Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Jennifer Sultan Pleads Guilty to Selling Prescription Drugs





At the height of dot-com mania 13 years ago, Jennifer Sultan and a few colleagues sold their small technology company for $70 million in stock and cash. She and her boyfriend rented a large house in the Hamptons for the summer and bought a spacious loft near Union Square.







John Marshall Mantel for The New York Times

Jennifer Sultan faced 15 years to life on the top charge against her, and a potential for more prison time on other counts.







In the years since, that temporary flush of wealth evaporated and Ms. Sultan, 38, developed an addiction to prescription painkillers.


On Friday, she sat handcuffed in a courtroom at State Supreme Court in Manhattan. In exchange for a promise of a four-year prison sentence, she pleaded guilty to selling prescription painkillers and conspiring to sell a firearm.


She was arrested last July and accused of being part of a ring that sold prescription drugs and guns. Four others arrested with Ms. Sultan had already pleaded guilty. One, Nicholas Mina, a former New York City police officer, agreed to serve more than 15 years in prison as part of a plea bargain under which he admitted stealing guns from his colleagues’ precinct house lockers and selling them. Mr. Mina was also addicted to prescription painkillers.


Though Ms. Sultan’s lawyer said she had hoped for less than four years, she faced 15 years to life in prison on the top count against her and the potential for more prison time on other charges. She said little in court but smiled broadly several times as she spoke quietly with her lawyer, Frank Rothman.


“She was happy to be done with it, but she was not happy with the sentence,” Mr. Rothman said afterward.


Ms. Sultan grew up in West Long Branch, N.J., five miles north of Asbury Park, and graduated from New York University in 1996. She and her boyfriend at the time, Adam Cohen, worked at a company, Live Online, that was an early pioneer in live streaming events on the Internet.


After the sale of Live Online, efforts by Ms. Sultan and Mr. Cohen to start other technology companies failed. Ms. Sultan explored other interests, including acupuncture and holistic health.


Early last year, a city narcotics investigator discovered an advertisement Ms. Sultan had placed on Craigslist offering prescription painkillers for sale. She and Mr. Cohen were still living in the penthouse loft near Union Square that they bought after the sale of Live Online.


Five times from February through June, she sold pills to an undercover officer, according to her indictment. One sale took place at the Starbucks on Union Square. In another, she sold 183 oxycodone tablets to the officer for $4,400 at a Starbucks in the Flatiron district near the school where she was studying acupuncture.


A separate investigation into the ring that sold stolen guns and pain medication picked up Ms. Sultan sending a text message to the man accused of being the ringleader, Ivan Chavez, saying she wanted to sell him a .357 Magnum handgun for $850, according to a separate indictment obtained by the Manhattan district attorney.


Mr. Chavez was sentenced to 20 years in prison.


Ms. Sultan and Mr. Cohen, who was not accused of participating in the drug and guns ring, filed for bankruptcy in 2010. Last August, the bankruptcy judge ordered them to vacate the loft to allow a bankruptcy trustee to sell it. The 5,600-square-foot loft is still listed for sale at just under $6 million.


She has been incarcerated since her arrest in July because she was unable to raise $85,000 for bail. With credit for good behavior and time served since her arrest, Ms. Sultan could be released from prison in about two years.


Read More..

Groupon Dismisses Chief After a Dismal Quarter





Andrew Mason, the irreverent programmer and musician who turned a failed social action site into the daily deals phenomenon Groupon, was dismissed Thursday as chief executive.




A day earlier, Groupon reported weak fourth- quarter earnings, which caused investors to shave off a quarter of the Chicago company’s value. The news about Mr. Mason, released after the market closed, sent shares up more than 4 percent in late trading.


In a note to Groupon employees that was typical of his sassy style, Mr. Mason wrote: “after four and a half intense and wonderful years as CEO of Groupon, I’ve decided that I’d like to spend more time with my family. Just kidding — I was fired today.”


He added, “If you’re wondering why ... you haven’t been paying attention.”


Groupon said in its earnings call that first-quarter revenue would be about 10 percent lower than analysts were expecting, among other disappointments.


Jordan Rohan, an analyst with Stifel, Nicolaus, said Mr. Mason’s exit “was long overdue.”


“I view Mason as a visionary idea generator,” Mr. Rohan said. “Few would argue with how impressive the Groupon organization was as it grew. However, at some point it became the overgrown toddler of the Internet — operationally clumsy, not quite ready to make adult decisions.”


Mr. Mason, who dodged a potential dismissal in November, will be temporarily replaced by Eric Lefkofsky, Groupon’s executive chairman, and Theodore J. Leonsis, its vice chairman, while they search for a replacement.


Now 32, Mr. Mason had a wild ride. Unlike many Silicon Valley entrepreneurs, he never seemed to dream about building a huge company or even becoming fantastically wealthy. Groupon was an outgrowth of a start-up, the Point, which was aimed at encouraging charitable actions by groups. In late 2008, Mr. Mason and a few colleagues reformulated it as a deals shop.


Over the years, Silicon Valley start-ups had tried many forms of deal sites, but Groupon was the first to really make it work, and did so instantly. The formula was simple and compelling. People were sent e-mails of offers for, say, a local restaurant. If they bought it, they got a bargain, Groupon got a commission and the restaurant won new patrons.


In two years, Mr. Mason was turning down a reported $6 billion offer from Google. As a reminder that fate is fickle, he put in the reception area of Groupon’s offices a gallery of framed magazine covers featuring Napster, Myspace and other tech wunderkinds that ultimately faded. To these losers, he then added a cover that featured Groupon.


“Our marketing guy thought we should put some press on the wall, but I didn’t want an atmosphere of popping the Champagne,” Mr. Mason told Chicago Time Out in 2010. “We still have a mountain to climb, and other iconic companies will be a footnote in history.”


