Consumer database of several major North American stores hacked
">

Consumer database of several major North American stores hacked

Friday, January 19, 2007

TJX Companies, a U.S. chain, that owns big box stores Winners, a fashion outlet, and HomeSense, a home accessories store, has revealed they had their computers hacked back in mid-December.

It also affected the U.S. and Puerto Rico stores Marshalls, T.J. Maxx, HomeGoods and A.J. Wright, which are also owned by TJX Companies. The intrusion could also affect stores in the United Kingdom and Ireland.

They discovered the hacking in mid-December and revealed the information to the public on Wednesday.

“The company is committed to providing its customers with more information when it becomes available,” TJX Companies said in a statement.

The computers contain credit card, debit card, check, and merchandise return transactions information. The hacker could have accessed transactions during 2003 and from May through December 2006.

Jefferies analyst Timothy Allen said the chain should use this as an opportunity for excellent customer service. He added that they should offer coupons to customers to get them back to shopping in stores owned by TJX.

Customers with questions can call one of the help lines at 866-484-6978 in the United States, 866-903-1408 in Canada, and 0800-77-90-15 for the United Kingdom and Ireland.

Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin
">

Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin

Tuesday, October 2, 2007

Ray Scott is running for the Family Coalition Party in the Ontario provincial election, in the Algoma-Manitoulin riding. Wikinews’ Nick Moreau interviewed him regarding his values, his experience, and his campaign.

Stay tuned for further interviews; every candidate from every party is eligible, and will be contacted. Expect interviews from Liberals, Progressive Conservatives, New Democratic Party members, Ontario Greens, as well as members from the Family Coalition, Freedom, Communist, Libertarian, and Confederation of Regions parties, as well as independents.

NASA plans for future moon missions
">

NASA plans for future moon missions

Monday, September 19, 2005

NASA has announced plans for sending humans back to the Moon, as a first step to Mars.

A 2018 lunar mission is proposed, where a crew of four would remain on the Moon for as long as a week. A minimum of two lunar missions a year is planned, with astronauts remaining as long as six months.

Some of the technology had previously been proposed for replacement of the Space Shuttle.

  • Astronauts will be launched in a capsule, similar in concept to that used for the Project Apollo but three times larger. The top part of an Exploration Transportation System (ETS), the Crew Exploration Vehicle (CEV) will be a capsule attached to a service module which contains supplies, power, and propulsion units. The CEV is designed for use in Earth orbit.
  • On lunar missions, crew or cargo versions of a Lunar Surface Access Module (LSAM) would be used with a CEV. The LSAM will have design concepts related to the Apollo Lunar Module, with a four-legged landing unit carrying an ascent stage.
  • An Earth Departure Stage (EDS), a powerful propulsion unit, will be used to move CEV and LSAM units out of Earth orbit, such as on lunar missions.
  • Heavy Launcher unmanned cargo rockets will be used for heavy loads of equipment.
  • The launch rockets, Shuttle Derived Launch Vehicles, will use engines developed for the Shuttle program.
    • CEV will be launched atop a Crew Launch Vehicle (CLV), a single solid fuel booster with a second stage using a shuttle main engine. The CLV can carry a payload of 25 metric tons into low Earth orbit.
    • The heavy-lift system uses a pair of longer solid rocket boosters and five shuttle main engines to put up to 125 metric tons in orbit — about one and a half times the weight of a shuttle orbiter.
  • The use of a Launch Escape System (LES) will improve safety. A LES is a top-mounted rocket that can quickly remove the crew capsule away from an exploding or otherwise dangerous rocket.

For a lunar mission, the LSAM and EDS would be placed in orbit by a cargo launcher, then a CEV would dock with the assembly before leaving Earth orbit.

The goal is to begin production of the new spacecraft by 2011.

  • Robotic missions will be sent, probably the first one in 2008.
  • Past experience with lunar dust is being used in designing equipment and spacesuits which may encounter it.
  • Surface mobility with open and pressurized rovers for use in such missions is also being developed.
  • The CEV can be reused up to ten times.
  • Crew capsule, upon return to Earth, will set down on dry land. It can also land on water.
  • The CEV and lunar lander ascent stage use methane as fuel, as methane may be available on Mars.
  • Eventually the designs could be expanded to support six astronauts for a trip to Mars.

