Shared posts

02 May 17:54

Skype sets group video calling free on desktops, Xbox One

by Kif Leswing

Skype group video calling will be free on desktop computers and the Xbox One, said Microsoft in a blog post Monday. Previously, the feature was included as part of Skype Premium, a subscription plan costing $8.99 per month. According to Skype marketing manager Phillip Snalune, “in the future, we’ll be enabling group video calling for all our users across more platforms – at no cost.” Hopefully, those platforms include Skype’s mobile apps on iOS, Android, and Windows Phone.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

27 Apr 23:54

Google’s incredibly simple formula for killer résumés

by Zeus
It’s not exactly E=mc². But for would-be job hunters, it’s probably a lot more useful. In a Q&A-style interview with Google’s senior vice president of people operations Laszlo Bock, The New York Times’s Tom Friedman fished a few seriously helpful words of wisdom out of the search giant’s human resources chief. This one is perhaps the most […]
27 Apr 00:54

What Heartbleed Revealed About Customer Experience

by Reed Henry

Failure to Communicate

TransGriot.blogspot.com

By now, we’re all familiar with Heartbleed, the bug that affected everything from retail to banking to social media sites and exposed users’ private data such as usernames, passwords and session keys for as long as two years.

As if exposing that amount of personal information isn’t concerning enough, Heartbleed also revealed another serious flaw: Very few businesses are prepared to communicate with their customers during a crisis.

Let’s rewind to the first days of Heartbleed. As more and more information surfaced about the bug, the media (understandably) became everyone’s information source on the bug’s origins, what was affected and the specific steps everyone needed to take to protect themselves. No matter where you went, there was an online article, a blog post or a TV segment on Heartbleed. In fact, the media provided us with the most information about Heartbleed, including what passwords to change and how to do it.

The only place that wasn’t getting enough detail about Heartbleed was where it mattered most: Your inbox.

Whether it was email, SMS or even voicemail, we found that customers received minimal if any direct communication from even the most trusted brands. Considering the severity of this bug, what gives?

A few companies nailed the proactive customer communication: American Funds and Prezi sent company emails to customers with clear instructions detailing how to change passwords. The most frustrating part, however, has been the lack of updates from sites that have supposedly been targeted by this bug. Facebook and Gmail, for example, didn’t immediately prompt users to change account passwords, yet these companies have been reported as potential targets.

Heartbleed uncovered that very few businesses were prepared to quickly reach their customers in a crisis. Regardless of whether the business was affected or not, many companies risked their customer loyalty and potentially damaged their customer experience by saying nothing at all.

Building customer loyalty involves reaching your target customers in the right ways, establishing a superior customer experience and understanding how to develop a customer’s emotional loyalty. How a company responds to a crisis can solidify or shatter customer loyalty. During times of crisis, companies need to remember the customer PACT:

  • Prepare

    Whether it’s a small pop-up shop or a global organization, no business is immune to a crisis. Brainstorm common scenarios experienced by similar businesses, anticipate the off-the-wall situations, and develop a crisis plan for each.

  • Act

    In the case of Heartbleed, not all of the facts were immediately available, and the extent of its reach is still nebulous. In a vacuum of facts, silence can still signal that the business doesn’t value the customer’s loyalty. Even as a business assesses the impact of a crisis, proactive communication speaks volumes — let customers know the existing facts, where they can speak to a customer-service representative and the company’s commitment to the customer.

  • Comprehensive & cohesive

    A crisis tests a business’s multi-channel customer experience, because customers will expect to get answers on email, phone, Web and social media. Ensure that the business is prepared to engage with customers on all of these channels, and are armed with accurate facts, resources and recommendations.

  • Transparent

    A crisis is a marathon, not a sprint. Continue to communicate with customers, share all of the facts and don’t go quiet until the crisis has passed.

Building, strengthening and keeping customer loyalty may be one of the hardest challenges, but it’s certainly one of the most rewarding once achieved. If the business is swift, proactive and sticks to the customer-experience PACT, companies can navigate the crisis and preserve their customers’ trust.

Reed Henry is the chief marketing officer at Genesys. Prior to Genesys, he led marketing for ArcSight Corporation; before that, he led marketing and business development for SeeBeyond, and co-founded Vertical Networks, a company delivering contact center and unified communications solutions. Reach him @Genesys.

27 Apr 00:50

Report: Samsung Chromebook 2 delayed until end of May

by Kevin C. Tofel

Were you hoping to have a new Samsung Chromebook 2 at the turn of the month? I was but it doesn’t appear likely: Joe Wilcox reported at BetaNews on Friday that Samsung is delaying availability of its new Chromebook. This follows official pre-orders that Samsung began on April 7 with expected delivery in 14 to 21 business days.

According to Wilcox, Samsung’s press group provided this simple but terse statement: “The product is now shipping at the end of May”. I checked Amazon’s pre-order page for the new Chromebook 2 and saw release dates of May 29, which supports Wilcox’s story. He had pre-ordered the 13.3-inch model prior and has been seeing the date slip:

“I ordered one on April 8 from Amazon with delivery date of April 29, which put expected launch a day earlier. But then on April 10, Amazon emailed that my new delivery date would be May 2 and the website indicated availability on the 1st. Last week, Amazon changed the date to May 15 and by the beginning of this week to May 29.”

Without an official reason for the delay, we can only speculate as to the issue. It could be a simple production problem. But there’s really little difference in most of the Chromebooks being built and sold today. The biggest two for the Samsung Chromebook 2 are the 1920 x 1080 resolution display on the larger model — most Chromebooks use 1366 x 768 screens — and the eight-core Samsung Exynos 5 chip that will power the new laptops.

Chromebook2 open

My gut says that if there is a technical issue, it has to do with the latter difference.

Chrome OS may not be optimized to take full advantage of the octo-core Exynos 5 processor. If that’s the case, the Chromebook 2 performance may not be as good as Samsung would like. And performance could be a key attribute for those considering the Chromebook 2 because the Intel Haswell-based Chromebooks offer great performance at a lower cost; Samsung is planning to sell the Chromebook 2 laptops for $319.99 and $399.99, depending on the model.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

24 Apr 15:00

You’ll soon be able to unlock a Chromebook by placing your Android phone nearby

by Kevin C. Tofel

Android phones may soon be the perfect partners for Chromebooks. A new “easy unlock” feature appeared in the latest development release of Google’s Chrome OS software, allowing for a Chromebook to be unlocked simply by placing an Android phone next to it. The feature was spotted by Android Police, which found this informational screen after enabling the feature.

unlock-chrome-os

Since I haven’t yet seen a Chromebook with NFC, or near-field communications, the linking here is likely done through Bluetooth. That’s a common feature found on phones as well as Chrome OS devices. And Bluetooth’s functionality has steadily improved with low-power communications that can be used for location purposes. In fact, my Moto X uses Bluetooth in a similar fashion, but in reverse: If I have a trusted Bluetooth device near my phone — a Bluetooth headset, for example — the handset won’t lock.

The easy unlock feature isn’t yet complete. After enabling it, you’ll be able to see configuration options to set up your Android phone as a wireless key, but you can’t actually do that yet. My guess is that this feature won’t work until the June Google I/O developer event, as it could require an update to Android. It’s possible Google could release the feature sooner, but at this point on the calendar, it makes sense for it to be a part of the bigger Chrome OS and Android story on stage.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

23 Apr 15:54

Amazon adds HBO shows to Prime Instant Video; HBO Go coming to Fire TV at some point

by Laura Hazard Owen

Amazon now has streaming rights to a number of HBO series and will make them available through Prime Instant Video starting May 21, the company said Wednesday.

In addition, Amazon said that it will add HBO Go to its recently launched streaming video box, Fire TV — “targeting a launch by year-end,” though it sounds as if it could happen later.

This is the first time that HBO has included its shows in an outside subscription streaming service — HBO content has never been available for streaming on Netflix. Prime Instant Video’s selection won’t be comparable to the content available through HBO Go, though, and new episodes aren’t included. Here’s what Prime members will get beginning May 21, per the release:

  • All seasons of revered classics such as The Sopranos, The Wire, Deadwood, Rome and Six Feet Under, and of recent favorites such as Eastbound & Down, Enlightened and Flight of the Conchords
  • Epic miniseries, including Angels in America, Band of Brothers, John Adams, The Pacific and Parade’s End
  • Select seasons of current series such as Boardwalk Empire, Treme and True Blood
  • Hit original movies like Game Change, Too Big To Fail and You Don’t Know Jack
  • Pedigreed documentaries including the Autopsy and Iceman series, Ghosts of Abu Ghraib and When the Levees Broke
  • Hilarious original comedy specials from Lewis Black, Ellen DeGeneres, Louis CK and Bill Maher

Some of HBO’s newer shows will also be available, with a substantial delay: “Previous seasons of other HBO shows, such as Girls, The Newsroom and Veep will become available over the course of the multi-year agreement, approximately three years after airing on HBO.” Note that there’s no mention of Game of Thrones, or Sex and the City for that matter.

