Tuesday, January 31, 2006

The Lifebox book

I had a good chapter today which he talked more about comming together the Solide state which is digital and the hot state which is random.. The combination of these two are what he calls the Gnarly combination the combination. We can control..
The intresting thing is that everything is compuatation to it.. Yes, there are computations all over the place.. I can put thing togetehr which I have an idea and read it and do it..
The process of working on a car is nothing more then finding the problem and fixing the problem and one step at a time.. Yes, this is great because you grow from learning what one things to the next this is all connected but it's a calculation... Everything is a calculation which our thoughta are also calculations which we take info and use it to the best of our knowledge.. So, we are always tring to figure how things works... Yes, I have a much better understanding today... The only issue doing it..
He talke about law which are digital steps but they are agrred upon, but when necessary we follow these rules... So, everthing is a calculation..

The last part of the book was about things that will be created.. I have also realize that the best way to write is to write in your own voice.. Yes, this really makes sense... I am understanding and growing today...

4-5:30 Google news and Internet..

5:30-6:30 Exercise..

6:30-9:00 Read books..

9:00-9:30 Review and write out what I read..

10-5 Work at the shop.

I have learned some more today which is the goal to all this. I understand things a little bit more, but I really want to have some more learning going on.

I have also learned that networking is my next big goal... I have to write out my ideas..

That is the goal to all of this..

I emailed Lily an email that talks about 1983 and the transistion in 1984... I am glad that I have grown and I am still growing today... I really need to change.. I really can't be doing this job for stanley which I need to finish this up soon... I have to review my machine books yes, that would be great idea...

Yes, the idea is to grow and understand industrail motors... I have a chance to do more.

I have learned more about machining which I learned to angle the ruler...Shit, I can't believe I forgot how to do that..

Lets learn and keep growing this is all I have today...

Sunday, January 29, 2006

I Emailed Lily today because, I don't want to lose her..

I did it. I emailed Lily again..

Yes, I didn't email her last week which I didn't have time, but again, I did call, but she didn't answer..
It's strang that she answers when I call from Jose's place, but she doesn't answer it when it comes from me.. The issue is that we are friends and that is all..

I noticed that she gained some weight, but is that really important ? No, not really..

Well, Having her friendship is all I ever wanted..

I love her, but as a brother loves sister... I wish, I could fall in love with her again, but I know it can't happen,but I can love her as a sister and that is what I feel for her...

Yes, I love her as a sister.... Love changes, but I have to not get caught in this shit called love...I don't want to break my heart again... yes, I have grown and I am much better today..


How can you forget your first love?

Well, I just knowing she is o.k. makes my day...

Saturday, January 28, 2006

The elevator dream which I morph into the new train and the doors open..

I had the strangest dream ever..

Well,I first thought I was in an elevator which there was a older guy on my left and a young kid on my right. Well, the doors closed then we were falling.... I held the kid to stop him from crying which he morphed into me.. I then saw the other guy panicing and yelling which he then morphed into me.. I then looked outside and realize I wasn't falling but travling horizontal and we were headed for L.A. I then realize that the kid and the old guy were me now because they morphed into me... yes, I have figured this out the whole day today... Then the doors open.. Now, here is the transition... the doors open and it's a whole new world which I can take or stay in.. I looked at the floor which was milky white and foamy but it was the floor... then, The doors were open waiting for me to make the next decison..

Yes, this means that I am ready to face the next adventure the next life... I have kingdoms to conquare and women to love... Yes, this really make sense n0w..

It's my time to risk..

Thursday, January 26, 2006

Good articles on attacks and Phone service skype not good...

Speakers at the debate noted that by embracing market principles, China and India have added hundreds of millions of inexpensive workers to the global labor market at precisely the moment when technology has rendered geographical location less important.

Laura Tyson, dean of the London Business School, warned of "downward pressure on real wages or employment (in the West) for a period to last up to 25 years."

Continued

1. 2. 3. NEXT»

Improvements in content and software systems of the main and wedding sites of Macy's and Bloomingdale's, as well as the Bloomingdale's catalog, will be in place beginning in 2007, the Cincinnati-based retailer said. The company said it would build a nearly 600,000 square-foot distribution center to handle orders in Portland, Tenn.

Oxford University launches assault on 'badware'

By Ellen Messmer, Network World

Harvard and Oxford University have launched a website that will act as an online hall of shame for those trafficking in spyware or questionable forms of adware.