The plans are a means to implement President Bush’s “Vision for Space Exploration” program. Goals include:

  • Implement a sustained and affordable human and robotic program to explore the solar system and beyond;
  • Extend human presence across the solar system, starting with a human return to the Moon by the year 2020, in preparation for human exploration of Mars and other destinations;
  • Develop the innovative technologies, knowledge, and infrastructures both to explore and to support decisions about the destinations for human exploration; and
  • Promote international and commercial participation in exploration to further U.S. scientific, security, and economic interests.

Types Of Security Guard Insurance Coverage

By Bob Fischer

Security guard insurance is vital in today’s business environment. It protects both security guard agencies and the companies they safeguard. There are various policy endorsements available to security guard companies and adding some or all of the following available options can provide the full protection needed in this high risk industry.

Assault & Battery

Security guard insurance can include clauses to cover guards in the event they are accused of assault and battery while in the course of their duties. Assault and battery is a crime whereby a person makes physical contact with another while also threatening that person in some way. For security guards this could be a person alleging the use of unreasonable, physical force.

Broad Form Property Damage

Broad form property damage is the general commercial liability portion of security guard insurance. It is the principal form of insurance coverage and provides extended protection over basic potential causes of loss or property damage to a client’s property or even the inability for client to use that property.

[youtube]http://www.youtube.com/watch?v=d4TqNI9rU_s[/youtube]

Error & Omissions (Professional Liability)

Error & omissions insurance is also known as professional liability insurance, and it is an important coverage option for security guard insurance. It protects the company against claims of financial loss due to failure or negligence while delivering professional security guard services. In particular, this security guard insurance feature protects the business with regard to legal defense fees and any settlement expenses incurred.

Personal Injury

Security guard insurance should also include protection for personal injury risks including libel, slander and false arrest. Some policies now specifically exclude false arrest claims. Personal injury endorsements will indemnify the security company from accusations of false arrest or detention by a hired guard as well as libel or slander claims.

Incidental Medical Malpractice

Many general liability policies cover bodily injury; however, they do not include incidental medical malpractice. In a situation where a security guard offers first aid while on duty, this coverage will protect against a claimant alleging medical malpractice against the guard and his employer.

Invasion of Privacy

Invasion of privacy risk coverage supplies security guard companies with peace of mind from being sued for misusing surveillance methods or systems. Some causes of action have been brought against guards and security guard company employers using CCTV camera footage for voyeurism or discrimination so having this protection is necessary.

Malicious Prosecution

Malicious prosecution is a civil or criminal proceeding action that is brought against an individual or company without probable cause and for reasons other than bringing that person or business to justice. Security guard insurance coverage for this risk will protect guard companies from being sued wrongly and guard against frivolous claims.

From making sure the companies they guard are protected and secure to providing guards with training and equipment that makes their job easier, security guard firms have many areas of concern while running their businesses. Having security guard insurance is vital to protecting the company and employees from lawsuits and liabilities in the workplace today. Knowing which options to choose when obtaining insurance for security companies can give security companies needed protection from risk as well as peace of mind.

About the Author: Bob Fischer is a contributor for various international publications. He also covers various topics, including security guard insurance. This article discusses how insurance for security companies is essential in today’s business world.

Source: isnare.com

Permanent Link: isnare.com/?aid=839204&ca=Finances

US stock markets reach 12-year lows
">

US stock markets reach 12-year lows

Thursday, March 5, 2009

US stock markets dropped to twelve-year lows on Thursday, amidst falling confidence in the financial sector and worries over whether the US automobile manufacturer General Motors will be able to keep operating.

The Dow Jones Industrial Average dropped by 4.08%, or 280.52 points, at the closing bell, reaching a level of 6595.32, a new 12-year low. The Nasdaq Composite lost 54.15 points, or 4%, to 1299.59, while the Standard & Poor’s 500 plunged by 30.27 points, or 4.25%, closing at 682.60.

Every stock in the Dow Jones, other than Wal-Mart, either lost ground or remained even, and all stocks in the S&P 500 index lost ground.

General Motors’ shares lost 15.5% after the auto firm announced that its auditors had “substantial doubt” over whether it would be able to keep operating.

Shares of financial companies were lower by nine percent, with Bank of America losing 11.7% and Citigroup falling by 9.7%.

“What’s most worrisome is that we haven’t hit the crescendo yet,” said Bill Groeneveld, the head trader for vFinance Investments. “Asset-management divisions are getting calls to just liquidate everything, and we haven’t seen the big players come back in at all.”

