consistency.
When he was hired by Amazon, he characterized his job as that of a “big thinker” conceptualizing a scalable framework for Amazons web services.
Now that the system has been created, he has evolved into a “cloud computing” and HPC on-demand evangelist explaining the service to potential clients. He has gone from technologist to teacher….a perfect role for a former professor.
He preaches the 70/30 rule. 70% of the time is spent of undifferentiated infrastructure heavy lifting and 30% of the time is spent of differentiated value creation. He wants to sell you the 70% so you can spend time on the 30%.
During 2008 it became evident that Vogels was one of the architects behind Amazon’s approach to Cloud Computing, the Amazon Web Services (AWS).
During that year Vogels was continuously on the road to promote Cloud Computing and AWS and its benefits to the industry.
Information Week recognized Vogels for this educational and promotional role in Cloud Computing with the 2008 CIO/CTO of the Year award.
Vogels is married to Annet Vogels, a former musician with the Netherlands Philharmonic Orchestra. They have two daughters.
FCC appears to delay Net neutrality rules
The Federal Communications Commission said it will be conducting a "further inquiry" into the details of broadband regulation, including whether wireless networks should be exempted from strict Net neutrality rules, a concept that Google and Verizon recently endorsed.
Technological developments, including per-usage plans from AT&T Mobility and Leap Wireless, have changed the wireless marketplace so much that more research is needed.
The agency asked: "To what extent should mobile wireless providers be permitted to prevent or restrict the distribution or use of types of applications that may intensively use network capacity?"
The Google-Verizon announcement last month said that they would "not now apply most of the wireline principles to wireless," except a requirement that wireless providers disclose their network management practices.
Complicating the debate over Net neutrality are technological differences in wireless and wired networks.
As many iPhone users can attest, high-volume users can readily clog wireless networks, which have far more capacity constraints than cable or DSL links.
Ever since a federal appeals court in April unanimously rejected the FCC’s attempt to punish Comcast for throttling some BitTorrent transfers, the FCC has been struggling to come up with a way to regulate broadband providers.
A majority of members of Congress have said that they oppose new regulations.
The slow pace of the federal regulatory process, coupled with a desire for certainty on what rules will apply, has led usual rivals including AT&T, Google, Comcast, Verizon, and Microsoft to form a technical advisory group that hopes to draft suggested rules that are politically palatable.
Public comments can be submitted on the FCC’s Web site under these proceedings: GN Docket No. 09-191 and WC Docket No. 07-52.
The other topic the agency asked for comments on is "specialized services," meaning non-Internet services that flow across the same last mile facilities used for broadband connectivity.
FCC Chairman Explains Four Principles of Net Neutrality
The existing principles can be summarized this way:
Network operators cannot prevent users from accessing lawful Internet content, applications, and services of their choice
Network operators cannot prohibit users from attaching non-harmful devices to the network.
Internet access providers cannot discriminate against particular Internet content or applications, while allowing for reasonable network management.
Internet access providers must be transparent about their network management practices.
ATT, Verizon, and Google agreed to these terms…for wired networks. But not for wireless networks.
Innovative Website of the Week: Richard Geller’s Site About Something
Explore a fanciful world to discover his songs and books.
Very engaging and innovative. I spent over 15 minutes exploring this site.
Kudos to a truly innovative site
Law-enforcement experts said iPhone technology records a wealth of information that can be tapped more easily than BlackBerry and Droid devices to help police learn where you’ve been, what you were doing there and whether you’ve got something to hide.
"Very, very few people have any idea how to actually remove data from their phone," said Sam Brothers, a cell-phone forensic researcher with U.S. Customs and Border Protection who teaches law-enforcement agents how to retrieve information from iPhones in criminal cases.
Two years ago, as iPhone sales skyrocketed, former hacker Jonathan Zdziarski decided law-enforcement agencies might need help retrieving data from the devices.
He wrote a 144-page book, iPhone Forensics for O’Reilly Media.
Every time an iPhone user closes out of the built-in mapping application, the phone snaps a screenshot and stores it. Those screen snapshots can contain images of e-mails or proof of activities that might be incriminating.
iPhone photos are embedded with GEO tags and identifying information, meaning that photos posted online might not only include GPS coordinates of where the picture was taken and the serial number of the phone that took it.
Even more information is stored by the applications themselves, including the user’s browser history. That data is meant in part to direct custom-tailored advertisements to the user, but experts said that some of it could prove useful to police.
Clearing out user histories isn’t enough to clean the device of that data. With the iPhone, even if it’s in the deleted bin, it may still be in the database. Much is contained deep within the phone.
Most iPhone users agree to let the device locate them so they can use fully the phone’s mapping functions, as well as various global positioning system applications. The free application Urbanspoon is primarily designed to help users locate nearby restaurants. Yet the data stored there might not only help police pinpoint where a suspect was during a crime.
Phone call histories and text messages most useful in homicide cases.
The iPhone logs everything that you type in to learn autocorrect" so that it can correct a user’s typing mistakes. Apple doesn’t store that cache very securely. Someone with know-how could recover months of typing in the order in which it was typed, even if the e-mail or text it was part of has long since been deleted.
The courts have treated mobile phones like a within-reach container that police can search the same way they can check items in a glove box or cigarette pack.
However, the Ohio Supreme Court in 2009 ruled to bar warrantless searches of cell phone data. That case is being appealed to the U.S. Supreme Court.
YouTube to turn profit this year: NY Times
Google-owned videosharing website YouTube is expected to turn a profit this year on revenue of 450 million dollars, The New York Times reported Friday.
The newspaper, in an article about the rise of advertising on YouTube, said the site’s revenue has more than doubled each year for the last three years.
Google does not release revenue figures for YouTube, which the Internet search giant bought for 1.65 billion dollars in 2006, but senior executives have suggested recently that it is near profitability.
YouTube has been gradually adding professional content such as full-length television shows and movies to its vast trove of amateur video offerings in a bid to attract advertisers.
Schmidt said he asked YouTube’s management team about a year and a half ago to start focusing on revenue.
He said the strategy had been to amass "an audience first, then figure out the tools that will create the revenue."
Britain’s Financial Times reported earlier this week that YouTube is in negotiations with Hollywood studios to launch a global pay-per-view video service by the end of 2010.
It said viewers would stream rather than download the movies and pay about five dollars for newer titles.