“Amazon has built a wonderful service—we are excited to have our programming made available to their vast customer base and believe the exposure will create new HBO subscribers,” Charles Schreger, HBO president of programming sales, said in a statement.

Prime Instant Video is available to Amazon Prime members, who pay $99 per year for unlimited two-day shipping, streaming video and access to some ebooks. The company recently raised the price of Prime from $79, citing increased transportation and fuel costs, and said it would continue to build up its library of streaming TV and movies. Amazon will report its Q1 2014 earnings on Thursday.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

23 Apr 15:52

The Facebook Effect: WhatsApp Is Well On Its Way To A Billion Users

by Dave Smith

In just two months since Facebook dropped $19 billion to buy WhatsApp, the five-year-old mobile messaging app on Tuesday announced its active user base has grown to more than half a billion people.

On February 17, the day it was acquired by Facebook, the company said it had 450 million monthly active users worldwide and over 320 million daily active users.

“In the last few months, we’ve grown fastest in countries like Brazil, India, Mexico, and Russia, and our users are sharing more than 700 million photos and 100 million videos every single day,” WhatsApp said on its blog. “We could go on, but for now, it’s more important that we get back to work.”

Facebook: The Key To Growth

This is not the first time that an app has seen a major pop in users after it was acquired by Facebook. When Facebook bought Instagram in April 2012, the service boasted some 30 million users. In one month after the deal, Instagram gained 20 million new users. By July, Instagram grew to 80 million active users. Adding an Android app in addition to its iPhone app certainly helped, but the Facebook effect is a definite reality. Instagram managed to increase its user base by more than 10 million users on average per month.

WhatsApp seems to be having a similar growth spurt, gaining roughly 25 million users each month since the Facebook deal was announced. Even for an app with astronomic growth like WhatsApp, those are impressive numbers.

It’s clear that WhatsApp has the legs to grow in both developed and emerging markets, especially as a cheap alternative to SMS. The chart below from analytics firm comScore (which doesn’t include WhatsApp’s fifth year of existence) shows just how much the service had grown prior to being bought by Facebook.

At this rate, it should only take less than a year for WhatsApp to reach a billion users worldwide.

Facebook is still in the process of completing its $19 billion purchase of WhatsApp, which included cash and various stock options. The deal has been approved by the Federal Trade Commission but still needs international regulatory approval before the purchase can become final.

22 Apr 17:01

Shareswell Sets Up Wedding Registries for Stock, to Help Couples Invest in the Future

by Liz Gannes

Emily Washkowitz is getting married this summer. In the lead-up to the wedding, she and her fiance have already received multiple toaster ovens. “Now I have an $89 credit at Williams Sonoma and at Bed Bath and Beyond,” she said.

What she’d really prefer to the traditional wedding registry — and she thinks she’s not alone — is a gift of stock shares.

Stocks, which could help ensure Washkowitz and her hubby-to-be’s financial future, are perhaps a fitting gift for what’s supposed to be a long-term investment in each other.

But it’s not all that logistically easy to give stock as a gift, especially to people outside your immediate family or established charities.

So Washkowitz, who is also about to graduate from Columbia Business School, has created an online stock-gifting startup called Shareswell. It’s now live for summer wedding season.

Shareswell — which does not itself buy and sell stock, but coordinates with brokers — is essentially free to use. It’s also not all about weddings; other occasions like baby showers and graduations are supported, too.

Washkowitz plans to monetize the site through affiliate fees from brokers for users who open new accounts. “I don’t want to become a glorified wire transfer,” she said.

Online wedding registries are perhaps ready for a rethink, or at least a fresh coat of paint; another new startup in the space is Zola, which aggregates many kinds of registries and just launched an iPhone app. It’s likely to have broader appeal than Shareswell.

As for Washkowitz and her fiance, they unregistered at all the more traditional stores — and their own Shareswell registry has already been bought out of Apple and Amgen stock.

22 Apr 16:56

Netflix will raise streaming prices for new members this quarter

by Janko Roettgers

New Netflix subscribers could soon be forced to pay a bit more for the company’s streaming service: The company announced in its first-quarter earnings letter to shareholders that it intends to raise the prices for new members by $1 or $2 this quarter.

CEO Reed Hastings and CFO David Wells wrote:

“In the U.S. we have greatly improved our content selection since we introduced our streaming plan in 2010 at $7.99 per month. Our current view is to do a one or two dollar increase, depending on the country, later this quarter for new members only. Existing members would stay at current pricing (e.g. $7.99 in the U.S.) for a generous time period. These changes will enable us to acquire more content and deliver an even better streaming experience.”

Netflix had previously said that it wanted to experiment with new pricing tiers, but didn’t seem in rush to implement any pricing changes at the time. However, the company also experimented with price increases for new members in Ireland, and the results seem to have encouraged the company to raise prices in other markets as well. Existing customers in Ireland are grandfathered into their old plans for two years, according to the letter to shareholders.

The announcement comes as Netflix ended another quarter of strong international growth. In Q1 of 2014, the company added 1.75 million international subscribers, compared to 1.02 million in Q1 of 2013. Altogether, Netflix now has 12.68 million international subscribers, compared to 7.14 in Q1 of 2013.

"Netflix Streaming Subscribers (Domestic vs. International)"

In the U.S., Netflix added 2.25 million streaming subscribers, compared to 2.03 million in Q1 of 2013. This means that Netflix now has 35.61 million streaming subscribers in the U.S., and a total of 48.35 million streaming subscribers worldwide.

Despite this growth, the company reported solid financials for Q1: Including all of its business segments, Netflix generated revenue of $1.07 billion in Q1 of 2014, compared to 1.02 billion in Q1 of 2013.

The company earned a net income of $53 million, compared to $3 million a year ago, in part due to much lower international losses, which fell from $77 million in Q1 of 2013 to $35 million in Q1 of 2014. The company expects to be profitable in existing international markets by the end of the year.

Updated at 2:52pm with more information on Netflix’s Q1 net income.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

22 Apr 16:50

Why West Acquired SchoolMessenger: A Natural Fit for Conversational Commerce

by Tim Moynihan

WestCorpLast week, West Corporation announced intentions to acquire SchoolMessenger, a provider of proactive notification in the K-12 education market. This is a very interesting acquisition as West continues to enhance their outbound service offerings. We’ve seen other service providers, such as Genesys, enhance product offerings by acquiring outbound notification provider SoundBite, for example.

West’s acquisition of SchoolMessenger is very consistent with Opus Research’s view on the idea of Conversational Commerce, albeit with an education-oriented focus in this case. It is consistent across three key conversational commerce elements:

Context – Nothing demands more real-time conversations and context that an event at your child’s school. The need for immediate, precise and accurate information is critical when communicating in a very stressful, and potentially rapidly changing situation. Understanding that context, and the ability to act on that is a critical element of the school-to-parent conversation.

Omnichannel Engagement – SchoolMessenger’s solution has the ability to deliver context-aware notification is a variety of channels such as voice, SMS, email, social. Additionally, since West is known for its ability to handle a extremely high volume of conversations, SchoolMessagenr will also be able to support the high volume, simultaneous conversations across all channels.

Personalization – Parents and others responsible for their children at school have the ability to personalize their conversational experience allowing them to identify their preferred and prioritized communication channel for the fastest and most precise information. Even more, it’s interesting that parents can request real-time translation in their notification to their native language.

This acquisition by West will fit in nicely into their omnichannel outbound strategy focused on the education market.

How does your outbound conversational strategy fit alongside your inbound strategy? Is it all the same across the markets you serve, or are there unique considerations for each? How are you thinking about inbound and outbound conversations in the markets you address?

22 Apr 16:50

It’s Official: 2013 Was the Busiest Year Yet for Cyber Criminals

by Arik Hesseldahl

hacked_screen

grapegeek/iStockphoto

When the history of computer security is written, 2013 is going to go down as something of a watershed year. It was the year of the Target breach that exposed the credit and debit card numbers of some 40 million consumers, and numerous attacks against Twitter, Facebook, Evernote and others. In short, it was a year when computer security incidents became something that mainstream people worried about a lot.

Yes, the number of overall attacks is on the rise. This is the bad news that you probably already knew. But there’s some oddly good news that may surprise you: Nearly all of the 1,300-plus data breaches confirmed last year were carried out using only nine basic attack patterns. Learn to better combat those nine patterns and you stand a better chance of resisting attacks, though as with all things related to computer security, what at first seems logical and easy is always messier and more difficult in practice.

The finding comes in a report from the security arm of the telecom giant Verizon set to be published on Wednesday. The Verizon annual Data Breach Investigations Report is one of the most highly regarded in the industry and is now in its tenth year. It contains data on attacks from 50 companies and organizations, covering more than 63,000 computer security incidents and 1,347 confirmed breaches in 95 countries. As these things go, the report contains more data to analyze than any other report of its kind, said Jay Jacobs, a Verizon analyst and one of the report’s co-authors.