“This is one of the worst bear markets in the last 100 years; it started out with the credit crisis and the subprime [loans], but it is like a forest fire that has raced across the clearing and ignited other parts: Autos, auto parts, the insurance companies have been hit very hard. The credit crisis is causing an unraveling of industry after industry because the banks don’t lend,” said David Dreman, the chief investment officer of Dreman Value Management.

European markets were also lower today, with the London’s FTSE index losing 3.2% and the DAX index of Germany falling by five percent.

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
">

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
((WN)) Does this make you more, or less, determined to see the IMMI succeed?

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

OpenSync Interview – syncing on the free desktop
">

OpenSync Interview – syncing on the free desktop

Friday, May 19, 2006

This interview intends to provide some insight into OpenSync, an upcoming free unified data synchronization solution for free software desktops such as KDE, commonly used as part of the GNU/Linux operating system.

Hi Cornelius, Armin and Tobias. As you are now getting close to version 1.0 of OpenSync, which is expected to become the new synchronisation framework for KDE and other free desktops, we are quite interested in the merits it can provide for KDE users and for developers, as well as for the Open Source Community as a whole. So there’s one key-question before I move deeper into the details of OpenSync:

What does OpenSync accomplish, that no one did before?

Cornelius:

First of all it does its job of synchronizing data like addressbooks and calendars between desktop applications and mobile devices like PDAs and cell phones.
But the new thing about OpenSync is that it isn’t tied to a particular device or a specific platform. It provides an extensible and modular framework that is easy to adopt for application developers and people implementing support for syncing with mobile devices.
OpenSync is also independent of the desktop platform. It will be the common syncing backend for at least KDE and GNOME and other projects are likely to join. That means that the free desktop will have one common syncing solution. This is something really new.

How do the end-users profit from using synching solutions that interface with OpenSync as framework?

Cornelius:

First, the users will be able to actually synchronize all their data. By using one common framework there won’t be any “missing links”, where one application can sync one set of devices and another application a different one. With OpenSync all applications can sync all devices.
Second, the users will get a consistent and common user interface for syncing across all applications and devices. This will be much simpler to use than the current incoherent collection of syncing programs you need if you have more than the very basic needs.

How does OpenSync help developers with coding?

Cornelius:

It’s a very flexible and well-designed framework that makes it quite easy for developers to add support for new devices and new types of data. It’s also very easy to add support for OpenSync to applications.
The big achievement of OpenSync is that it hides all the gory details of syncing from the developers who work on applications and device support. That makes it possible for the developers to concentrate on their area of expertise without having to care what’s going on behind the scenes.
I have written quite a lot of synchronization code in the past. Trust me, it’s much better, if someone just takes care of it for you, and that’s what OpenSync does.

Tobias:

Another point to mention is the python wrapper for opensync, so you are not bound to C or C++, but can develop plugins in a high level scripting language.

Why should producers of portable devices get involved with your team?

Cornelius:

OpenSync will be the one common syncing solution for the free desktop. That means there is a single point of contact for device manufacturers who want to add support for their devices. That’s much more feasible than addressing all the different applications and solutions we had before. With OpenSync it hopefully will become interesting for manufacturers to officially support Linux for their devices.

Do you also plan to support applications of OpenSync in proprietary systems like OSX and Windows?

Cornelius:

OpenSync is designed to be cross-platform, so it is able to run on other systems like Windows. How well this works is always a question of people actually using and developing for this system. As far as I know there isn’t a real Windows community around OpenSync yet. But the technical foundation is there, so if there is somebody interested in working on a unified syncing solution on Windows, everybody is welcome to join the project.

What does your synchronisation framework do for KDE and for KitchenSync in particular?

Cornelius:

OpenSync replaces the KDE-specific synchronization frameworks we had before. Even in KDE we had several separate syncing implementations and with OpenSync we can get replace them with a common framework. We had a more generic syncing solution in KDE under development. This was quite similar from a design point of view to OpenSync, but it never got to the level of maturity we would have needed, because of lack of resources. As OpenSync fills this gap we are happy to be able to remove our old code and now concentrate on our core business.

What was your personal reason for getting involved with OpenSync?