On the first day of trading after Groupon’s public offering, in late 2011, the company was valued at $16.5 billion. It was the most talked-about tech debut between Google and Facebook. The actors, stand-up comics and other creative types who made up much of Groupon’s early team watched in wonder. The company had a loose, informal style, with an editorial team as large as a midsize newspaper. Writers labored over the gags that introduced the deals. The one for a dentist started like this: “The Tooth Fairy is a burglarizing fetishist specializing in black-market ivory trade, and she must be stopped.”


But then the competition intensified, the criticism began and the stock struggled. Groupon’s market value is now $2.97 billion.


Groupon has 10,000 employees in 48 countries. Mr. Rohan, the analyst, said the new chief executive “will have to refocus the company on the most productive markets with the most productive sales people.” He added, “Groupon needs to give up on the grand vision of becoming an operating system for local commerce and instead be the best daily deals provider it can be.”


Even as the daily deals sites struggle financially — the No. 2 company, Amazon-backed LivingSocial, is in worse shape than Groupon — the number of digital coupon users in the United States continues to rise, according to eMarketer. An estimated 92.5 million Americans redeemed a digital coupon in 2012, up 4.9 percent from 88.2 million in 2011.


No surprise there, said Sucharita Mulpuru, an e-commerce analyst with Forrester Research. “Who doesn’t like 50 percent off something? The question was always how you create good consistent deal flow from merchants.”


She noted that in his letter, Mr. Mason talked about what was best for the customer. “They think their customer is Joe Smith who buys the Groupon,” Ms. Mulpuru said. “But the customer is the merchant. They have been focusing on the wrong person.”


Indeed, merchants got a lot of attention for complaining how successful deals came close to ruining them.


Mr. Mason’s letter was in the blunt tech tradition of a former Yahoo chief executive, Carol Bartz, who sent an e-mail to the search engine’s employees in September 2011 saying, “I’ve just been fired.”


In his letter, Mr. Mason wrote: “I’m o.k. with having failed at this part of the journey. If Groupon was Battletoads, it would be like I made it all the way to the Terra Tubes without dying on my first-ever play-through.” He added that he was looking for a good fat camp to lose the 40 pounds he had gained at Groupon.


Mr. Mason’s letter was very well received on Twitter, with people applauding his honesty as much as his sense of humor.


Mr. Mason himself retweeted a comment that said: “First the pope and now Andrew Mason!?! Our esteemed leaders are falling like flies.”


This article has been revised to reflect the following correction:

Correction: March 1, 2013

An earlier version of this article referred imprecisely to Groupon’s valuation at its initial public offering in 2011. The company’s value reached $16.5 billion after the first day of trading, not with the offering itself, which valued the company at $12.65 billion.



Read More..

Gadgetwise Blog: Tip of the Week: Clean Your Phone and Its Camera

Smartphones spend a lot of time in hand, where they can pick up germs and dirt. Wiping down the phone regularly with an antibacterial cloth intended for use with touch screens can help keep it clean. Many office supply stores like Staples or Office Depot carry disposable wipes for use on phone and tablet screens.

If your phone has a camera and your photos have been looking blurry, you can clean its lens with a microfiber cloth or other wipe for use with camera lenses; a cotton swab moistened with distilled water can also take off stubborn grime. Whatever you do, though, do not spray the phone with industrial cleansers or use cleaning wipes designed for household chores, because these can damage the screen and other parts of the handset.

Read More..

Gadgetwise Blog: Q&A: Moving iTunes Libraries

How do I transfer my iTunes library from a desktop PC to a laptop, neither of which are Apple computers?

All the items in your iTunes library, like music, TV shows and podcasts, are stored in folders on the computer. The iTunes software itself, which is basically a big database program crossed with a media player, displays the items in your library in lists and makes it relatively easy to manage your collection.

To move your library to a new computer, you just need to move your iTunes library folder from the old machine to the new one with a copy of the iTunes software installed. You can do this in several ways depending on how you use iTunes — including transferring all the files over your network with the Home Sharing feature, copying your iTunes folder to an external hard drive or set of DVDs for transport between computers, or transferring content from the iTunes Store with an iPod, iPad or iPhone.

Apple has step-by-step, illustrated instructions for all these moving methods (and others) on its site. If you plan to get rid of the old computer, be sure to deauthorize it for use with your iTunes purchases, as explained here.

Read More..

Yahoo Orders Home Workers Back to the Office





Since Marissa Mayer became chief executive of Yahoo, she has been working hard to get the Internet pioneer off its deathbed and make it an innovator once again.




She started with free food and new smartphones for every employee, borrowing from the playbook of Google, her employer until last year. Now, though, Yahoo has made a surprise move: abolishing its work-at-home policy and ordering everyone to work in the office.


A memo explaining the policy change, from the company’s human resources department, says face-to-face interaction among employees fosters a more collaborative culture — a hallmark of Google’s approach to its business.


In trying to get back on track, Yahoo is taking on one of the country’s biggest workplace issues: whether the ability to work from home, and other flexible arrangements, leads to greater productivity or inhibits innovation and collaboration. Across the country, companies like Aetna, Booz Allen Hamilton and Zappos.com are confronting these trade-offs as they compete to attract and retain the best employees.


Bank of America, for example, which had a popular program for working remotely, decided late last year to require employees in certain roles to come back to the office.


Employees, especially younger ones, expect to be able to work remotely, analysts say. And over all the trend is toward greater workplace flexibility.


Still, said John Challenger, chief executive of Challenger Gray & Christmas, an outplacement and executive coaching firm, “A lot of companies are afraid to let their workers work from home some of the time or all of the time because they’re afraid they’ll lose control.”


Studies show that people who work at home are significantly more productive but less innovative, said John Sullivan, a professor of management at San Francisco State University who runs a human resource advisory firm.


“If you want innovation, then you need interaction,” he said. “If you want productivity, then you want people working from home.”