StopBadware.org will single out individuals, vendors or businesses for propagating and promoting so-called "badware". Who gets the treatment will fall to a new "The Stop Badware Coalition".

NetBeans may be a hedge for ISVS against messy client choices

Posted by Dana Gardner @ 1:40 pm

I just had an intriguing analyst briefing with some NetBeans folks at Sun Microsystems, and I'm beginning to think the public discussion on the Eclipse-NetBeans thing (or is it mostly the SWT-Swing thing?) is missing the larger strategic perspective. From the vantage of an architect or CIO — and not necessarily strictly from the view of developers — there could be a lot more to NetBeans and its tools progeny, Creator and Studio, than meets the eye.

My new-found interest in NetBeans 5.0 comes as a result of the different fundamental directions that software development is now faced with. These are just the sorts of things that Oracle is thinking over as it decides what to so about NetBeans. Indeed, there are multiple imperatives that factor into how to best plan for future software development, and they are not well aligned. They are actually increasingly at odds. Smart ISVs will seek a way to mitigate risk, and avoid being led down a garden path to less than optimal addressable markets.

One imperative (let's call it the legacy client support one) suggests that planners should designate tools, frameworks, and platform targeting based on applications that must for a considerable period of time target and span multiple and divergent native client targets — from PDAs to cell phones to the usual gang of PC platforms, Windows, Mac, Unix, and Linux. The largest camp here is Windows-based clients, and there are a lot of them and they are not going away any time soon.

Another imperative (let's call it the client-agnostic one) suggests that planners should move beyond legacy clients and make their strategic development choices based on the primary concerns of server-side logic and frameworks as targets, of moving as quickly as possible to applications that reach the end users via server-managed clients, browsers/portals, and the rich mix from AJAX, REST, and the Web 2.0 stuff. There's a lot of momentum here, and enough client-side Java and browsers across the legacy clients to make this a compelling philosophy.

Anticipating these imperatives are the Eclipse ecology constituencies, which certainly seems to favor the move away from native client targets and the messy plug-ins process that entails toward applications of, by, and for the server. This direction was given a boost this week when IBM at Lotusphere announced that the latest multi-purpose clients, WorkPlace 2.6 and the forthcoming Hannover version of Notes, will not only both be server-managed clients but that the WorkPlace 2.6 client plus IBM's portal server will become the preferred GUI-tier for SOA and composite applications for all of IBM development. Java on the client is, of course, supported, but multi-purpose is the key. This is significant.

One can surmise that new levels of extended enterprise productivity and business process automation will become the strong breeze in the sails of the Eclipse community toward the tightening embrace of the client-agnostic imperative. The strategic development tools choices, then, should focus on how to organize, attach, and manage the services among and between the servers, not the clients.

Also anticipating these imperatives are Windows ecology constituencies, which certainly seem to favor the "connected computing" approach enabled by the Microsoft Visual Studio 2005/.NET/Vista/Indigo/Avalon assortment. Their direction seems to re-encourage a tightly coupled client (especially Office 11/12), and to a lesser extent support browsers and AJAX-like GUIs. The convulsion in terms of how to balance the fat client with the rich client for Microsoft was evident at last October's PDC, and the subsequent memos and reorganization announcements. It has not been settled yet, and the market will ultimately decide (this time).

And then there is NetBeans, which seems to have quite a bit to support both of the imperatives, and also has the lynchpinadvantage that it deeply supports Java at every twist and turn. And it turns out that Java has a strong and encompassing role to play for the legacy client support imperative. And Java has a strong and encompassing role to play in the client agnostic/server-supreme imperative. I'd say that Java has quite a bit more to offer the server development productivity side of the equation, but using Java as the means to target clients from Mars rovers to the latest JVMs on cellphones, PDAs, Windows, Mac, Unix, and Linux is a strong plus too.

I have not changed my take that Java is heading toward legacy status, and that the future is all about SOA. And that the Java community is putting their resources elsewhere. But Java has not yet played out its transformative role for software development and deployment, and that means its influence is still highly sign

Alarm growing over bot software

By Robert Lemos
Staff Writer, CNET News.com

Published: April 30, 2004, 9:16 AM PDT

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

While many network administrators worry about the next worm, security experts are warning that a quieter but equally damaging threat is slowly gaining control of large networks of computers.

