Image via CrunchBase
Good-bye and good luck, Steve. Steve Jobs resigned this week as Apple’s President and is looking to move to Chairman of their Board.
It would be difficult to overstate the significance of Steve Jobs to Apple, and harder still to overstate Apple’s influence on the tech sector. Jobs was the towering figure behind a towering company.
So says Steve Wozniak, the man who founded Apple with Jobs. Wozniak waxed poetic about Jobs in an interview with Bloomberg. He spoke at length about Jobs’ leadership, the culture he created at Apple and the future of the company.
“He’s always going to be remembered, at least for the next hundred years, as the greatest technology business leader of our time,” Woz said of Jobs.
Steve Jobs named Tim Cook
as his successor, and he has already has stepped up. Cook said working with Jobs and Apple has been “the privilege of a lifetime” and he’s looking forward to the years ahead.
There are many books written about Job’s
rise, fall and ultimate ascension to build the most innovative computer company in modern times. Good luck Steve. Thanks for giving us such as great industry leader.
Cover via Amazon
Deals from the likes of Groupon, Yuupon and even Amazon itself have become daily-deal specialists. Amazon has just announced a daily Kindle book at a specially-discounted price each day as a part of the new Kindle Daily Deal.
Bookmark amazon.com/kindledailydeal and check back daily to see what’s next. Deals go live at approximately 12:00 A.M. Pacific time and run for 24 hours. Don’t want to miss a deal? The Kindle Daily Deal will be posted daily on Twitter, and frequently on Facebook and the Kindle Daily Post.
China has had a busy few months of announcements. It’s military build-up grew by more than 13% year-over-year and its technology and posturing has been a major threat to its neighbors.
Some of its latest innovations:
- China unveiled its first stealth jet
- Reached the early operating phase of a “carrier-killer” missile, the first-ever capable of targeting our carriers under way from a long distance
- Sea-tested its first-ever aircraft carrier capable of delivering their new missiles
“There’s nothing particularly magical about any one particular item,” Deputy Assistant Secretary of Defense for Asia Michael Schiffer told reporters in a Wednesday briefing.
China’s initial military intent seems to be regional. ”China has made less progress on capabilities that extend global reach or power projection,” the report, released Wednesday, reads. “Outside of peacetime counter-piracy missions, for example, China’s Navy has little operational experience beyond regional waters.”
“Although this alone is a serious concern,” the report says, “the accesses and skills required for these intrusions are similar to those necessary to conduct computer network attacks.” It carefully parses Chinese official writings to highlight a growing importance of cyber — far more than the 2010 version did.
“It’s no secret that cyber is a realm where deeper engagement between the United States and China — so that we can work on common rules of the road and a common way forward — is necessary,” Schiffer said.
Image by José Goulão via Flickr
This time every year, the world’s largest hacker convention convenes in Las Vegas. Hundreds of network security professionals, both “White Hat” and “Black Hat“, discuss security vulnerabilities which can be used to take over everything from cell phones through Defense Department computers.
This isn’t the type of conference you attend with cell phone, tablet and Internet-connected laptop. It’s the type of conference where you turn off every electronic device you have and leave them at home. Hacking has been the name of the game for almost 20 years at Def Con.
The scariest hacks out of Def Con?
- Siemens S7 hacks. NSS researcher Dillon Beresford demonstrated how to hack a Siemens S7 computer, gain read-and-write access to the memory, steal data, run commands, and shut the computers off.
The scariest part? These are the computers that are used to run big business, utilities and government systems.
- Botnets of computers which are used to steal information, now can be controlled by almost untraceable telephone calls. Researchers Itzik Kotler and Iftach Ian Amit demonstrated a VOIP-based control infrastructure with text-to-speech feedback.
- Broadband-over-power technology monitoring allows criminals to break into homes, businesses and control power and other infrastructure.
- A spy drone made from off-the-shelf electronics was demonstrated at both Black Hat and Defcon by its creators, Richard Perkins and Mike Tassey.
- Hijack cars via their cell phone interfaces. Remember that OnStar in your car and the new cell-phone controlled cars? The one which the Secret Service removes from all cars it’s protecting? A demo at Black Hat hacked a Subaru Outback car alarm, unlocked the doors, and started the vehicle, all using text messages sent over phone links to wireless devices in the vehicle.
- It’s possible to acquire a person’s Social Security number using nothing more than a photo publicly available in online social-network databases, face-recognition software, and an algorithm for deducing the numbers.
Is this the new electronic future we’ve all been waiting for?
Jobs aren’t quite what they were – even in the tech industry where the unemployment rate for technology jobs was 3.3% in June, compared with a 9.2% unemployment rate overall that month, according to the Bureau of Labor Statistics. In the most recent edition of its Occupational Outlook Handbook, the BLS said it expects IT employment to grow “much faster than the average” of all occupations through 2018.
So, along comes Google who’s trying to buy Motorola‘s Mobility division for $6 billion (actually paying some $12.5 billion). The big reason? To purchase their portfolio of communications-related patents to protect itself from the onslaught of inevitable patent battles which are likely to come from Apple and others.
(I wrote a detailed article about the Patent Wars last week.)
$6 billion isn’t a reasonable representation as to what it’s going to cost the economy. These patent portfolios are busy stiffling innovation throughout the country and around the world. It’s just too easy for big companies to establish patents that step all over small businesses attempting to make their mark through innovation.
We’ve got to change the US Patent system to eliminate software patents. They aren’t helping spur innovation, they are truly destroying it.
Image via CrunchBase
Google‘s $12.5 Billion acquisition of Motorola Mobility gives it the opportunity to truly own two markets that it’s been pursuing heavily, Cell Phones and set-top Boxes.
After the failure of its Nexus phones to build a real market, Google will be able to build on one of the best cell phone hardware platforms on the market. And they already run Android. Of course, other cell phone hardware manufacturers might not be so willing to use Android as a platform with Google competing against them on the hardware side. It could push HTC and others away from Android and onto another platform.
The set-top boxes are going to allow Google further inroads into the television business. Ultimately, this gives them unprecedented strength in content-to-TV delivery, email and even web browsing. Think Microsoft’s WebTV which can actually work.
Although the deal still has to be approved, the Patents that will be acquired could make Google an impossible-to-beat handset manufacturer. Good for them, bad for everybody else.