Reflecting these tensions, Yahoo’s policy change has unleashed a storm of criticism from advocates for workplace flexibility who say it is a retrograde approach, particularly for those who care for young children or aging parents outside of work. Their dismay is heightened by the fact that they hoped Ms. Mayer, who became chief executive at 37 while pregnant with her first child, would make the business world more hospitable for working parents.


“The irony is that she has broken the glass ceiling, but seems unwilling for other women to lead a balanced life in which they care for their families and still concentrate on developing their skills and career,” said Ruth Rosen, a professor emerita of women’s history at the University of California.


But not only women take advantage of workplace flexibility policies. According to the Bureau of Labor Statistics, nearly as many men telecommute.


The bureau says 24 percent of employed Americans report working from home at least some hours each week. And 63 percent of employers said last year that they allowed employees to work remotely, up from 34 percent in 2005, according to a study by the Families and Work Institute, a nonprofit group studying the changing work force.


During the recession, the institute expected employers to demand more face time, but instead found that 12 percent increased workplace flexibility, said Ellen Galinsky, its president and co-founder. She attributed this to companies’ desire to reduce real estate costs, carbon footprints and commuting times.


Technologies developed in Silicon Valley, from video chat to instant messaging, have made it possible for employees across America to work remotely. Yet like Yahoo, many tech companies believe that working in the same physical space drives innovation.


A Yahoo spokeswoman, Sara Gorman, declined to comment, saying only that the company did not publicly discuss internal matters.


Read More..

Nokia Unveils Low-Priced Phones


BARCELONA — Nokia on Monday introduced two new low-priced basic cellphones, plus two lower-priced versions of its flagship Lumia Windows smartphone — part of an effort by the former market leader to compete amid an intensifying price war in handsets.


The four new phones — the Lumia 720, Lumia 520, Nokia 301 and Nokia 105 — will help Nokia maintain and perhaps build on its position as the No. 2 maker of cellphones worldwide behind Samsung and fend off challenges by two Chinese manufacturers, Huawei and ZTE, analysts said.


The Lumia 520, selling for €139, or about $183, in Europe and $179 in the United States, is priced 25 percent less lower Nokia’s least-expensive smartphone, the Lumia 620.


“I think that with the Lumia 520, Nokia is really going to take the Windows 8 operating system to a much bigger, mass market,” said Pete Cunningham, an analyst at Canalys, a research firm in Reading, England. “I would expect their volumes of Lumia shipments to now start increasing slowly, but they still have a way to go.”


Samsung overtook Nokia last year as the leading global maker of cellphones, amassing a 23 percent market share. Nokia’s market share slipped to 17.9 percent from 24 percent during 2012, according to the market research firm IDC. Apple ended the year in third place at 9.9 percent, followed by ZTE, with 3.6 percent, and Huawei, with 3.3 percent.


The new handsets, which the company unveiled at the Mobile World Congress industry convention in Barcelona, reinforced Nokia’s strategy of targeting the least-expensive but fastest-growing parts of the market. The Nokia 105, the company’s new basic, entry-level phone, will sell for €15 — less than the price of a pizza in some countries.


T-Mobile U.S.A. has agreed to sell the Lumia 520, a 3G phone with a 4-inch touchscreen, in the United States starting in the second quarter, Nokia said.


In 2012, the global market for cellphones that cost $250 or less grew by 99 percent from its level in 2011, and accounted for more than half of all cellphones sold worldwide, according to IDC. The upper-end segment of smartphones costing more than $250 grew by only 23 percent during the same period.


“Nokia is targeting the right end of the market with new, inexpensive phones,” said Francisco Jeronimo, an analyst with IDC in London. “This is where the growth is.”


Nokia, the global market leader in smartphones as late as 2007 before Apple produced its first iPhone, trailed the likes of Blackberry, LG and Motorola with a roughly 4 percent market share in the fourth quarter, according to IDC. Huawei and ZTE, the No. 3 and No. 5, each sold more than twice as many smartphones as Nokia.


This year for the first time, more consumers around the world will buy a smartphone than a simple, basic cellphone, according to IDC.


Stephen Elop, the Nokia chief executive, said the new, lower-priced Lumia handsets would give the company a full array of smartphones it had been lacking.


“These are less-expensive devices, but they will move in much larger volumes,” Mr. Elop, a former Microsoft executive, said during an interview.


Mr. Elop said Nokia was committed to making some of Lumia’s unique features, such as digital lenses that allow users to enhance their own photos, available throughout the entire Lumia lineup, instead of reserving the most advanced features for the most expensive handsets.


The Nokia-Microsoft alliance that was announced two years ago in February 2011, Mr. Elop said, is gaining momentum. He dismissed the possibility that the company would eventually abandon its software partnership with Microsoft for another operating system, such as the Android system made by Google.


“There’s no doubt in my mind that that was the right decision” to choose Microsoft, Mr. Elop said. The alliance with the world’s largest software maker has set Nokia apart from handset makers relying on Android, Mr. Elop said, preserving an identify and edge for Nokia and its products.


With the Lumia line of smartphones expanding, Nokia can begin to sell Microsoft phones increasingly to businesses, which may already be reliant on Microsoft Windows and e-mail services in their operations, Mr. Elop said.


“Being able to bring those all together I think is a very powerful force,” he said. “And it’s something that’s just beginning.”


Nokia sold 4.4 million Lumia smartphones in the fourth quarter, up from 2.9 million in the third quarter. Mr. Elop declined to say how sales of Lumia had develpoped in the first two months of the year. But he suggested that the three new handsets introduced over the last three months would help sustain sales momentum.


The Lumia 920, 820 and 620 are new devices that will translate into new sales, he said. “All of those things will contribute to what we hope to see in the future,” he said.


In the fourth quarter, Nokia generated an profit of €202 million, compared with a loss of €1.1 billion a year earlier.


The Nokia 301, a mid-range feature phone, will be introduced in the second quarter and sell for €65. The 3G handset can display streaming video and comes with a 3.2 megapixel camera and panoramic, wide-angle lens. The Nokia 105 will eventually replace the entry-level Nokia 1280, which sold more than 100 million units in the past two years.