If combating nine kinds of attacks sounds too ambitious, then maybe this will make it sound a little easier: On average, roughly 72 percent of all attacks were carried out using one of three methods, though the specifics tend to vary by industry.

For example, in the financial industry, 75 percent of attacks involved hacking Web applications, launching distributed denial of service (DDoS) attacks meant to overwhelm a server, or card skimming, a technique where an attacker obtains a scan of a credit or debit card with the intention of using it to commit fraud.

And while fraud and financial motivations still tend to dominate the spectrum of reasons behind cyber crime, believe it or not, they declined as a proportion of the whole in 2013. Meanwhile, attempts to steal intellectual property rose, Jacobs said. “It’s not all about money anymore but who has the intellectual property,” he said.

So about that: Here’s something you may not have considered: Inside jobs. Verizon has collected data on nearly 11,700 incidents of what it classifies as “insider and privilege misuse,” and of those, there were 112 incidents where the attacker succeeded in making off with data. If it sounds minor, then you’ve never heard of someone named Edward Snowden and his former employer, the U.S. National Security Agency.

But as the NSA will tell you, Snowden’s activities were difficult to detect. Verizon concurs, saying in the report that “most insider misuse occurs within the boundaries of trust necessary to perform normal duties. … That’s what makes it so difficult to prevent.” It’s not uncommon for employee to email things to their personal addresses so they can work on them at home, or to take things out on their personal thumb drives.

But when your company deals with sensitive information, that can get dicey really fast. In most of these cases — 85 percent — the employees carried out their data theft while in the office and right under the noses of their co-workers. And there were two basic motivations: Sell the data to a competitor, or start a competitive company. Nearly half of these thefts — 48 percent — were discovered within days or hours. But a little less than one percent — a total of 70 incidents — went undiscovered for years.

Documented incidents involving state-sponsored and politically motivated cyber espionage tripled. Jacobs attributes the increase to Verizon having access to more data than before, and the category still accounted for a relatively small number of the total incidents, only 511. In these cases, 54 percent of the organizations attacked were in the U.S., while 49 percent of the attackers were in East Asia, mostly China.

Here’s another grouping of attacks that should make you nervous, especially if you handle security for a retailer. The report documents 198 incidents involving attacks against point-of-sale terminals. In each of those cases attackers succeeded in disclosing data. Most of those — 85 percent — involved RAM-scraping software similar to the type used in the Target breach. And most of the time — 98 percent of these cases — the theft of data wasn’t discovered for weeks or months. The only good news? The number of these attacks declined by about half from 2011.

There’s lots more crunched security data worth reading in the report, and you can get it here.

Finally, here’s a table from the report that breaks things down by types of incidents and by industry. For example, on the top line you see that most of the attacks in the hotel and resort industry were against point-of-sale systems. Meanwhile, utilities were attacked most often via breaches of their Web apps. (Click to make it bigger.)

verizon_dbir_fig19

Verizon

18 Apr 19:45

Why Does Amazon Want to be in the Smartphone Business?

by Gary Kim
Without a doubt, the U.S. smartphone market is vibrantly competitive, and potentially will become more so as Amazon enters the market with its own branded smartphone, while Google’s Project Ara tries to stimulate the growth of a modular approach to devices.

At the same time, a furious marketing assault by T-Mobile US is, at least for now, threatening to destabilize the market, not just by shifting incremental market share towards T-Mobile US, but also potentially changing both retail packaging and pricing practices industry wide.

For many, the key immediate question is whether Amazon should enter the smartphone business at all, and what the upside could be. Skeptics argue that is a distraction Amazon does not need. Others point out that the smartphone is a complicated device, in terms of application functionality, and that creating a valuable device able to take market share therefore also poses a risk.

But some might counter that such concerns also surrounded the launch of the Kindle tablet as well, and Amazon claims users of Kindles generate more transactions for Amazon. As early as 2012, Kindle drove about 10 percent of Amazon revenue, some estimate, driving perhaps $6 billion in revenue, even if relatively little actual profit on sales of hardware, music, streaming video or apps.

Some would argue Amazon earns a little on sales of book content and advertising. But Amazon often thinks long term, and media sales represent about 45 percent of total revenue, at the moment. As that revenue shifts to digital delivery, the Kindle ecosystem should become much more valuable.

Similar thinking likely drives interest in selling an Amazon smartphone. To the extent that connected devices now are content consumption platforms, the smartphone would provide the same sorts of advantages as the Kindle.

“In addition to the income that smartphone sales would create, it would support Amazon’s expansion into the content-delivery field,” said Tom Caporaso, CEO of Clarus Marketing Group.

But that might be the most significant value for Amazon. Smartphones and tablets are becoming more important platforms for e-commerce. In 2014 alone, the value of mobile-initiated e-commerce could grow about 24 percent, according to eMarketer, representing perhaps $17 billion in 2014 sales volume.

Beyond that, Amazon would be in position to learn much more about the context of user behavior related to commerce, Amazon’s key business. “An Amazon smartphone would provide another large wellspring of information” in that regard, argues Caporaso. “Augmenting its existing customer knowledge with GPS data, user information, shopping behavior, and other personal and demographic details could help Amazon hone its customization efforts.”

That should pay dividends in the form of loyalty and therefore both higher purchasing levels and repeat purchasing.

Amazon could stumble, of course. But the logic of how a smartphone plays into its core retailing buisness is clear enough.


17 Apr 18:41

Appeals court says blogs are not only media, they’re an important source of news and commentary

by Mathew Ingram

It would be nice if the debate over whether bloggers are journalists could be put to rest, more than a decade after it first began, and especially after bloggers like Glenn Greenwald have not only broken news stories but won Pulitzer Prizes for doing so. But it continues — especially when it comes to the protections that bloggers are entitled to and whether they should be the same as those given to professional journalists, as I have argued they should be.

A recent legal decision that helps support this idea was handed down in a Florida court case involving accusations of defamation. Under state law, anyone who wants to pursue a defamation case has to notify the media outlet in question five days before filing. But Christopher Comins argued he didn’t have to do so in the case of a blog post from university student Matthew VanVoorhis, because blogs aren’t a traditional form of media and therefore aren’t entitled to notice.

As Techdirt notes, Comins’s argument was thrown out by the original court, but he appealed. Now, an appeals court has upheld that decision — and in the course of doing so, the judges in question chose to provide some great commentary on the importance of blogging as a form of media. The decision says:

“The advent of the internet as a medium and the emergence of the blog as a means of free dissemination of news and public comment have been transformative… the impact of blogs has been so great that even terms traditionally well defined and understood in journalism are changing as journalists increasingly employ the tools and techniques of bloggers – and vice versa.”

Journalism is what you do, not what you are

gavel

The court went on to say that the term blog typically refers to a site operated by a single individual or a small group that has primarily an informational purpose, most commonly in an area of special interest, knowledge or expertise — and one which usually provides for public impact or feedback. Based on this, the decision states, “it appears clear that many blogs and bloggers will fall within the broad reach of media, and, if accused of defamatory statements, will qualify as a media defendant.” It continues:

“There are many outstanding blogs on particular topics, managed by persons of exceptional expertise, to whom we look for the most immediate information on recent developments and on whom we rely for informed explanations of the meaning of these developments.”

The court stopped short of saying that any blog or blogger would qualify for protection as a media outlet, but said that VanVoorhis’s blog definitely falls “within the ambit of the statute’s protection as an alternative medium of news and public comment.” As the trial lawyer representing VanVoorhis described it in a blog post about the judgement: “The essential point, which the appellate court agreed with, is that a journalist is not something you are, but is rather something that you do.”

This is the point that I and others have tried to make about attempts to protect journalists through “shield laws.” Such laws often try — of necessity — to define who qualifies as a journalist, and often resort to doing so based on whether they are paid, whether they work for specific media outlets, and so on.

Everyone is protected, not just journalists

Restricting protection to professional journalists is exactly what some judges and courts have also tried to do in certain cases, like the one involving Montana blogger Crystal Cox. The trial judge said she was not entitled to broader protection because she was not a journalist — but an appeals court ruled that this was incorrect, and it cited the Ninth Circuit’s commentary on whether the institutional press should have any more protection than the average citizen.

“The protections of the First Amendment do not turn on whether the defendant was a trained journalist, formally affiliated with traditional news entities, engaged in conflict-of-interest disclosure, went beyond just assembling others’ writings, or tried to get both sides of a story. As the Supreme Court has accurately warned, a First Amendment distinction between the institutional press and other speakers is unworkable.”

Somewhat ironically — given these kinds of defenses of the contributions that blogging can make to journalism — one of the most prominent and authoritative blogs writing about the decisions of the U.S. Supreme Court, the SCOTUSblog, has been repeatedly denied a press pass to cover the court officially, because it is not considered to be a member of the media.