Cornelius:

I wrote a lot of synchronization code in the past, which mainly came from the time where I was maintaining KOrganizer and working on KAddressBook. But this always was driven by necessity and not passion. I wanted to have all my calendar and contact data in one place, but my main objective was to work on the applications and user interfaces handling the data and not on the underlying code synchronizing the data.
So when the OpenSync project was created I was very interested. At GUADEC in Stuttgart I met with Armin, the maintainer of OpenSync, and we talked about integrating OpenSync with KDE. Everything seemed to fit together quite well, so at Linuxtag the same year we had another meeting with some more KDE people. In the end we agreed to go with OpenSync and a couple of weeks later we met again in Nuernberg for three days of hacking and created the KDE frontend for OpenSync. In retrospect it was a very pleasant and straightforward process to get where we are now.

Armin:

My reason to get involved (or better to start) OpenSync was my involvement with its predecessor Multisync. I am working as a system administrator for a small consulting company and so I saw some problems when trying to find a synchronization solution for Linux.
At that point I joined the Multisync project to implement some plugins that I thought would be nice to have. After some time I became the maintainer of the project. But I was unhappy with some technical aspects of the project, especially the tight coupling between the syncing logic and the GUI, its dependencies on GNOME libraries and its lack of flexibility.

Tobias:

Well, I have been a KDE PIM developer for several years now, so there was no way around getting in touch with synchronization and KitchenSync. Although I liked the idea of KitchenSync, I hated the code and the user interface […]. So when we discussed to switch to OpenSync and reimplementing the user interface, I volunteered immediately.

Can you tell us a bit about your further plans and ideas?

Cornelius:

The next thing will be the 1.0 release of OpenSync. We will release KitchenSync as frontend in parallel.

Armin:

There are of course a lot of things on my todo and my wishlist for opensync. For the near future the most important step is the 1.0 release, of course, where we still have some missing features in OpenSync as well as in the plugins.
One thing I would really like to see is a thunderbird plugin for OpenSync. I use thunderbird personally and would really like to keep my contacts up to date with my cellular, but I was not yet able to find the time to implement it.

Tobias:

One thing that would really rock in future versions of OpenSync is an automatic hardware detection mechanism, so when you plugin your Palm or switch on your bluetooth device, OpenSync will create a synchronization group automatically and ask the user to start syncing. To bring OpenSync to the level of _The Syncing Solution [tm]_ we must reduce the necessary configuration to a minimum.

What was the most dire problem you had to face when creating OpenSync and how did you face it?

Cornelius:

Fortunately the problems which I personally would consider to be dire are solved by the implementation of OpenSync which is well hidden from the outside world and [they are] an area I didn’t work on 😉

Armin:

I guess that I am the right person to answer this question then 🙂
The most complicated part of OpenSync is definitely the format conversion, which is responsible for converting the format of one device to the format that another device understands.
There are a lot of subsystems in this format conversion that make it so complex, like conversion path searching, comparing items, detection of mime types and last but not least the conversion itself. So this was a hard piece of work.

What was the greatest moment for you?

Cornelius:

I think the greatest moment was when, after three days of concentrated hacking, we had a first working version of the KDE frontend for OpenSync. This was at meeting at the SUSE offices in Nuernberg and we were able to successfully do a small presentation and demo to a group of interested SUSE people.

Armin:

I don’t remember a distinct “greatest moment”. But what is a really great feeling is to see that a project catches on, that other people get involved, use the code you have written and improve it in ways that you haven’t thought of initially.

Tobias:

Hmm, also hacking on OpenSync/KitcheSync is much fun in general, the greatest moment was when the new KitchenSync frontend synced two directories via OpenSync the first time. But it was also cool when we managed to get the IrMC plugin working again after porting it to OpenSync.

As we now know the worst problem you faced and your greatest moment, the only one missing is: What was your weirdest experience while working on OpenSync?

Cornelius:

Not directly related to OpenSync, but pretty weird was meeting a co-worker at the Amsterdam airport when returning from the last OpenSync meeting. I don’t know how high the chance is to meet somebody you know on a big random airport not related at all to the places where you or the other person live, but it was quite surprising.

Tobias:

Since my favorite language is C++, I was always confused how people can use plain C for such a project, half the time your are busy with writing code for allocating/freeing memory areas. Nevertheless Armin did a great job and he is always a help for solving strange C problems 🙂

Now I’d like to move on to some more specific questions about current and planned abilities of OpenSync. As first, I’ve got a personal one:

I have an old iPod sitting around here. Can I or will I be able to use a program utilizing OpenSync to synchronize my calendars, contacts and music to it?

Cornelius:

I’m not aware of any iPod support for OpenSync up to now, but if it doesn’t exist yet, why not write it? OpenSync makes this easy. This is a chance for everybody with the personal desire to sync one device or another to get involved.