The Nokia 720, which will be sold initially in Asia and Europe, is a 3G handset targeting social media users. The phone, which will sell for €249, comes with 8 gigabytes of internal memory and an SD-card slot for additional storage. China Mobile has agreed to sell the handset in China starting in the second quarter, Nokia said.


Read More..

DealBook: Judge Sides With Einhorn and Halts an Apple Shareholder Vote

9:26 p.m. | Updated

A federal judge on Friday ordered Apple to halt collecting shareholder votes on a contentious proposal to change some of its corporate charter, handing a victory to the hedge fund manager David Einhorn.

The ruling issued Friday touches on a fairly narrow legal point. But it signals a clear victory for Mr. Einhorn, who has taken up a fight with Apple over using some of the $137 billion in its corporate treasury to make additional payouts to shareholders.

Mr. Einhorn’s hedge fund firm, Greenlight Capital, has sued Apple in Federal District Court in Manhattan, arguing that the company improperly tied together several shareholder issues to be put for a vote into one proposal. Such bundling violated rules set by the Securities and Exchange Commission, lawyers for the hedge fund argued.

At the heart of the hedge fund’s complaint was that Apple combined a plan to eliminate its ability to issue preferred stock without shareholder approval with two other initiatives that Greenlight favored. By allowing the vote to proceed, lawyers for the firm argued, Greenlight was being forced to vote against its own interests.

The judge overseeing the case, Richard Sullivan, firmly agreed with that interpretation.

“Given the language and purpose of the rules, it is plain to the court that Proposal No. 2 impermissibly bundles ‘separate matters’ for shareholder consideration,” Judge Sullivan wrote in his order. The judge said at a hearing on Tuesday that he was leaning toward Mr. Einhorn’s point of view on the matter.

His ruling comes just days before the company’s shareholder meeting next Wednesday. It will also prevent Apple from accepting shareholder votes on Proposal No. 2, which had included Apple’s plans to eliminate its preferred shares. Some shareholder rights advocates have contended that preferred shares have been used as an anti-takeover tactic by boards and have pushed for their elimination.

Mr. Einhorn’s bigger goal has been to persuade Apple to return some of its billions sitting in cash to shareholders as a way to unlock the company’s value. Greenlight Capital has contended that the company has far more cash than it will ever need, and that preferred shares could provide additional payouts worth about $61 a share, while still leaving the company with an enormous war chest.

“We know they embrace innovation and can recognize it when they see it, even if it isn’t the kind of innovation people usually think of when they think of Apple,” Mr. Einhorn said in a conference call with analysts on Thursday.

Mr. Einhorn said that Apple should issue preferred shares, that would augment a stock dividend and buyback program that the company already has in place.

Although Apple was once the stock market darling for its meteoric rise, in recent months, share prices have sagged.

In a statement on Friday, Greenlight praised the judge’s ruling. “This is a significant win for all Apple shareholders and for good corporate governance,” the firm said. “We are pleased the court has recognized that Apple’s proxy is not compliant with the S.E.C.’s rules.”

Apple will now most likely have to break Proposal No. 2 into its separate elements and resubmit them to a vote.

“We are disappointed with the court’s ruling,” said Steve Dowling, a spokesman for Apple. “Proposal No. 2 is part of our efforts to further enhance corporate governance and serve our shareholders’ best interests. Unfortunately, due to today’s decision, shareholders will not be able to vote on Proposal No. 2 at our annual meeting next week.”

Apple had argued that the plan in its entirety was actually shareholder-friendly, and enjoyed the backing of prominent investors like the California Public Employees’ Retirement System.

Anne Simpson, the Calpers director of global governance, said in a statement: “We continue to support Apple in their efforts, and believe that the implementation of majority voting and shareholder approval for the issuance of new stock — preferred or otherwise — is worth waiting for.”

Ruling for Greenlight Capital in Battle With Apple

A version of this article appeared in print on 02/23/2013, on page B4 of the NewYork edition with the headline: U.S. Judge Halts an Apple Shareholder Vote.
Read More..

In a Slight Shift, North Korea Widens Internet Access, but Just for Visitors





HONG KONG — North Korea will finally allow Internet searches on mobile devices. But if you’re a North Korean, you’re out of luck — only foreigners will get this privilege.




Cracking the door open slightly to wider Internet use, the government will allow a company called Koryolink to give foreigners access to 3G mobile Internet service by next Friday, according to The Associated Press, which has a bureau in the North.


The North Korean police state is famously cloistered, a means for the government to keep news of the world from its impoverished people. Only the most elite North Koreans have been allowed access to the Internet, and even they are watched. And although many North Koreans are allowed to have cellphones, sanctioned phones cannot call outside the country.


Foreigners were only recently allowed to use cellphones in the country. Previously, most had to surrender their phones with customs agents.


But it is unlikely that the small opening will compromise the North’s tight control of its people; the relatively few foreigners who travel to North Korea — a group that includes tourists and occasional journalists — are assigned government minders.


The decision, announced Friday, to allow foreigners Internet access comes a month after Google’s chairman, Eric E. Schmidt, visited Pyongyang, the North’s capital. While there he prodded officials on allowing Internet access, noting how easy it would be to set up through the expanding 3G network of Koryolink, a joint venture of North Korean and Egyptian telecommunications corporations. Presumably, Mr. Schmidt’s appeal was directed at giving North Koreans such capability.


“As the world becomes increasingly connected, their decision to be virtually isolated is very much going to affect their physical world, their economic growth and so forth,” Mr. Schmidt told reporters following his visit. “We made that alternative very, very clear.”


North Koreans will get some benefit from the 3G service, as they will be allowed to text and make video calls, The Associated Press said. They can also view newspaper reports — but the news service mentioned only one source: Rodong Sinmun, the North’s main Communist Party newspaper.


Read More..