Post and photo thumbnails courtesy of Thinkstock / triloks

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

17 Apr 16:10

The Kill Switch Proposal: Why U.S. Carriers Win Either Way

by Dan Rowinski

Cellular carriers in the U.S. want you to think they have your best interests at heart. That, hey, if your smartphone gets lost or stolen, they will have your back. At least that's what those carriers would have you believe with a new smartphone "kill switch" proposal from the CTIA, the largest U.S. trade organization that supports the cellular operators. 

Unfortunately, the CTIA's new proposal looks a lot more like it is covering its bases to avoid state and federal regulation than going out of its way to altruistically help users of lost or stolen smartphones.

The CTIA is putting the onus of anti-theft software on the platform makers and device manufacturers. The biggest carriers—Verizon, AT&T, T-Mobile and Sprint—are able to ride on the technology of others while hiding behind the CTIA for policy protection. In the end, nothing will drastically change for smartphone users in the U.S. The carriers win by protecting the lucrative smartphone insurance business while letting other companies do the heavy lifting.

The Voluntary Agreement

For the specifics, the CTIA announced the “Smartphone Anti-Theft Voluntary Commitment” on Tuesday, which is a new policy that promises consumers that smartphone makers and carriers will protect them if their devices are stolen.

The idea is that smartphones will be sold with pre-installed anti-theft software. Just about every company that matters in the U.S. mobile industry has signed the voluntary agreement, including Apple, Google, Microsoft, Samsung, HTC, Motorola, Huawei, AT&T, T-Mobile, Verizon and Sprint.

The anti-theft software will come at no cost to consumers and comes with four capabilities:

  1. The ability to remotely wipe the primary user’s data on the smartphone when it's lost or stolen.
  2. The ability to render the smartphone inoperable to anyone other than the primary user. This would entail locking the smartphone so it cannot be used without inputting a password or PIN.
  3. The ability to prevent the reactivation of the device without the primary user’s permission. This would include unauthorized factory resets (which is normally easily available to anybody that finds a device and can bypass the locked screen security, if there is any).
  4. Reverse the inoperability and restore the user’s data if they recover the device. 

The voluntary anti-theft agreement goes into effect for all devices manufactured after July 2015.

The Kill Switch

To a certain extent, this voluntary anti-theft agreement is the smartphone kill switch that legislators have been asking for. According to William Duckworth, an associate professor at Creighton University, Americans spend about $580 million a year on replacing lost or stolen devices. Americans also spend nearly $4.8 billion in insurance on their gadgets. The concept of the kill switch is not just a gift from manufacturers and carriers to consumers—it is big business.

According to a survey by Duckworth of 1,200 smartphone users, 99% said that they think their carriers should be able to employ a kill switch on their lost and stolen devices and 83% said it would help deter smartphone theft. Really, why steal a smartphone if you can’t use it, reset it or resell it?

The question facing the voluntary agreement is if it will actually deter people from stealing smartphones. Thieves are, by definition, crafty people. At the very least, they are persistent. Thieves may go on stealing phones anyway because there is no guarantee that a user will even turn on the anti-theft mechanism provided by the new voluntary agreement.

How the anti-theft software will be implemented also remains to be seen. The operating systems all have their own versions of remote wipe plus cloud backup plans, like the ability to “Find My iPhone” and restore the phone's data from iCloud, or from the Android Device Manager from Google.

Will Apple, Google and Microsoft build these anti-theft deterrents as default, no-cost features? Will it come from third-party security vendors like Lookout or Boxtone? How will the pre-installed anti-theft software work with current mobile device management software, like that from Good Technology, BlackBerry or Samsung's Knox security suite?

For the carriers and the CTIA, all they really need to do is is let the manufacturers and platform providers do what they have been doing to protect users, all the while maintaining the status quo. For the carriers, the status quo is highly profitable.

The CTIA's Song And Dance

Industry insiders figured the CTIA would fight against the notion of a kill switch, mostly because it has two board members that are part of the lucrative smartphone insurance trade. Duckworth estimates consumers could save nearly $2 billion by purchasing a less costly insurance policy if a kill-switch policy was implemented. 

What the CTIA is doing here may be a pre-emptive strike. As a trade group, its primary duty is to protect its members and help create policy while avoiding regulation. The CTIA was not necessarily against a kill switch, but it wants the policies set on its own terms and not signed into actual law by either state or federal governments. Government regulation can be costly to companies, especially those in the infrastructure business like the cellular operators.

By coming up with its own voluntary agreement and getting all the major players on board, the CTIA can thwart actual government regulation while still protecting its members. And by getting the smartphone manufacturers and the platform providers (Apple, Google and Microsoft) on board, the CTIA is able to spread the responsibility of the anti-theft mechanism to corporations outside of the carriers, its primary constituents. 

17 Apr 07:00

Telecom reform package could raise high-cost fund surcharge

by By Andy Vuong The Denver Post
A small surcharge on phone bills might get a little bigger if lawmakers pass a package of five House bills aimed at reforming Colorado's telecommunications regulations and spurring rural broadband investment.
15 Apr 22:27

Apple, Google, Microsoft, Samsung and Carriers Back Anti-Theft Measures for Smartphones

by Ina Fried

phone_theft

Shutterstock / Innershadows Photography

With several states and municipalities considering various mandatory “kill-switch” laws for mobile devices, the wireless industry announced a voluntary commitment to include new anti-theft technology on phones starting next year.

The commitment, announced Tuesday, has the backing of the five largest U.S. cellular carriers as well as the key players in the smartphone device and operating system markets, a list that includes Apple, Google, HTC, Huawei, Motorola, Microsoft, Nokia and Samsung.

Those signing the pledge agree that devices going on sale after July 2015 will have the ability to remotely wipe data and be rendered inoperable, if the user chooses, to prevent the device from being reactivated without the owner’s permission. Lost or stolen devices could later be restored if recovered. The carriers also agreed they would facilitate these measures.

Some device makers have acted on their own. Apple’s iOS 7, for example, has a feature called Activation Lock that, when users choose, prevents a stolen or lost device from being reactivated even if reset.

A number of state and local lawmakers praised the agreement, though it was panned as inadequate by California state Sen. Mark Leno, who has proposed a mandatory kill-switch law.

“The wireless industry today has taken an incremental yet inadequate step to address the epidemic of smartphone theft,” Leno said in a statement. “Only weeks ago, they claimed that the approach they are taking today was infeasible and counterproductive. While I am encouraged they are moving off of that position so quickly, today’s ‘opt-in’ proposal misses the mark if the ultimate goal is to combat street crime and violent thefts involving smartphones and tablets.”

Leno noted that in order to have a deterrent effect on theft, the vast majority of consumers must have such kill-switch features on, or else such crime will continue to occur.

“While I am encouraged by the incremental progress, the wireless industry must commit to the whole solution, not just a piece of it, to protect their customers and make our streets safer,” Leno said.

Not surprisingly, CTIA President Steve Largent hailed the move as an example of the industry working with regulators and consumer groups.

“We appreciate the commitment made by these companies to protect wireless users in the event their smartphones are lost or stolen,” Largent said in a statement. “This flexibility provides consumers with access to the best features and apps that fit their unique needs while protecting their smartphones and the valuable information they contain. At the same time, it’s important different technologies are available so that a ‘trap door’ isn’t created that could be exploited by hackers and criminals.”

15 Apr 20:07

Need faster Wi-Fi around your house? The Amped Wireless REC15A is just the thing.

by Kevin C. Tofel

About a year ago, I got fed up with my home Wi-Fi. No matter which router I bought, I simply couldn’t get reasonably good signal strength or consistently fast wireless speeds in certain rooms. Going back and wiring my home for data wasn’t an option, so I dropped $69 on the REC10 wireless range extender from Amped Wireless. It’s probably the best money I spent last year because it solved my wireless woes.

Now the company has a newer model called the REC15A and I’ve been using it for the past several weeks. The new range extender costs $99 and I’ve found it’s worth the premium if you have a newer router like I do. It provides even faster wireless speeds; often coming close to the full home broadband speeds I can get with a wired connection. In fact, in some locations, I actually can get more than a 75 Mbps connection over Wi-Fi, the same as if I was connected directly to my home router with an Ethernet cable.

REC15A

Aside from the price, what’s different between the REC10 and REC15A? Three main things.

1. The older model supports the 802.11n 300 speed standard according to Amped Wireless. That means it should work well if you have an 802.11n router purchased in the last several years. The REC15A, however works with faster 802.11ac routers and I bought one of those, an Asus model, in 2011. And more mobile devices are now supporting the faster Wi-Fi: 802.11ac is supported in my Moto X, for example, as well as the latest flagship phones.