Known as bot software, the remote attack tools can seek out and place themselves on vulnerable computers, then run silently in the background, letting an attacker send commands to the system while its owner works away, oblivious. The latest versions of the software created by the security underground let attackers control compromised computers through chat servers and peer-to-peer networks, command the software to attack other computers and steal information from infected systems.

News.context


What's new:
Internet security watchers warn that the most common kind of bot software has been upgraded. A new variant incorporates publicly available code for breaching security through a vulnerability on almost every Windows system sold in the past five years.

Bottom line:
Bot software has spread widely--just how quickly is difficult even for security experts to evaluate. Symantec puts the number of computers compromised in the hundreds of thousands. Other security experts have put the number in the millions. Moreover, with source code commonly available, bot software gets quickly updated to take advantage of the latest flaws.

For more info:
Track the players

"It has been one of the big underreported problems in security," said Johannes Ullrich, chief technology officer for the Internet Storm Center, a unit of the SANS Institute that tracks network threats.

On Thursday, Ullrich and other Internet security watchers warned that the most common kind of bot software, Agobot, had been upgraded. A new variant incorporates publicly available code for breaching a computer's security through a vulnerability in a security component installed on almost every Microsoft Windows system sold in the past five years. That component is called the Local Security Authority Subsystem Service, or LSASS.

The LSASS version of the Agobot software uses a particular application data channel, or port, to attack vulnerable systems. On Thursday, Ullrich said traffic on that port had jumped in the previous 24 hours.

Security company Symantec, which, like the Internet Storm Center, monitors sensors around the Internet, also warned Thursday that the LSASS version of Agobot--or Gaobot, in Symantec's parlance--is spreading.

"The worry here is: How many hosts are out there infected with these things?" said Alfred Huger, senior director of Symantec security response.

Bot stealthiness
Anxiety is understandable, given that Symantec and the Cooperative Association for Internet Data Analysis, or CAIDA--two groups thought to have some of the best data on Internet attacks--both undercounted the extent of the MSBlast infection by an order of magnitude.

The groups' researchers had estimated that the MSBlast worm and its variants compromised half a million systems at most. Yet last month, Microsoft revealed that its Windows Update system had patched and then cleaned 8 million systems infected with the virus. On Wednesday, the software giant changed that number to 9.5 million.

Symantec puts the number of computers compromised with bot software in the hundreds of thousands. Other security experts have put the number in the millions.


Get Up to Speed on...
Enterprise security
Get the latest headlines and
company-specific news in our
expanded GUTS section.






Bot software is much harder to detect than worm programs because it tends to be more stealthy. Worms, which spread automatically and randomly, create a lot of data traffic as they attempt to infect new hosts; such "noisy" activity puts the software in the spotlight for network monitoring devices. But bots are generally commanded to search smaller networks for new systems to infect, reducing the amount of bandwidth that compromised servers produce and making the programs less obvious.

Another concern, Huger said, is how versatile bot software has become.

It can, for instance, be teamed with worms and viruses to create especially daunting hybrids. Symantec's security response team believes that the Witty worm, which attacked computers running security software from Internet Security Systems, was launched by 4,200 "bots"--systems infected with bot software--connected together in a "bot net." Symantec found that the worm spread from those computers even though they weren't running the vulnerable ISS software. So bot software was likely the culprit, Huger said.

"The chances of (Witty) not being launched from a bot net are very thin," he said.

CAIDA also believes the Witty worm had been "pre-seeded," or given a set of known vulnerable systems to attack first in order to speed up the spread of the worm. According to CAIDA's analysis, however, the worm's initial spread involved about 110 to 160 systems--a small fraction of Symantec's estimate.

Spammers have also started using bot nets to send bulk e-mail solicitations to Net users while hiding the spammers' location. Several viruses, including Sobig and MyDoom, have infected computers with simple bots that aim to ease the spammer's job.

Threat seen as broadening
The versatility of bot software also lets online miscreants use bot nets to attack Web sites with massive data floods, or denial-of-service attacks. Some attackers have even used the computation power of the combined computers in a bot net to create their own distributed supercomputer for breaking encryption, especially on passwords, said David Dittrich, an information security researcher with the University of Washington's iSchool.

"It seems like a logical progression that people have added programmable mechanisms to the bots to add functionality," he said.