Gadgetwise Blog: Q&A: Moving the Mac’s Dock

It’s easy to move the Taskbar to a different edge of the screen on a Windows machine, but how do you move the Mac’s row of program icons from the bottom of the screen?

The Windows Taskbar — that row of program icons and open files that typically appears along the bottom edge of the screen — can be moved to the top or sides of the desktop by dragging it with the mouse, or in some later versions of Windows, by unlocking it first before dragging. The Dock, the Mac’s rough equivalent of the Taskbar, can also be moved to other edges of the screen in a few ways.

One method is to click the Mac’s Apple menu up in the top-left corner of the screen, select Dock and slide over to the submenu with the commands to position the dock on the left or right sides of the desktop. This same sub-menu holds options for automatically hiding the Dock on the screen until you pass the mouse cursor nearby, as well as the option for magnifying the icons stocked in the Dock when you pass the cursor over.

The Apple menu can take you right to the Dock’s settings in the Mac’s System Preferences if you want to fine-tune things further. You can also get to these settings by clicking the System Preferences icon in the Dock itself and clicking the Dock icon. In addition to the controls for positioning the Dock on the desktop, the preferences box contains settings for changing the overall size of it, adjusting the magnification size of the icons and other visual aspects of the Dock.

Read More..

Some Victims of Online Hacking Edge Into the Light


Steve Ruark for The New York Times


Alan Paller of the SANS Institute said recently hacked companies were seeking safety in numbers.







SAN FRANCISCO — Hackers have hit thousands of American corporations in the last few years, but few companies ever publicly admit it. Most treat online attacks as a dirty secret best kept from customers, shareholders and competitors, lest the disclosure sink their stock price and tarnish them as hapless.




Rarely have companies broken that silence, usually when the attack is reported by someone else. But in the last few weeks more companies have stepped forward. Twitter, Facebook and Apple have all announced that they were attacked by sophisticated cybercriminals. The New York Times revealed its experience with hackers in a front-page article last month.


The admissions reflect the new way some companies are calculating the risks and benefits of going public. While companies once feared shareholder lawsuits and the ire of the Chinese government, some can’t help noticing that those that make the disclosures are lauded, as Google was, for their bravery. Some fear the embarrassment of being unable to fend off hackers who may still be in high school.


But as hacking revelations become more common, the threat of looking foolish fades and more companies are seizing the opportunity to take the leap in a crowd.


“There is a ‘hide in the noise’ effect right now,” said Alan Paller, director of research at the SANS Institute, a nonprofit security research and education organization. “This is a particularly good time to get out the fact that you got hacked, because if you are one of many, it discounts the starkness of the announcement.”


In 2010, when Google alerted some users of Gmail — political activists, mostly — that it appeared Chinese hackers were trying to read their mail, such disclosures were a rarity. In its announcement, Google said that it was one of many — two dozen — companies that had been targeted by the same group. Google said it was making the announcement, in part, to encourage other companies to open up about the problem.


But of that group, only Intel and Adobe Systems reluctantly stepped forward, and neither provided much detail.


Twitter admitted that it had been hacked this month. Facebook and Apple followed suit two weeks later. Within hours after The Times published its account, The Wall Street Journal chimed in with a report that it, too, had been attacked by what it believed to be Chinese hackers. The Washington Post followed.


Not everyone took advantage of the cover. Bloomberg, for example, has repeatedly denied that its systems were also breached by Chinese hackers, despite several sources that confirmed that its computers were infected with malware.


Computer security experts estimate that more than a thousand companies have been attacked recently. In 2011, security researchers at McAfee unearthed a vast online espionage campaign, called Operation Shady Rat, that found more than 70 organizations had been hit over a five-year period, many in the United States.


“I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly) with the great majority of the victims rarely discovering the intrusion or its impact,” Dmitri Alperovitch, then McAfee’s vice president for threat research, wrote in his findings.


“In fact,” said Mr. Alperovitch, now the chief technology officer at Crowdstrike, a security start-up, “I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know.”


Of that group, there are still few admissions. A majority of companies that have at one time or another been the subject of news reports of online attacks refuse to confirm them. The list includes the International Olympic Committee, Exxon Mobil, Baker Hughes, Royal Dutch Shell, BP, ConocoPhillips, Chesapeake Energy, the British energy giant BG Group, the steel maker ArcelorMittal and Coca-Cola.


David E. Sanger contributed reporting from Washington.



Read More..

Gadgetwise Blog: Q&A: Locking Caps on an iPhone

While I have no desire to SHOUT MY WAY through text messages, I do have to use ALL UPPERCASE sometimes and would like to have CAPS LOCK available on my iPhone. Do I have ANY HOPE?

While the phone’s software keyboard has no dedicated Caps Lock key, quickly tapping the Shift key twice turns on the Caps Lock function. The Shift key turns blue when in Caps Lock mode. To turn off the Caps Lock mode, tap the Shift key again.

The iPhone keyboard has a few other shortcuts to make typing in such a small area more efficient. For example, instead of tapping the .?123 key in the bottom-left corner to switch over to the section of the keyboard that holds the numbers and punctuation keys (and then having to tap the corner key again to switch back to the ABC keyboard), just press the .?123 key down and slide your finger to the number or punctuation mark you need. Once you slide over and select the character, you can resume typing without having to tap back and forth between the different keyboards.

Pressing and holding keys for vowels (and other letters) that use accent marks reveals a pop-up list of accented characters to choose from, like é or ü. When you tap the space bar twice at the end of a sentence, the iPhone inserts a period and capitalizes the next letter you type to begin a new sentence. Apple’s site has an illustrated page of other tips and tricks for the iPhone 5.

Read More..

Gadgetwise Blog: Q&A: Controlling Access to a Kindle Fire HD

Is there any way to keep my kid from roaming around through the videos on my Kindle Fire HD tablet?