2. My router is dual-band, meaning it can broadcast using both the 2.4 and the 5 GHz frequency bands. The REC10 extender only works with the former frequency while the newer REC15A uses both simultaneously. That lets me run multiple networks across different channels; helpful because I dedicate one band solely for video content. Doing so keeps all of the other “chatty” devices and apps from affecting video content on the network.

3. Both extenders boost the signal and range of my home network but in this case, the older model does a slightly better job. The REC10 provides a 600 mW boost while the new REC15A outputs 500 mW. As a result, the range of the newer model is a little less by comparison. The difference is subtle but I can see it from time to time when checking actual signal strength in my home. I found, however, that it really hasn’t affected the speeds; I still routinely get better speeds when using the REC15A because of the dual-bands and faster 802.11ac wireless technology.

Speedtest with REC15A

The HTC One M8 supports 802.11ac making for fast Wi-Fi speeds all across my home with the REC15A installed.

If you’re not getting the full speeds of your home broadband over Wi-Fi, I can definitely recommend both of the Amped Wireless range extenders. Which you should consider depends on your current router and how much range you’re looking for. With an older router, I’d suggest the REC10; or upgrade to an 802.11ac router and splurge on the REC15A.

Already have an 802.11ac router? The answer is a no-brainer: the REC15A will be the better unit overall. Both are simple to set up: Just plug them into an outlet and configure the unit over a web connection. In under five minutes you’ll be able to experience fast in-home Wi-Fi in nooks and crannies you never could before. Now that my review unit is heading back, I’ll be ordering one of my own.

 

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

15 Apr 19:48

Infrastructure as a service: Really only a three-horse race?

Amazon Web Services, Google Compute Engine, and Microsoft Azure are likely to be the three lead dogs in cloud infrastructure services. Why? Economics, scale, and skills.
15 Apr 19:48

7 Heartbleed Myths Debunked

by Adriana Lee

People are on edge thanks to Heartbleed, a coding mistake that inadvertently laid waste to the security of many big online services.

The revelation this week shocked the world. And new reports coming out about Heartbleed only seem to inspire more worries, not less. The unfortunate result is a lot of misinformation going around. 

Care to join me in a little debunking session? Here are some of the doozies I heard this week, and why they’re not true.

Myth #1: Heartbleed Is A Virus

This OpenSSL bug is not a virus. It's a flaw, a simple coding error in the open-source encryption protocol used by many websites and other servers.

When it works as it should, OpenSSL helps ensure networked communication is protected from eavesdropping. (One clue that a website may be using it is when there’s a “HTTPS” in the Web address, with the extra “s”—although other forms of security do the same thing.) 

So it’s a bug, a security hole that was accidentally left open, allowing others to surveil a communication or login event, as well as pull confidential data or other records out. 

Myth #2: The Bug Only Affects Websites

Potential security breaches for servers and routers are massive issues, as they allow for the greatest amount of data to leak. And so, websites, online services and network servers tend to get the lion’s share of press. But they’re not the only potential targets. 

The clients that communicate with those servers—i.e. your phones, laptops and other devices used to jump online or connect to other networks—are at risk too due to what’s increasingly being called “reverse Heartbleed.” What that means is that the data stored in your device’s memory could be up for grabs.

“Typically on the client, the memory is allocated just to that process that’s running. So you don’t necessarily get access to all the processes,” David Chartier, CEO of Codenomicon—the Finnish security firm that co-discovered Heartbleed—told ReadWrite. “[But] you can still leak contents of emails, documents and logins.” 

The idea of unauthorized account and systems setting access can be particularly disconcerting for  smart home users. I reached out to startups like SmartThings and Revolv, as well as Zonoff—the company powering Staples Connect’s smart home system—and iControl, which supplies the technology for services like Time Warner Cable, ADT, Comcast, Cox, Rogers and others. 

SmartThings and Revolv have both patched the bug by updating their software to the latest version of OpenSSL. iControl reported back to me, saying that it doesn’t use OpenSSL. At press time, Zonoff wasn’t available for comment. 

(Update: Zonoff also uses OpenSSL, but the company confirmed to ReadWrite that it has updated affected servers with the most recent software, thereby patching the vulnerability.) 

Myth #3: Hackers Can Use It To Remote Control Your Phones

By all indications so far, a hacker can’t tunnel in directly using Heartbleed and take over control of your smartphone. Again, what’s at stake is the data stored in its memory, at least for those devices that haven't been patched with the latest version of OpenSSL. 

Even if it was possible, iPhones and most Androids are immune to Heartbleed, with one big exception—Android 4.1.1. Google, however, says patches will go out to cover this version of its mobile operating system. Overall, the fact that iOS and Android are largely unaffected must come as a relief, particularly given recent iOS security concerns on other fronts.  

Of course, the apps these phones run might be another story. BlackBerry acknowledged that BBM for iOS and Android, for example, is vulnerable to Heartbleed. Attackers still wouldn't be able to get into the device memory itself using it, but they might be able to listen in on insecure chats in progress. (Update: Blackberry says it is readying a BBM update to address Heartbleed.)

Myth #4: Windows XP Users Are Screwed Because Microsoft Abandoned Them

Completely false. Sure, the timing is bad. Microsoft said it won't be supporting Windows XP just as Heartbleed panic set out across the land. But the tech company does not use OpenSSL.

That’s great news for the loads of PCs out there that still use the 14-year-old Windows operating system—which, at press time, made up more than a quarter of all running desktops. Because if it affected them, they'd be stranded with Heartbleed with no hope of a security update. 

People running XP, indeed all Windows users, get the company’s own encryption component called Secure Channel (aka SChannel), and it's not susceptible to this particular bug. However, it’s worth noting that XP users won’t get any further software support or updates for SChannel either. 

The exceptions are Windows Azure users running Linux in Microsoft's cloud service. These distributions rely on OpenSSL, so Microsoft urges these users to contact the distribution providers for the updated software. As for Mac OS X, Apple has officially declared it is not vulnerable to Heartbleed. 

Myth #5: All Of Our Banks Are Open For Heartbleeding

The security flaw is serious, but it can't pry open the virtual vaults at our top banks. In fact, American Banker, a news site for bank technologies, reports that no major banks are susceptible

These companies have all announced that they don’t use OpenSSL, so they aren’t at risk:

  • Bank of America
  • Capital One Financial
  • JPMorgan Chase
  • Citigroup
  • TD Bank
  • U.S. Bancorp
  • Wells Fargo
  • PNC Financial Services Group 

Of course, there are many more banks and credit unions out there, which is why the Federal Financial Institutions Examination Council (FFIEC) urged "financial institutions to incorporate patches on systems and services, applications, and appliances using OpenSSL and upgrade systems as soon as possible to address the vulnerability." 

Furthermore, CNET’s check of high-trafficked websites shows that PayPal is not vulnerable to Heartbleed either. Neither are these major retailers, where people may store debit or credit card information: 

  • Amazon.com
  • eBay
  • Groupon
  • Target
  • TripAdvisor
  • Walmart

(Looks like Target learned a thing or two from its major security breach late last year.) 

So no, the Heartbleed glitch doesn't throw open the doors of these banks and major stores, at least not directly. However, just because these sites and accounts aren’t subject to these hacks, it doesn’t mean that data is entirely safe. (See below.) 

Myth #6: My ____ Site/Service Wasn’t At Risk Or Issued A Patch! I’m Safe Now. 

Not quite. Heartbleed is insidious because it leaves no trace. That means there’s no way to tell if your information was stolen previously from a site or service that has now fixed it. 

As for places that weren’t vulnerable to begin with, your accounts there may still be at risk, if that login information was stored or sent somewhere that was breached. 

Here’s what it boils down to: You’ll want to change passwords everywhere, except on affected sites or services that haven’t patched the hole yet. But be sure to do it once they’ve updated their software. You'll also want to check your credit, account statements and online activity to make sure no unauthorized entries appear. 

Myth #7: NSA Has Been Using Heartbleed To Spy On Us

Citing unnamed sources, Bloomberg accused the National Security Agency of knowing about Heartbleed and keeping it quiet. But that's not all. The agency wasn’t simply aware of the bug, says the report—it allegedly exploited the flaw for two years, using it to spy on Americans. 

In light of the PRISM revelations, it’s all too easy to believe. Even before Bloomberg's accusation, suspicions were high that the NSA was involved, with plenty of tweets flooding Twitter questioning the agency's knowledge. It was as if a chorus of "Of course the NSA's involved" rang throughout the Web. 

But the NSA flatly denies it. The agency said it didn't use the security hole—in fact, it claimed to be completely ignorant of the bug's existence prior to the announcement going out.

There's no way to know if the NSA is being honest with its denial; the agency's credibility isn't exactly at an all-time high. But there’s no hard proof that it has actually exploited Heartbleed for surveillance. So, for now anyway, it's going in the "myth" pile. 