It's possible to add new features to the bot software because the creator of Agobot released the source code to the Internet. Agobot uses Internet relay chat as the communications channel to control infected machines. The program has spawned hundreds of variants, including Phatbot, which creates an encrypted peer-to-peer network to relay commands to the compromised systems.

The U.S. Computer Emergency Response Team warned of the Phatbot variant earlier this month, telling companies to watch out for the new attack software. The creation of the LSASS variant of Agobot may itself be a warning, because it likely indicates that a worm is around the corner, said the Internet Storm Center's Ullrich.

Code that takes advantage of software flaws tends to evolve from a simple program, or script, into a fully automated virus. Inclusion of such code in bot software is generally the last step before the code evolves into a virus or worm.

"The worm is the end of the life cycle, as far as exploits go," Ullrich said.

Such was the case with MSBlast; several variants of Agobot incorporated code to take advantage of a Windows vulnerability in the weeks before the MSBlast worm arrived and used the same flaw to spread.

This time around, however, the emergence of a worm may initially be hard to detect, because the LSASS variant of Agobot has spread so widely and is already creating a lot of noise, he said.

"It will be a bit hard to tell when it first arrives," Ullrich said, "because there is so much traffic out there."

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

Hacking for dollars

By Joris Evers
Staff Writer, CNET News.com

Published: July 6, 2005, 4:00 AM PDT

Last modified: July 6, 2005, 11:58 AM PDT

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

update Hackers have traded fame for financial gain, experts say.

In the past, lone hackers defaced Web sites or launched global worm attacks, mainly to gain notoriety among their peers.

Today, they use their skills for profit. They hunt for security flaws and find ways to exploit them, hijack computers and rent those out for use as spam relays, or participate in targeted attacks that steal sensitive information from individuals or spy on businesses.

News.context


What's new:
In the past, hackers wanted to gain notoriety by writing the biggest worm they could. These days, they're more likely to be motivated by money.

Bottom line:
Though the shift could lead to a drop-off in global worms, it still spells trouble. The targeted attacks crafted by businesslike hackers are likely to hit harder.

More stories on this topic

"In the last year, we have seen a dramatic shift to hacking for financial gain," said Oliver Friedrichs, a senior manager at Symantec Security Response. "The benefit of creating a widespread worm on the Internet has really been superseded by the potential of monetary gain."

Though the shift could mean the end of big worms like last year's Sasser, it still spells trouble. The targeted attacks crafted by businesslike hackers can hit individuals and organizations harder--and in the pocket, rather than just in the PC.

There is an underground market. A hacker who finds a way to exploit a security hole in Windows could earn up to $1,000, or much more if the hole is not yet known to Microsoft or anyone else, said Dmitri Alperovitch, a research engineer at security vendor CipherTrust.

That flaw could then be used to hijack PCs. These compromised systems, called zombies, can then be used to relay spam, to host malicious Web sites or to launch denial-of-service attacks--at a price. Spammers, phishers and others who want to rent out a network of about 5,500 zombies typically pay about $350 a week, according to security company Symantec.

These zombie networks, known as "botnets," are sometimes used to extort companies, who are threatened with a denial-of-service onslaught aimed at hurting their business. British online payment processing company Protx went offline after an attack and was warned that problems would continue unless a $10,000 payment was made, according to a recent report in The New York Times.

The FBI has also seen an increase in hacking for money. "We have seen a rise in the cases where the motivation appears not just to be for purposes of bragging in chat rooms, but to actually profit financially," said FBI spokesman Paul Bresson.

Underground markets for selling credit card numbers, software vulnerabilities or renting out botnets are also on the rise, he said. "We're seeing a lot more of that today then we ever have," Bresson said.

New breed
As the motive of those involved has changed, so has their profile, Symantec's Friedrichs said. "In the past, they were teenagers or others who did it to gain notoriety. Today's hackers are white-collar criminals and criminals in foreign countries," he said.

Among that group, though, are coders who realized that they could take the hobby they had for years and turn it into a profitable business, CipherTrust's Alperovitch said. "Unless they are really good at it, they probably won't become millionaires. But it is a good side business," he said.

v:shapes="_x0000_i1049">

The change has been accompanied by an increasing ingenuity in crafting attacks. Phishing scams, for example, are becoming aimed at smaller groups of victims. Also, companies are being targeted with Trojan horses meant to get access to corporate networks or to enable industrial espionage.