Amazon’s Kindle Fire tablets include built-in parental controls for restricting access to specific apps, functions and content on the device. On the Kindle Fire HD, swipe your finger down on the screen to get to the settings area and tap More. Tap Parental Controls and then tap the On button. Select a password (one that will be needed to unlock the restrictions), and tap the Finish button. Select the apps and actions you want to block, like the Web browser, e-mail, video playback or the power to make purchases. Amazon has more information on parental controls here.

The newer Kindle Fire HD models also include Kindle FreeTime, an app that lets you select videos, apps and other specific content the child can view on the tablet. Instructions for setting up a child’s FreeTime profile are on Amazon’s site as well.

Read More..

Gadgetwise Blog: Q&A: Deleting Photos From the iPad

How do I delete photos from the iPad? Some images have a trash can icon I can use to remove them, but others don’t.

The iPad’s Photos app stores both the images you have added directly to the tablet (like pictures saved from e-mail, downloaded from the Web or taken with the iPad’s camera) and those you have copied over from the computer through iTunes. The steps for deleting the photos depend on how the pictures got there in the first place.

The photos you have added directly to the iPad can be deleted directly by tapping that trash can icon for individual pictures on the screen. You can delete multiple photos at once by tapping the Edit button on the album-view screen (typically the Camera Roll album, where saved and shot pictures are stored by default), selecting the pictures you want to remove and then tapping the red Delete button in the top-left corner of the screen.

Photos that you have added to the iPad by using iTunes to sync them from your computer’s pictures library or photo-editing program (like iPhoto or Adobe Photoshop Elements) must be removed through iTunes as well. To do so, connect the iPad to the computer (either with its USB cable or through your Wi-Fi Syncing setup) and click its icon in the iTunes window.

When the screen of iPad settings appears, click the Photos tab so the window shows the albums you have synced to the tablet. Turn off the checkboxes next to the albums you want to delete. The click the Apply button in iTunes and then the Sync button to remove those collections from the iPad. (If you just want to remove certain photos, remove them from the album on the computer and then sync the edited album to the iPad again.)

If you use Apple’s iCloud and its Photo Stream feature, you can find instructions for deleting selected photos from the Photo Stream album here.

Read More..

Dismissed as Doomsayers, Advocates for Meteor Detection Feel Vindicated





For decades, scientists have been on the lookout for killer objects from outer space that could devastate the planet. But warnings that they lacked the tools to detect the most serious threats were largely ignored, even as skeptics mocked the worriers as Chicken Littles.







Jim Watson/Agence France-Presse — Getty Images

Dr. Edward Lu, a former NASA astronaut and Google executive, has warned about space threats.






No more. The meteor that rattled Siberia on Friday, injuring hundreds of people and traumatizing thousands, has suddenly brought new life to efforts to deploy adequate detection tools, in particular a space telescope that would scan the solar system for dangers.


A group of young Silicon Valley entrepreneurs who helped build thriving companies like eBay, Google and Facebook has already put millions of dollars into the effort and saw Friday’s shock wave as a turning point in raising hundreds of millions more.


“Wouldn’t it be silly if we got wiped out because we weren’t looking?” said Edward Lu, a former NASA astronaut and Google executive who leads the detection effort. “This is a wake-up call from space. We’ve got to pay attention to what’s out there.”


Astronomers know of no asteroids or comets that pose a major threat to the planet. But NASA estimates that fewer than 10 percent of the big dangers have been discovered.


Dr. Lu’s group, called the B612 Foundation after the imaginary asteroid on which the Little Prince lived, is one team of several pursuing ways to ward off extraterrestrial threats. NASA is another, and other private groups are emerging, like Planetary Resources, which wants not only to identify asteroids near Earth but also to mine them.


“Our job is to be the first line of defense, and we take that very seriously,” James Green, the director of planetary science at NASA headquarters, said in an interview Friday after the Russian strike. “No one living on this planet has ever before been hurt. That’s historic.”


Dr. Green added that the Russian episode was sure to energize the field and that an even analysis of the meteor’s remains could help reveal clues about future threats.


“Our scientists are excited,” he said. “Russian planetary scientists are already collecting meteorites from this event.”


The slow awakening to the danger began long ago, as scientists found hundreds of rocky scars indicating that cosmic intruders had periodically reshaped the planet.


The discoveries included not just obvious features like Meteor Crater in Arizona, but wide zones of upheaval. A crater more than a hundred miles wide beneath the Yucatán Peninsula in Mexico suggested that, 65 million years ago, a speeding rock from outer space had raised enough planetary mayhem to end the reign of the dinosaurs.


Some people remain skeptical of the cosmic threat and are glad for taxpayer money to go toward urgent problems on Earth rather than outer space. But many scientists who have examined the issues have become convinced that better precautions are warranted in much the same way that homeowners buy insurance for unlikely events that can result in severe damage to life and property.


Starting in the 1980s and 1990s, astronomers turned their telescopes on the sky with increasing vigor to look for killer rocks. The rationale was statistical. They knew about a number of near misses and calculated that many other rocky threats whirling about the solar system had gone undetected.


In 1996, with little fanfare, the Air Force also began scanning the skies for speeding rocks, giving credibility to an activity once seen as reserved for doomsday enthusiasts. It was the world’s first known government search.


The National Aeronautics and Space Administration took a lead role with what it called the Spaceguard Survey. In 2007, it issued a report estimating that 20,000 asteroids and comets orbited close enough to the planet to deliver blows that could destroy cities or even end all life. Today, with limited financing, NASA supports modest telescopes in the southwestern United States and in Hawaii that make more than 95 percent of the discoveries of the objects coming near the Earth.


Scientists lobbied hard for a space telescope that would get high above the distorting effects of the Earth’s atmosphere. It would orbit the Sun, peering across the solar system, and would have a much better chance of finding large space rocks.


But with the nation immersed in two wars and other earthly priorities, the government financing never materialized. Last year, Dr. Lu, who left the NASA astronaut corps in 2007 to work for Google, joined with veterans of the space program and Silicon Valley entrepreneurs to accelerate the asteroid hunt.