It's difficult to imagine any federal authority or agency not being aware of such a serious security weakness that affects so many. But it's not totally impossible. Just ask the Canada Revenue Agency. That government branch, which also used OpenSSL, had to shut down parts of its website temporarily because it was found to be vulnerable to Heartbleed as well. This just weeks before the Canadian tax deadline, to boot.  

Have you heard any Heartbleed myths or untruths? Deposit them in the comments, so we can all debunk them. 

Images courtesy of Flickr users David Goehring (feature image),  Lee Davy (malware), greyweed (Android zombie), Anonymous Account (bank vault), and Tony Fischer (spies). 

15 Apr 19:48

Windows Phone Gets Smarter, Sassier in Latest Update

by Bonnie Cha

Slowly but surely, Windows Phone is gaining some momentum, but it still has a long way to go to catch up to Apple’s iOS and Google’s Android. But Microsoft is hoping that the latest update to its mobile operating system will help it attract more customers.

Rolling out to existing Windows Phone 8 devices in the coming months, and shipping on new devices like the Nokia Lumia 635 this summer, Windows Phone 8.1 adds a number of new features, including a voice-guided assistant, a notifications center, and tools for better managing Wi-Fi networks. None of this is groundbreaking. The iPhone and Android handsets have had similar functionality for years.

Still, after testing the new software on the Nokia Lumia Icon for about a week, I can say that Microsoft has done a nice job of integrating these features into the platform and making them robust and functional. There’s a lot to like for current Windows Phone users. But convincing iPhone and Android users to switch will still be a challenge.

One of the most noteworthy additions of Windows Phone 8.1 is Cortana, a personal digital assistant designed to rival Apple’s Siri and Google Now.

Named after a character from the popular Xbox game, Halo, and powered by Microsoft’s Bing search engine, Cortana can be used to launch apps, compose messages, and search the Web using voice (or text) commands similar to the other two services. Unlike Apple, though, Microsoft is giving third-party developers access to Cortana, so they can build apps or rework existing ones to support the service. Cortana also gives you more control over your privacy than Google Now does.

One aspect of Cortana that I found particularly helpful was the ability to get reminders based on contextual information (person, place, time). For example, I told Cortana, “Remind me to ask my brother what he wants to do when he visits next week.” She replied that she would remind me the next time I talked to him, and, sure enough, when I went to send him a text, the reminder showed up. I also received an alert about an hour before an upcoming meeting, saying that I should leave soon based on real-time traffic conditions.

In addition to accessing your calendar, contacts, email and location, Cortana also learns things about you (your favorite sports teams, topics of interest, and so on) as you use the service. She then stores that information in her “notebook” to provide you with better answers and personalized updates on a Daily Glance page.

Understandably, some of you might feel uncomfortable sharing all that data with Cortana; so, unlike Google Now, Microsoft gives you some control over what’s stored in the notebook through Cortana’s settings menu. There you can also set quiet hours (times when you don’t want to be interrupted by incoming calls or messages), and indicate which contacts can reach you during those times (called the “inner circle”).

In general, Cortana was able to understand my spoken questions and commands without problem. You can follow up with questions or more requests and, like Siri, Cortana has a bit of a personality, too. For example, I asked her what she thought of Siri, and Cortana responded, “Hard to say. So far, our conversation has been kinda one-sided.”

But there was at least a couple of instances where Cortana wasn’t able to accurately transcribe a text message or command, so I ended up typing it out. Also, her answers may vary depending on how you ask a question. When I asked, “What was the score of the San Francisco Giants game last night?” Cortana just surfaced Web results for the Giants. But when I said, “Did the San Francisco Giants win last night?” she gave me the actual score.

Another time, I asked her to find the location of one of my favorite coffee chains (Coffee Bean), and she only returned one result for a location that was about three miles away, while Siri came up with two locations, both just a little over a mile from my current location.

Cortana is still in a testing phase, and not final, so hopefully some of those kinks will get ironed out soon. Microsoft said Cortana will also become more accurate as time goes on. Nevertheless, I was impressed with the experience.

The Action Center is another area where Microsoft is playing catch-up, but it’s definitely a welcome addition. Similar to the notification center in Android, you can now swipe down from the top of the screen for quick access to frequently used settings and to view all your notifications.

You get four quick-actions buttons, which are set to Wi-Fi, Bluetooth, airplane mode and rotation lock by default. But you can change them by going to the Settings menu, selecting “Notifications+actions” and then choosing another option, like camera or brightness. (There is a shortcut to the full Settings menu within the Action Center, so you don’t have to exit the app to do so.)

Notifications are listed beneath the shortcuts by application. Tapping on individual notifications will take you directly to that specific item. Or you can dismiss them all by swiping to the right.

Windows Phone 8.1 offers a new way to input text using the onscreen keyboard. Called Word Flow, the method is similar to the Swype and SwiftKey virtual keyboards available for Android devices, where instead of pecking at individual keys, you drag your finger letter to letter in one continuous motion.

I found that Word Flow worked well. I composed numerous messages and notes using it, and most times, it was accurate and faster than typing out the words the traditional way. It automatically adds a space after you complete a word, and capitalizes the first letter at the beginning of a sentence.

It can learn custom words and predict what you’ll write next based on context. For example, if you type “how,” Word Flow might suggest “are” as the next work and then “you.” I also liked that it automatically adds your contacts into its library, so it was able to recognize when I was entering a name, even if it had a weird spelling.

Some other minor improvements include a new weekly view in the Calendar app, and the ability to add your own photos to the Start-screen background. Skype is also now integrated into the phone app.

Windows Phone 8.1 brings some much-needed features, and helps make the platform even better and more powerful. But with similar features already available on iOS and Android, Microsoft will have to hit hard with good hardware and competitive pricing to lure new customers.

Windows Phone 8.1 review
15 Apr 15:55

Twitter embraces its data and buys Gnip

by Derrick Harris

Twitter has acquired Gnip, the Boulder, Colo.-based startup that specializes in giving users access to data from the Twitter firehose. Gnip is one of a handful of companies with full access to the stream of activity from Twitter, which has garnered it a lot of knowledge about how to deal with such immense data volumes and deliver it as a product to businesses. Terms of the deal have not been disclosed.

For Twitter, buying Gnip (which also provides data on more than a dozen other social media platforms, including Tumblr and Foursquare) means it can provide users with the type of data they’ve always wanted, but that Twitter never seemed too keen on delivering. Rather than providing arbitrary stats about tweets per minute or trending topics around entertainment events, Gnip lets its users search for and receive every single tweet (and all the surrounding metadata) that meets their criteria. Its most-used service is the streaming service, but Gnip also offers historical searches from the entire body of tweets.

Based on Twitter’s blog post announcing the acquisition, it sounds as if Twitter intends to keep Gnip’s business intact and, in fact, expand it:

“We want to make our data even more accessible, and the best way to do that is to work directly with our customers to get a better understanding of their needs….

“We believe Gnip has only begun to scratch the surface. Together we plan to offer more sophisticated data sets and better data enrichments, so that even more developers and businesses big and small around the world can drive innovation using the unique content that is shared on Twitter. We will continue making our data available to Gnip’s growing customer base. And with the help of Gnip’s Boulder-based team, we will be extending our data platform — through Gnip and our existing public APIs — even further.”

A portion of the amount of data Gnip delivers about tweets.

A portion of the amount of data Gnip delivers about tweets.

Gnip isn’t the first data-based startup that Twitter has acquired. It bought analytics specialist Lucky Sort in May 2013, but has yet to roll out that technology — which could be similar to Google Analytics for Twitter — into a service for users (at least far as I have seen).

Gnip is one of a handful of companies with complete access to the Twitter firehose, with the two other prominent ones being DataSift and Topsy. DataSift is very similar to Gnip in terms of the type of service it offers, and it announced in December that it had raised $42 million in venture capital and $73 million since 2010. Topsy offers higher-level analytics, including some simple search and trend data that’s even free to the public, and Apple bought it for $200 million in December.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

13 Apr 04:43

Dubbed “the best,” Dell Chromebook for education available for all

by Kevin C. Tofel

Dell’s Chromebook for education clearly isn’t just for students since anyone can purchase one directly from Dell. The company’s site is taking orders for two models costing $279 and $299, with units in stock and ready to go: Order one today and Dell will ship it tomorrow. A pair of recent reviews consider Dell’s Chromebook entry the best currently available.dell chromebook front

The only difference between the two models is the amount of internal memory. The base $279 unit comes with 2 GB of RAM and an extra $20 doubles the memory to 4 GB. After using Chromebooks with both memory options for the past two years, I’d highly recommend the 4 GB version. It’s a small investment that will allow the Chromebook to open a larger number of browser tabs and apps smoothly.