Armin:

I dont think that there is iPod support yet for OpenSync. But it would definitely be possible to use OpenSync for this task. So if someone would like to implement an iPod plugin, I would be glad to help 🙂

Which other devices do you already support?

Cornelius:

At this time, OpenSync supports Palms, SyncML and IrMC capable devices.

Which programs already implement OpenSync and where can we check back to find new additions?

Cornelius:

On the application side there is support for Evolution [GNOME] and Kontact with KitchenSync [KDE] on the frontend side and the backend side and some more. I expect that further applications will adopt OpenSync once the 1.0 version is released.

Armin:

Besides kitchensync there already are a command line tool and a port of the multisync GUI. Aside from the GUIs, I would really like to see OpenSync being used in other applications as well. One possibility for example would to be integrate OpenSync into Evolution to give users the possibility to synchronize their devices directly from this application. News can generally be found on the OpenSync web site www.opensync.org.

It is time to give the developers something to devour, too. I’ll keep this as a short twice-fold technical dive before coming to the takeoff question, even though I’m sure there’s information for a double-volume book on technical subleties.

As first dive: How did you integrate OpenSync in KitchenSync, viewed from the coding side?

Cornelius:

OpenSync provides a C interface. We wrapped this with a small C++ library and put KitchenSync on top. Due to the object oriented nature of the OpenSync interfaces this was quite easy.
Recently I also started to write a D-Bus frontend for OpenSync. This also is a nice way to integrate OpenSync which provides a wide variety of options regarding programming languages and system configurations.

And for the second, deeper dive:

Can you give us a quick outline of those inner workings of OpenSync, from the developers view, which make OpenSync especially viable for application in several different desktop environments?

Cornelius:

That’s really a question for Armin. For those who are interested I would recommend to have a look at the OpenSync website. There is a nice white paper about the internal structure and functionality of OpenSync.

Armin:

OpenSync consists of several parts:
First there is the plugin API which defines what functions a plugin has to implement so that OpenSync can dlopen() it. There are 2 types of plugins:
A sync plugin which can synchronize a certain device or application and which provides functions for the initialization, handling the connection to a device and reading and writing items. Then there is a format plugin which defines a format and how to convert, compare and detect it.
The next part is a set of helper functions which are provided to ease to programming of synchronization plugins. These helper functions include things like handling plugin config files, HashTables which can be used to detect changes in sets of items, functions to detect when a resync of devices is necessary etc.
The syncing logic itself resides in the sync engine, which is a separate part. The sync engine is responsible for deciding when to call the connect function of a plugin, when to read or write from it. The engine also takes care of invoking the format conversion functions so that each plugin gets the items in its required format.
If you want more information and details about the inner workings of OpenSync, you should really visit the opensync.org website or ask its developers.

To add some more spice for those of our readers, whose interest you just managed to spawn (or to skyrocket), please tell us where they can get more information on the OpenSync Framework, how they can best meet and help you and how they can help improving sync-support for KDE by helping OpenSync.

Cornelius:

Again, the OpenSync web site is the right source for information. Regarding the KDE side, the kde-pim@kde.org mailing list is probably the right address. At the moment the most important help would be everything which gets the OpenSync 1.0 release done.
[And even though] I already said it, it can’t be repeated too often: OpenSync will be the one unified syncing solution for the free desktop. Cross-device, cross-platform, cross-desktop.
It’s the first time I feel well when thinking about syncing 😉.

Armin:

Regarding OpenSync, the best places to ask would be the opensync mailing lists at sourceforge or the #opensync irc channel on the freenode.net servers.
There are always a lot of things where we could need a helping hand and where we would be really glad to get some help. So everyone who is interested in OpenSync is welcome to join.

Many thanks for your time!

Cornelius:

Thanks for doing the interview. It’s always fun to talk about OpenSync, because it’s really the right thing.

Armin:

Thank you for taking your time and doing this interview. I really appreciate your help!

Tobias:

Thanks for your work. Publication and marketing is something that is really missing in the open source community. We have nice software but nobody knows 😉

Further Information on OpenSync can be found on the OpenSync Website: www.opensync.org


This Interview was done by Arne Babenhauserheide in April 2006 via e-mail and KOffice on behalf of himself, the OpenSource Community, SpreadKDE.org and the Dot (dot.kde.org).It was first published on the Dot and is licensed under the cc-attribution-sharealike-license.A pdf-version with pictures can be found at opensync-interview.pdf (OpenDocument version: opensync-interview.odt)

This article features first-hand journalism by Wikinews members. See the collaboration page for more details.
This article features first-hand journalism by Wikinews members. See the collaboration page for more details.