Read More..

Bits Blog: Facebook Says Hackers Breached Its Computers

Facebook admitted that it was breached by sophisticated hackers in recent weeks, two weeks after Twitter made a similar admission. Both Facebook and Twitter were breached through a well-publicized vulnerability in Oracle’s Java software.

In a blog post late Friday afternoon, Facebook said it was attacked when a handful of its employees visited a compromised site for mobile developers. Simply by visiting the site, their computers were infected with malware. The company said that as soon as it discovered the malware, it cleaned up the infected machines and tipped off law enforcement.

“We have found no evidence that Facebook user data was compromised,” Facebook said.

On Feb. 1, Twitter said hackers had breached its systems and potentially accessed the data of 250,000 Twitter users. The company suggested at that time that it was one of several companies and organizations to be have been similarly attacked.

Facebook has known about its own breach for at least a month, according to people close to the investigation, but it was unclear why the company waited this long to announce it. Fred Wolens, a Facebook spokesman, declined to comment.

Like Twitter, Facebook said it believed that it was one of several organizations that were targeted by the same group of attackers.

“Facebook was not alone in this attack,” the company said in its blog post. “It is clear that others were attacked and infiltrated recently as well.”

The attacks add to the mounting evidence that hackers were able to use the security hole in Oracle’s Java software to steal information from a broad range of companies. Java, a widely used programming language, is installed on more than three billion devices. It has long been hounded by security problems.

Last month, after a security researcher exposed a serious vulnerability in the software, the Department of Homeland Security issued a rare alert that warned users to disable Java on their computers. The vulnerability was particularly disconcerting because it let attackers download a malicious program onto its victims’ machines without any prompting. Users did not even have to click on a malicious link for their computers to be infected. The program simply downloaded itself.

After Oracle initially patched the security hole in January, the Department of Homeland Security said that the fix was not sufficient and recommended that, unless “absolutely necessary”, users should disable it on their computers completely. Oracle did not issue another fix until Feb. 1.

Social networks are a prime target for hackers, who look to use people’s personal data and social connections in what are known as “spearphishing” attacks. In this type of attack, a target is sent an e-mail, ostensibly from a connection, containing a malicious link or attachment. Once the link is clicked or attachment opened, attackers take control of a user’s computer. If the infected computer is inside a company’s system, the attackers are able to gain a foothold. In many cases, they then extract passwords and gain access to sensitive data.

Facebook said in its blog post that the updated patch addressed the vulnerability that allowed hackers to access its employees’ computers.

Hackers have been attacking organizations inside the United States at an alarming rate. The number of attacks reported by government agencies last year topped 48,500 — a ninefold jump from the 5,500 attacks reported in 2006, according to the Government Accountability Office.

In the last month alone, The New York Times, The Wall Street Journal and The Washington Post all confirmed that they were targets of sophisticated hackers. But security experts say that these attacks are just the tip of the iceberg.

A common saying among security experts is that there are now only two types of American companies: Those that have been hacked and those that don’t know they’ve been hacked.

Read More..

Gadgetwise Blog: Q&A: Creating Customized Shortcuts for Microsoft Word

I find the keyboard shortcut for adding a comment to a Word document cumbersome. Can I change it to different keys?

Microsoft Word’s keyboard shortcut for inserting an editorial comment into a document under review (Control-Alt-M in the Windows version or Command-Option-A for the Mac edition) does take three keys to execute, but you can reassign the command to fewer (or a more comfortable combination of) keys.

In recent versions of Word for Windows, click the File tab, then Options and then select the Customize Ribbon tab. In the “Customize the Ribbon and keyboard shortcuts” area, click Customize. Choose the name of the template or document name you want to use in the “Save changes in” area of box.

In the list of Categories shown, select the menu name or category that contains the command you want to change, like “Insert.” In the Commands list, choose the name of the particular action you want to use, like “InsertNewComment.” The box shows the current keys that are assigned for the shortcut, provides a field to create a custom key combination and a button to assign it. Click OK when you have assigned the keys you want to use for the Insert New Comment command; your new command will replace any combinations already in use as shortcuts.

Microsoft has detailed instructions for making custom keyboard shortcuts for Windows on its site, as well as the equivalent steps for Mac users who want to make their own keyboard shortcuts. The box for creating custom keyboard shortcuts also includes a reset button so you can revert to Microsoft’s original shortcuts for the program’s commands if you choose.

Read More..

Gadgetwise Blog: Tip of the Week: Adjusting Facebook Photo Previews

Hate the way Facebook seems to arbitrarily crop photos you post on your Timeline to fit the square preview windows? On the desktop version, you can change which part of the picture shows in the preview when you’re using Facebook through your Web browser.

To do so, pass the cursor over the image and then click the pencil icon that appears in the top right corner of the post. On the menu that appears, choose Reposition Photo. Click the cursor onto the photo and drag the image until you have the crop you desire for the preview window. Click the Save button. Even though you have now made the photo more appealing for friends browsing your Timeline page, the original image remains uncropped and expands into the full view when someone clicks on the preview window.

Read More..

Gadgetwise Blog: Q&A: Replacing the Motherboard Battery

My ThinkPad laptop asks me to reset the date and time each time I boot up. Why?

Although there could be software issues involved, the battery on the motherboard may be weak or dead. This battery — sometimes referred to as the backup battery, BIOS battery or CMOS (complementary metal oxide semiconductor) battery — supplies power for the computer to retain basic settings like time and date.

Replacing the CMOS battery may fix the issue. If you do not feel like paying a computer-repair shop, you can do it yourself. You need to buy the correct replacement battery (less than $10). Open up the laptop’s case so you can swap in the new power cell. Lenovo’s support site has online manuals for most ThinkPad models that show the location of the CMOS battery. Third-party repair sites like iFixit offer illustrated guides for some laptops as well.

Read More..