Aside from that, everything else is the same between the two. They run on the now-common fourth-generation Intel 2955U Celeron processor, use an 11.6-inch 1366 x 768 display and include 16 GB of flash storage. Wireless connections come from the 802.11 a/b/g/n Wi-Fi and Bluetooth 4.0 radios. Also included are an integrated webcam, a pair of USB ports — one USB 2.0, the other the newer USB 3.0 — an HDMI interface and a memory card reader.

Dell suggests the battery life for these is between 8 and 10 hours. The Verge tested it at 10 hours, 18 minutes in a battery-rundown test in itsreview. Actual usage topped 8 hours through regular use. The Verge also liked the keyboard and overall quality of the Chromebook, although at 2.9 pounds it’s a little heavy. The full review is worth the read, as is one from The Wirecutter that named the Dell Chromebook its best Chrome OS laptop currently available.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

13 Apr 04:23

The Rise of the Data Natives

by Monica Rogati

data brain

VLADGRIN/Shutterstock

Sometime at the start of the decade, YouTube was abuzz with viral videos of small children — yet to speak, read or write — “pinching” magazine articles with their fingers as they would an iPad. These children were heralded as members of a new generation of “digital natives”: People who grew up surrounded by computers, shaped by always-on technology and the Internet.

Today we are witnessing a new revolution, this time of “data natives” who expect their world to be “smart” and seamlessly adapt to them and their taste and habits.

While digital natives were most concerned with what they can do with technology, data natives are more concerned about what that technology can do for them.

  • Digital natives program their thermostat. Data natives expect the thermostat to program itself.
  • Digital natives use the Starbucks mobile app. Data natives want the app to know their favorite drinks — and when to suggest a new one.
  • Digital natives use a cloud-connected baby monitor. Data natives expect their baby monitor to automatically calculate crying percentiles based on millions of other babies.

The data-native revolution is on the rise as the appetite for data-driven products keeps growing stronger. From connected homes to wearables, people expect their lives to be better, richer and easier due to an explosion of networked devices (50 billion of them by 2020, according to Cisco).

Many scenarios that we once dismissed as science fiction are actually happening today.

A Jawbone Up wristband turns on your Philips Hue lights and starts your WeMo-enabled coffeemaker when you wake up. Water heaters and thermostats learn from your usage patterns and save energy. Connected door locks and doorbells make safety more convenient.

But there are frustrating times ahead for data natives.

In a constantly connected, data-rich world, all of our expectations are evolving quickly. Autocomplete and autocorrect are everywhere — and we make fun of them when they don’t work. We’re frustrated when our GPS doesn’t autocomplete, or when it shows us a restaurant 1,000 miles away, and we wonder why it hasn’t already learned our preferred route. We’re offended when LinkedIn recommends a job that’s too junior, or when we feel that TiVo stereotyped our ethnicity. We’re disappointed when ad-supported services don’t know us, amused when Amazon recommends “Dexter” when we’re buying a knife — or not so amused when YouTube plays a “Texas Chainsaw Massacre” ad in front of a cartoon our kids are watching.

We “settle” for self-parking, lane-following cars with adaptive cruise control when what we really want are self-driving ones. Your “smart” watch wakes you up at 3 am to tell you its battery is running low. Your Roomba is gathering dust — and not in a good way. True, these are the prime examples of first-world problems, but it’s fair to ask: If we haven’t yet fixed the small things, how can we be trusted with the innovations that would really enhance all our lives?

The good news is that data natives’ frustration with not-so-smart technology is exactly what will make the promise of “big data” a reality.

This friction is what spurs innovation that’s applicable well beyond tech early adopters. Local governments are hiring data scientists, and open data is increasingly driving public policy. Personalized medicine is coming — but in order to overcome regulatory challenges, better algorithms and better data are not enough. It’s the public’s expectations that will accelerate its pace, and the data natives’ frustration with the fact that we can optimize ads, but not our mood, health and quality of life.

Last month at SXSW, Shaquille O’Neal quipped that he’s becoming an algorithms expert while declaring his passion for wearables. In 2012, Nate Silver became a household name. Data journalism became de rigueur, and storytelling with data is constantly in focus. Chelsea Clinton tweets about her love of data. Data conferences are growing at a rate I would proclaim exponential if I wasn’t a data geek.

You might call this a data bubble, but I call it great news. It’s great news because there’s hope for improved numeracy in the U.S. If adults believe data science is “sexy,” there’s hope for math to be a subject that’s not “cool” to hate as a child.

And that is great news — because the data natives’ expectations can’t be fulfilled without people who not only live and breathe data, but who can also communicate with those who don’t.

We need data scientists, data engineers, data designers, people who “get” both data and the product experience, people who are creative with data and who have empathy for the wider audience that’s now represented and shaped by the data natives. In response to the oft-cited McKinsey Global Institute report anticipating unfulfilled demand for 190,000 big-data positions, data-science education programs have proliferated within traditional universities, MOOCs, large companies and incubator-style training programs.

However, technical skills are not enough to satisfy the data natives’ expectations. The tide is now turning toward making data and sophisticated algorithms invisible. Top-notch design and user interaction, combined with data and algorithms, are what make products feel smart. These two sides of the data-product coin are reinforcing each other, creating a virtual cycle. Easy-to-use devices or software that seamlessly integrates into your life generates higher volume, better-quality data, while personalized experiences enabled by data are big contributors to a product’s ease of use.

Something as basic as fast, easy-to-use autocomplete enables you to quickly get the job done, and in the process generates more data to make the algorithm even better. In turn, autocomplete is what makes the user interaction feel smooth and smart. This change in how we interact with “smart” technology turns out to be crucial to its success.

Despite its early promise, artificial intelligence has made little progress over the past few decades. That’s because demanding or expecting perfection from non-deterministic algorithms is a recipe for disappointment. Why, then, should we believe that “this time it’s different”; that the “big data” hype is more warranted than the “fuzzy logic” hype from a few decades ago? It turns out that keeping the human in the loop is the crucial piece of the puzzle.

A good user interface offsets algorithm shortcomings, and helps technology make the leap from novelty to indispensable.

Humans, after all, are highly adaptable if they can reap the benefits. The Newton’s handwriting recognition was not quite there yet — but Palm came along with Graffiti, standardizing strokes for each letter to hold us over until technology advanced. Siri (or your bank’s customer-service voice-recognition system) might not understand everything you could possibly say — but keeping the domain restricted and guiding the user toward keywords does the job. Yes, this means you have to speak punctuation marks when you dictate your text messages, but while doing so, you’re training the system to infer them in the next version.

While data natives expect technology to be smart, they understand that a little human input goes a long way.

Just like the children playing “iPad” on their magazines, too many of us still experience a parent-to-child relationship with technology — you need to tell it what to do very specifically, and correct often.

Data natives, on the other hand, are working toward a more grown-up relationship with technology — a technology that anticipates your needs while requiring little input beyond passive observation. This is the holy grail of artificial intelligence — and it will be here sooner than we think.

Monica Rogati is vice president of data at Jawbone. Reach her @mrogati.

13 Apr 04:20

Ruh-roh. Heartbleed affects networking gear from Cisco and Juniper, too

by Barb Darrow

The Heartbleed security flaw in OpenSSL encryption that affected popular web and ecommerce sites has also infiltrated many of the Cisco and Juniper routers, switches and firewalls running those sites and the internet at large.

In a Cisco security alert updated Thursday, the company said many of its products use a version of OpenSSL affected by a vulnerability. Cisco acknowledged that this “could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server.” Check out the Cisco update for a list of products that are or could be vulnerable. Juniper published a brief “high alert” on its support page, but customers have to log in for more information.

Infected networking gear can be a tricky fix since many people or small businesses don’t necessarily update that gear over time. As security expert Bruce Schneier told Marketwatch: “The upgrade path is going to involve trash can, a credit card, and a trip to Best Buy.”

In related news, application performance and security specialist Cloudflare posted an interesting blog on how serious Heartbleed can be if it can harvest 64 kilobytes of server memory and issued a challenge for geeks to do so.  If an attacker is able to exploit standard buffer over-read bugs to get that information it would be a “nightmare scenario … requiring virtually every service to reissue and revoke its SSL certificates.  Note that simply reissuing certificates is not enough, you must revoke them as well,” Cloudflare said.

OpenSSL is used in an estimated two-thirds of all active sites. Researchers from Google and security firm Codenomicon found the flaw, and Codenomicon came up with the now ubiquitous Heartbleed logo.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

13 Apr 04:11

David, Goliath and WebRTC

by mjgraves
The WebRTC movement is certainly gathering steam. World+Dog are now running along side that train, hoping to jump on and play with all the cool kids. It’s a fast moving train. Late comers may have a tough time getting on-board. When they do get aboard they may find that the best seats are already taken. […]
09 Apr 20:20

Dropbox: Ok, now we’re really serious about the enterprise and collaboration

by Barb Darrow

Dropbox has rewritten its popular namesake file-share application to be more enterprise friendly. The goal here to reassure businesses that Dropbox for Business is indeed to be trusted with corporate content and, oh by the way, get more companies to buy it as a result.