Oracle to acquire Siebel for USD 5.85bn
">

Oracle to acquire Siebel for USD 5.85bn

Tuesday, September 13, 2005

US-based Oracle Corporation announced earlier today that they are buying rival US-based Siebel Systems for $10.66 USD per share. Siebel shareholders have the option to receive the $10.66 per share in cash or in Oracle stock. This deal is valued at approximately $5.85 billion USD. Siebel Systems’ Board of Directors has already voted in favour of the acquisition. Founder Thomas Siebel has also given his support. A special meeting will soon be held for Siebel stockholders to vote on the acquisition. If all goes well the deal should close in the early part of next year.

After acquiring Siebel; Oracle, which specializes in database applications, will become the second largest software company. Oracle has offices in more than 145 countries, and employs over 50,000 people. This acquisition will make Oracle the largest customer relationship management (CRM) applications company in the world. CRM applications include accounting, inventory management and customer management software. “Siebel’s 4,000 applications customers and 3,400,000 CRM users strengthen our number one position in applications in North America and move us closer to the number one position in applications globally”, said Oracle CEO Larry Ellison.

“Today is a great day for Siebel Systems’ customers, partners, shareholders, and employees,” said Thomas M. Siebel, Chairman and Founder of Siebel Systems. Many analysts predicted the acquisition of Siebel after Oracle bought competitor PeopleSoft for $10 billion USD, last December.

Rower Tuijn halfway across Pacific in record attempt
">

Rower Tuijn halfway across Pacific in record attempt

Monday, July 9, 2007

Dutch adventurer Ralph Tuijn has reached the halfway point of his attempt to be the first person to row across the Pacific Ocean unaided.

The 16,000 kilometre journey from the coast of Peru to the seaside city of Brisbane, Australia, the widest section of the Pacific, has never been crossed absolutely unaided by a rower, and Tuijn says just nine people have rowed it even with assistance.

Tuijn reached the central point of his crossing, an insignificant point of water in the ocean, 111 days after setting off from Peru in March. He has been making good progress, and has since cut his estimated time of arrival in Brisbane by a month.

The Dutchman, who now expects to reach his destination on October 20, has kept in touch with those tracking his movements through daily internet postings from his laptop computer, including his wife Winnie. His boat, the Zeeman Challenger, is a seven-metre custom plywood vessel.

Tuijn has overcome a variety of obstacles to reach the halfway point. He is suffering from the constant attention of sharks, who often bump his boat and disrupt his attempts at sleep. One particular shark, dubbed ‘Gomulka’ by Tuijn, has been trailing the adventurer’s boat for extended periods.

He has also accidentally burnt himself when he spilled hot water on his foot whilst trying to make coffee, apparently also from a shark ‘bump’. He is also forced to manually pump water for cooking and drinking after his automatic water pump broke down not long into his journey.

“Physically everything feels great and I can’t help feeling that I could do this for 500 days, but mentally it’s still hard to be on your own for such a long time”

His vessel has no motors or sails, but relies on his physical rowing power to move. The boat does have a solar power system to provide energy for his laptop, a telephone and a global positioning system.

Tujin, who is raising money for a children’s home in Mumbai, India, is rowing at an average speed of 58 kilometres each day. His diet consists of freeze-dried foods and fish, which are keeping him physically well-conditioned despite tiring mentally.

Tuijn is a serial adventurer and experienced rower. He has rowed across the Atlantic Ocean and the North Sea, as well as cycled across Russia and the icy terrain of Greenland.

Canada’s Don Valley East (Ward 33) city council candidates speak
">

Canada’s Don Valley East (Ward 33) city council candidates speak

This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.

Saturday, November 4, 2006

On November 13, Torontonians will be heading to the polls to vote for their ward’s councillor and for mayor. Among Toronto’s ridings is Don Valley East (Ward 33). One candidates responded to Wikinews’ requests for an interview. This ward’s candidates include Zane Caplan, Shelley Carroll (incumbent), Jim Conlon, Sarah Tsang-Fahey, and Anderson Tung.

For more information on the election, read Toronto municipal election, 2006.

« Previous Entries Next Entries »