Feb 17, 2008

Technorati - For Searching Blogs

Technorati is an Internet search engine for searching blogs, competing with Google, Yahoo and IceRocket. As of December 2007, Technorati indexes over 112 million weblogs. The name Technorati is a portmanteau, pointing to the technological version of literati or intellectuals.



Technorati was founded by Dave Sifry and its headquarters are in San Francisco, California, USA. Tantek Çelik was the site's Chief Technologist.

Technorati uses and contributes to open source software. Technorati has an active software developer community, many of them from open-source culture. Sifry is a major open-source advocate, and was a founder of LinuxCare and later of Wi-Fi access point software developer Sputnik. Technorati includes a public developer's wiki, where developers and contributors collaborate, as well as various open APIs.

The site won the SXSW 2006 awards for Best Technical Achievement and also Best of Show. It was also nominated for a 2006 Webby award for Best Practices, but lost to Flickr and Google Maps.

Read More...

R.I.P. HD DVD: Toshiba reportedly ends the war

Well, that's it. Toshiba appears to be pulling the plug on HD DVD. Toshiba has not commented publicly, but a report on Japan's NHK says Toshiba has made the decision to withdraw from next generation high-definition DVD production.



This news certainly doesn't come as surprise to anyone remotely following HD DVD's format war with rival Blu-ray. HD DVD had suffered a string of defections, with Warner, Netflix, Best Buy, and Wal-Mart all recently pledging their alliance to Blu-ray.

The NHK report says existing HD DVD products will remain in the market for a while, but Toshiba will stop further development of HD DVD. The report also estimates that Toshiba will take a hit to the tune of "hundreds of millions of U.S. dollars" and will close factories in northern Japan.

Elsewhere this weekend, Sony and its Blu-ray buddies are going to make like VHS and party like it's 1989.

Read More...

Outfitting the iPhone for business

Executive pressure is pushing the iPhone through the side door of the enterprise, but will the CEO's crush object ever truly be business legit?

You've heard it all before. The CEO buys an iPhone, falls in love, and leans on IT to shift its stack of tasks to make work-enabling his new gadget IT Priority No. 1.



But as IT departments scramble to sync e-mail and slap together Web apps for Safari-based iPhone access, the question remains: Can Apple's ear-candy crush object draft off this executive effect to true enterprise mobile legitimacy, or are execs' iPhone fetishes jeopardizing the integrity of their company's mobile strategy?

Here we examine the iPhone ecosystem's evolving backdoor bid for enterprise, one that pits security concerns, vendor intentions, and gadget affinities against caution-minded enterprise IT.

Executive inroads to the enterprise
A midsize company providing inventory supply services to schools, government facilities, and other institutions across the United States was perfectly happy with its mobile Palm-based inventory software until the CEO and other high-level execs purchased their own iPhones.

"Suddenly, they were saying, 'Hey, this is really nice,' and reevaluating their whole handheld strategy," says Ben Gottlieb, president of Stand Alone, which provides business inventory software and consulting services to the aforementioned inventory supplier. "Then came the questions about where the Palm OS was headed and whether their inventory application could be iPhone-enabled."

Mark Russell, vice president of sales and marketing at U-Line, a Milwaukee-based manufacturer of under-counter icemakers and refrigerators, had an iPhone for fun and a Nokia E70 for work until he accidentally crushed the Nokia device in his mother-in-law's recliner. Instead of getting a new E70, he asked IT to sync his iPhone with the corporate Exchange server.

"Our IT guy was nervous at first, but when Visto added iPhone capability to its Visto Enterprise Server, he gave it a try," Russell says, referring to the mobile messaging service provider, Visto. U-Line was already using Visto to sync its smartphones with Exchange.

Russell is perfectly happy with his business iPhone and has no intention of repurchasing the Nokia or any other device. And according to Daniel Koshute, U-Line systems administrator, several other employees are ready to make the switch as well.

The above examples are not unique. Like the PDAs, USB storage devices, and Wi-Fi devices that came before it, the iPhone is pushing its way through the side door of today's enterprises, thanks to a sexy interface, a superior mobile browser, and executive pressure.

"Apple has definitely achieved its goal of making you smile every time you press a keystroke," says Ken Dulaney, an analyst at Gartner.

Read More...

Google finds evil all over the Web

Google turned its Web-crawling technology loose to hunt down malware-serving pages and found 3 million, meaning about one out of every 1,000 pages is malicious

The Web is scarier than most people realize, according to research published recently by Google.



The search engine giant trained its Web crawling software on billions of Web addresses over the past year looking for malicious pages that tried to attack their visitors. They found more than 3 million of them, meaning that about one in 1,000 Web pages is malicious, according to Neils Provos, a senior staff software engineer with Google.

These Web-based attacks, called "drive-by downloads" by security experts, have become much more common in recent years as firewalls and better security practices by Microsoft have made it harder for worms and viruses to directly attack computers.

In the past year the Web sites of Al Gore's An Inconvenient Truth movie and the Miami Dolphins were hacked, and the MySpace profile of Alicia Keys was used to attack visitors.

Criminals are getting better at this kind of work. They have built very successful automated tools that poke and prod Web sites, looking for programming errors and then exploit these flaws to install the drive-by download software. Often this code opens an invisible iFrame page on the victim's browser that redirects it to a malicious Web server. That server then tries to install code on the victim's PC. "The bad guys are getting exceptionally good at automating those attacks," said Roger Thompson, chief research officer with security vendor Grisoft.

In response, Google has stepped up its game. One of the reasons it has been scouring the Web for malicious pages is so that it can identify drive-by-download sites and warn Google searchers before they visit them. Nowadays about 1.3 percent of all Google search queries list malicious results somewhere on the first few pages.

Some of the data surprised Provos.

"When we started going into this, I had the firm intuition that if you go to the sleazier parts of the Web, you are in more danger," he said.

It turns out the Web's nice neighborhoods aren't necessarily safer than its red-light districts.

"We looked into this and indeed we found that if you ended up going to adult-oriented pages, your risk of being exposed [to malicious software] was slightly higher," he said. But "there really wasn't a huge difference."

"Staying away from the disreputable part of the Internet really isn't good enough," he noted.

Another interesting finding: China was far and away the greatest source of malicious Web sites. According to Google's research, 67 percent of all malware distribution sites are hosted in China. The second-worst offender? The U.S., at 15 percent, followed by Russia (4 percent), Malaysia (2.2 percent), and Korea (2 percent).

It costs next to nothing to register a Web domain in China and service providers are often slow to shut down malicious pages, said Thompson. "They're the Kleenex Web sites," he said. Criminals "know they're going to be shut down, and they don't care."

Malicious site operators in China fall into two broad categories, Thompson said: Fraudsters looking to steal your banking password, and teenagers who want to steal your World of Warcraft character.

So how to stop this growing pestilence?

Google's Provos has this advice for Web surfers: Turn automatic updates on. "You should always run your software as updated as possible and install some kind of antivirus technology," he said.

But he also thinks that Webmasters will have to get smarter about building secure Web sites. "I think it will take concentrated efforts on all parts," for the problem to go away, he said.

Read More...
THE ARTICLES WAS QUOTED FROM VARIOUS SOURCES

SeeITNews
email:seeitnews@gmail.com