“We rebuilt all of Dropbox to give everyone two Dropboxes; one personal with your password your contacts, and a second company Dropbox accessible to you but managed by company. But you don’t want it to be klugey and hard to go back and forth. Most of us have one phone so we had to reengineer our interfaces,” said Ilya Fushman, director of product, mobile and business for the San Francisco-based company, ahead of an event in the city designed to highlight the new features.

Before, if Jane Doe had her personal Dropbox on her device and wanted to sign into the old Dropbox for Business, she really couldn’t do so without some sort of hack. The revamped Dropbox solves that problem by letting Doe, the individual, have that personal account and Doe, the employee, have an IT-managed business account accessible from the same device.

dropbox for business wipeAnd now, if Doe loses her device, corporate data can be wiped clean remotely. If she quits, IT can reassign business content to another authorized user — a key demand for Dropbox for Business up till now. Oh, and the new business version also gives IT a view into who opened what documents when. Such auditing is crucial to many companies.

dropbox for business dual accountWith the old setup, the difficulty of accessing both personal and work Dropbox from one device meant users often synched work documents with their personal accounts. That sets up the sort of data leakage scenario that give IT fits. In theory, the easy coexistence of accounts from one device will alleviate that problem. In addition, segregating content on the business accounts means that third-party vendors — like NCrypted Cloud and BoxCryptor — can focus on layering additional security on that data.

If much of this sounds familiar it’s because these administrative capabilities are what Box and other would-be Dropbox-for-the-enterprise companies already offer. Box, for example, has offered remote wipe via partnerships with Good Technology and MobileIron for some time. What those vendors may not have is Dropbox’s gigantic name recognition among consumers. That brand already made the older Dropbox for Business an easy sell into small businesses, said Jim Turner, president of Hilltop Consultants, a managed service provider. End users want Dropbox and their bosses sign off on it because it’s a well-known name backed by a trusted partner, he said.

At a special event Wednesday in San Francisco, the company also announced a collaboration tool called “Project Harmony,” designed to help remedy when two users are working on the same file. Deployed within native apps, starting with Microsoft Office for both Mac and PC, Dropbox pops up a small notification window that tells the user how many people and who are actually working on the file at the same time. The feature also includes a chat system, and live refresh so users can quickly update documents. It is due later this year.

Dropbox now claims 275 million (!) users, and that it is used in 97 percent of Fortune 500 accounts, but still does not break out paying customers. The company really needs to make it easier for people who bring Dropbox in from home to upgrade to a paid business account without sacrificing ease of use. This is just another step in that road.

Dropbox for all its resources, still may have a tough row to hoe in business accounts where Microsoft and Google are making big plays OneDrive and Google Drive respectively.

Lauren Hockenson contributed to this story.

 

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

09 Apr 17:25

T-Mobile drops the price of its entry-level plan, selling 500 MB for $40

by Kevin Fitchard

As T-Mobile continues to chip away at its larger rivals’ business, it’s starting to scale down to mobile data plan prices to attract more budget-minded smartphone users. On Saturday, it will introduce a new entry-level plan priced at $40 a month that offers 500 MBs of data as well unlimited voice and SMS.

This plan, called Simple Starter, is a bit different from its regular Simple Choice plans, which start at $50 a month. Instead of throttling data speeds back after customers hit their monthly data caps, T-Mobile is suspending data service after customers hit 500 MB in a billing cycle, restoring data access when a new billing cycle comes into effect.

T-Mobile simply starter rate plan

T-Mobile is positioning the plan as a way for cost-conscious consumers to avoid overage charges. Though T-Mobile technically doesn’t charge overages on any of its plans, Verizon and AT&T will automatically tack another data bucket onto your bill once you hit your cap. That said, T-Mobile is also providing an option for customers to buy data a la carte if they’re stranded mid-billing cycle without a data connection: a one-day 500-MB plan costs $5 and a seven-day 1-GB plan costs $10.

Essentially if you’re a light data user, this plan make a lot of sense. You get full access to its LTE network and never worry about having your data speeds throttled. But if you’re creeping over 500 MB more than a couple of months of year, then it’s probably not worth your while. The cost of buying passes to maintain your service will obviate any cost savings over T-Mobile’s Simple Choice plans, unless you’re willing to restrict your mobile internet usage to Wi-Fi.

Simple Starter also doesn’t give customers access to T-Mobile’s new free international data roaming and texting benefits, substantial perks for anyone who travels overseas. It’s designed as a domestic only plan.

Still, it’s very interesting to see T-Mobile scale prices down — creating cheaper options for consumers — rather than just pile more data onto its existing plans, though its obviously restricting some features. We’re going to see more emerge from T-Mobile in the next few days as it tweaks its Un-carrier strategy. In a T-Mobile blog post, CEO John Legere said T-Mobile would be making a new announcement each day until Friday, so stay tuned.

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

09 Apr 04:28

Skype for modern Windows now lets you set your availability to Invisible and brings back sign out option

by Emil Protalinski
Skype today updated its modern Windows app (read: Metro version) with two new availability options. You can download the new release now directly from the Windows Store. Here’s the Skype 2.7 for modern Windows changelog: Invisible – This option lets you still receive incoming messages, but without others knowing you’re there to read them. Just like with SMSes, you can choose to respond now or later. Sign out – Although Skype had this option before, it was removed a few versions ago, and now it’s back again. In other words, you can once again choose not to receive any messages...

This story continues at The Next Web
09 Apr 04:08

Zendesk and the Art of Cloud-Based Customer Care

by Tim Moynihan

Zendesk

A number of cloud-based contact center service providers have recently announced integration with web-based, help desk provider Zendesk. Among them include, Interactive Intelligence, 8×8 and Five9.

Indeed, Zendesk provides compelling, elegant and innovative solutions for customer service care. I think that cloud-based providers are targeting Zendesk as a key integration partner to assist on improving their Conversational Commerce goals to solve real contact center challenges. These include:

  • Actionable Context – Cloud providers are looking to cluster agents for the best possible customer experience. For example, by any channel, on any device, at any time. Customers can communicate with companies pretty much however they wish, but it has been a challenge to cloud-based providers to handle all of these interactions in context. In providing the best possible customer experience, an agent who understands the context of an interaction can provide an effective, more emotionally connected response and better represent the brand of the company.
  • Speed – Actionable context can make interactions between callers and agents faster and more efficient. Understating the customer path or journey allows agents to provide better customer satisfaction.
  • Smooth Integration – While cloud-based contact center service providers each have their own “special sauce,” they’re always looking for tools to streamline the customer interaction and seamlessly integrate tools and features. The ability to integrate, maintain, tune and extend services through these tools provide competitive differentiation and a strategic advantage.
  • Metrics, Metrics, Metrics – Providers want visibility into how they’re doing, as do their customers. Actionable metrics allow providers to fine-tune their operations and processes, thereby addressing costs as well as business goals.

Hence, cloud-based providers are looking to companies such as Zendesk to provide elegant solutions to both customers and contact center operators. What do you think?

07 Apr 17:51

Another mobile carrier bites the dust: Cincinnati Bell sells its spectrum to Verizon

by Kevin Fitchard

As I’ve written before, in a U.S. mobile industry dominated by mega-carriers, it’s becoming harder and harder for smaller regional carriers to survive. Cincinnati Bell became the latest case in point on Monday, announcing it is exiting the wireless business and selling off its spectrum to Verizon for $210 million.

As you might expect by its name Cincinnati Bell operates in southwestern Ohio, where it’s the incumbent telephone company offering phone, DSL, IPTV, fiber broadband and even electrical utility services to Cincinnati and its environs. Its wireless operations extend beyond its traditional wireline footprint into northwestern Kentucky and southeastern Indiana.

Source: Flickr / Dave Crim

Source: Flickr / Dave Crim

Cincinnati Bell is still one of the dominant mobile providers in its home territory but its wireless business has definitely seen better days. In its heyday in 2007 and 2008 it had close to 600,000 customers. It ended 2013 with 340,000 subscribers.

“It has become economically challenging for us to invest in our wireless business at the levels necessary to deliver best-in-class service to our customers,” Cincinnati Bell CEO and President Ted Torbeck said in a statement.

Verizon is buying the regional carrier’s spectrum because it has little use for its networks. While Verizon is the country’s largest CDMA operator, Cincinnati Bell uses the competing GSM standard for voice and HSPA for data services. Like so many of the regional carrier acquisitions we’ve seen in the last year — T-Mobile buying MetroPCS, AT&T buying Leap Wireless — this deal is about airwaves, not network assets or customers.

Cincinnati Bell’s mobile customers won’t have to scramble to find a new carrier – at least not yet. The companies don’t expect the deal to close until the second half of the year, and Cincinnati Bell said it would continue to offer service to its customers for 8 to 12 months after the deal’s signing.

 

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.