DealBook Column: Relationship Science Plans Database of Names and Connections

It sounds like a Rolodex for the 1 percent: two million deal makers, power brokers and business executives — not only their names, but in many cases the names of their spouses and children and associates, their political donations, their charity work and more — all at a banker’s fingertips.

Such is the promise of a new company called Relationship Science.

Never heard of it? Until recently, neither had I. But a few months ago, whispers began that this young company was assembling a vast trove of information about big names in corporate America. What really piqued my interest was that bankrolling this start-up were some Wall Street heavyweights, including Henry R. Kravis, Ronald O. Perelman, Kenneth G. Langone, Joseph R. Perella, Stanley F. Druckenmiller and Andrew Tisch.

It turns out that over the last two years, with a staff of more than 800 people, mostly in India, Relationship Science has been quietly building what it hopes will be the ultimate business Who’s Who. If it succeeds, it could radically change the way Wall Street does business.

That’s a big if, of course. There are plenty of other databases out there. And there’s always Google. Normally I wouldn’t write about a technology company, but I kept hearing chatter about it from people on Wall Street.

Then I got a glimpse of this new system. Forget six degrees of Kevin Bacon. This is six degrees of Henry Kravis.

Here’s how it works: Let’s say a banker wants to get in touch with Mr. Kravis, the private equity deal maker, but doesn’t know him personally. The banker can type Mr. Kravis’s name into a Relationship Science search bar, and the system will scan personal contacts for people the banker knows who also know Mr. Kravis, or perhaps secondary or tertiary connections.

The system shows how the searcher is connected — perhaps a friend, or a friend of a friend, is on a charitable board — and also grades the quality of those connections by identifying them as “strong,” “average” or “weak.” You will be surprised at the many ways the database finds connections.

The major innovation is that, unlike Facebook or LinkedIn, it doesn’t matter if people have signed up for the service. Many business leaders aren’t on Facebook or LinkedIn, but Relationship Science doesn’t rely on user-generated content. It just scrapes the Web.

Relationship Science is the brainchild of Neal Goldman, a co-founder of CapitalIQ, a financial database service that is used by many Wall Street firms. Mr. Goldman sold CapitalIQ, which has 4,200 clients worldwide, to McGraw-Hill in 2004 for more than $200 million. That may explain why he was able to easily round up about $60 million in funds for Relationship Science from many boldface names in finance. He raised the first $6 million in three days.

“I knew there had to be a better way,” Mr. Goldman said about the way people search out others. Most people use Google to learn about people and ask friends and colleagues if they or someone they know can provide an introduction.

Relationship Science essentially does this automatically. It will even show you every connection you have to a specific company or organization.

“We live in a service economy,” Mr. Goldman said. “Building relationships is the most important part for selling and growing.”

Kenneth Langone, a financier and co-founder in Home Depot, said that when he saw a demonstration of the system he nearly fell off his chair. He used an unprintable four-letter word.

“My life is all about networking,” said Mr. Langone, who was so enthusiastic he became an investor and recently joined the board of Relationship Science. “How many times do I say, ‘How do I get to this guy?’ It is scary how much it helps.”

Mr. Goldman’s version of networking isn’t for everyone. His company charges $3,000 a year for a person to have access to the site. (That might sound expensive, but by Wall Street standards, it’s not.)

Price aside, the possibility that this system could lead to a deal or to a new wealth management client means it just might pay for itself.

“If you get one extra deal, the price is irrelevant,” Mr. Goldman said.

Apparently, his sales pitch is working. Already, some big financial firms have signed up for the service, which is still in a test phase. Investment bankers, wealth managers, private equity and venture capital investors have been trying to arrange meetings to see it, egged on, no doubt, by many of Mr. Goldman’s well-heeled investors. Even some development offices of charities have taken an interest.

The system I had a peek at was still a bit buggy. In some cases, it was missing information; in other cases the information was outdated. In still other instances, the program missed connections. For example, it didn’t seem to notice that Lloyd C. Blankfein, the chief executive of Goldman Sachs, should obviously know a certain senior partner at Goldman.

But the promise is there, if the initial kinks are worked out. I discovered I had paths I never knew existed to certain people or companies. (Mr. Goldman should market his product to reporters, too.)

One of the most vexing and perhaps unusual choices Mr. Goldman seems to have made with Relationship Science is to omit what would be truly valuable information: phone numbers and e-mail addresses.

Mr. Goldman explained the decision. “This isn’t about spamming people.” He said supplying phone numbers wouldn’t offer any value because people don’t like being cold-called, which he said was the antithesis of the purpose of his database.

Ultimately, he said, as valuable as the technology can be in discovering the path to a relationship, an artful introduction is what really counts.

“We bring the science,” he said. “You bring the art.”

A version of this article appeared in print on 02/12/2013, on page B1 of the NewYork edition with the headline: A Database Of Names, And How They Connect.
Read More..

Gadgetwise Blog: Q.& A.: Checking a PC's Graphics Card

How can I tell how much memory I have for graphics and video on my Windows 7 PC?

You can check out the video card your computer uses by going to the Start menu to Control Panel, selecting Appearance and Personalization and clicking on “Adjust screen resolution.” If you want a quicker way to get the same Control Panel, just right-click on the Windows desktop and select Screen Resolution.

Once you land in the Screen Resolution box, click the link for Advanced Settings. When the Advanced Settings box appears, click the Adapter tab to see more information about your computer’s video card, including the make, model and the amount of available memory it has.

Some desktop computers — especially those designed for gaming and other video-intensive activities — may have a dedicated or “discrete” video card installed inside the machine. Laptops and more modest desktop machines tend to use integrated graphics processors built into the computer’s motherboard that typically share some of the overall system memory.

Upgrading a laptop’s graphics card is difficult (if not impossible) depending on the model and the motherboard, but many desktop computers can be upgraded. Microsoft has a guide to upgrading a graphics card in a Windows 7 computer that outlines the process.

Read More..