"The deception techniques are getting better, and the payload is also getting more sophisticated," said Dan Hubbard, a senior director at Websense, a San Diego, Calif.-based security vendor. "As more money gets made, the attacks get more sophisticated."

All this means that stakes are higher for individuals and for businesses whose systems suffer an attack. With a worm, they might have had to apply a patch or reinstall a PC. With financially motivated threats, victims could have sensitive corporate information or their identity stolen.

One fraud area seeing a rise in activity--and therefore, a likely lift in scam revenue--is phishing. These scams typically combine spam and fake Web pages that look like trusted sites to try to trick the victim into divulging sensitive information such as passwords or credit card numbers. The number of phishing e-mails tracked by IBM's Global Business Security Index reached an all-time high in May, the company said. It saw 9.14 million messages sent to its customers, up from a previous high of 7.7 million in January.

Credit card data sells for up to $100 per account, according to a report on the economy of phishing, released in June by San Francisco antispam provider Cloudmark. The price depends on how high the limit

Hacking for dollars

Published: July 6, 2005, 4:00 AM PDT

Last modified: July 6, 2005, 11:58 AM PDT

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

(continued from previous page)

is and how much supporting information is supplied, though--an account with little supporting information will go for much less. American Express cards fetch more, as those come without a preset spending limit, experts said.

Symantec has seen a clear change in the malicious code, such as Trojan horses, used in attacks. In the final six months of last year, 54 percent of the attack code was targeted at obtaining personal data. That is up from 36 percent in the same period in 2003.

"The motivation behind today's new e-mail-borne threats is far more sinister than traditional large-scale attacks."

--Mark Sunner, chief technology officer, MessageLabs

But as victims lose more money, consumers' defenses in general go up, Websense's Hubbard said. Many people now realize the importance of installing security software and patches, and technology to fight phishing, such as browser toolbars, is becoming increasingly popular. Also, Microsoft has said it will include phishing protection in Internet Explorer 7, a test version of which is due out this year.

MessageLabs, an e-mail security company, has also spotted the trend of targeted attacks--but this time, aimed at businesses. Last week, the company said it had stopped e-mail messages containing a malicious attachment that was sent to only 17 addresses at a global company. It appeared to be an attempt to gain access to the company's network.

"The motivation behind today's new e-mail-borne threats is far more sinister than traditional large-scale attacks," Mark Sunner, chief technology officer at MessageLabs, said.

Hackers are getting paid to create the malicious programs, which could then be used in industrial espionage or to collect sensitive company data.

In late May, Israeli police made 18 arrests in a case of industrial espionage using Trojan horses. The programs were designed to spy on computer systems and had been planted on the computers of some of the country's top companies.

Sneaky worms
The underground market means that programs that exploit security holes in software are worth too much these days to waste on an attention-grabbing worm. Such major outbreaks get detected soon, triggering mass patching by users and investigations by law enforcement agencies.

Instead, hackers are more likely to create a slow, stealthy attack that will get malicious software installed on many machines, said Steven Hofmeyr, the chief scientist at Sana Security.

In other news:

"There is no real incentive to write those kinds of mass worms other than the graffiti incentive," Hofmeyr said.

The lure of money likely is not solely responsible for the lull in large worm outbreaks, experts said. After a string of worms in 2003 and Sasser last year, many people realized the importance of security software and patching their systems.

Also, Microsoft, whose software is often the target of worms, has been working to improve its act. Windows XP Service Pack 2, a large security-focused update for the desktop operating system, was released last year. On the server, Windows Server 2003 is deemed more secure than its predecessors.

"The world has become much more aware of malicious activity," Debby Fry Wilson, a director at Microsoft's Security Response Center, said.

In the future, intrusion prevention products could play a part in protecting systems against targeted security threats. Some tools look at the behavior of software and block suspect activity. Other products look more closely at the data leaving a corporate network and can block the transmission of credit card data, for example.

Attacks have changed, not vanished. Security companies and Internet users face increasing challenges to fight the sophisticated threats that often fly under the radar. With money as a spur, hackers are motivated to keep creating new attacks--and to keep one step ahead of the competition.

"I call it the chess game, where the bad guys have the white pieces and always get to go first," Gartner analyst John Pescatore said.

Skype could provide botnet controls

By Joris Evers
Staff Writer, CNET News.com

Published: January 25, 2006, 5:41 PM PST

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

Internet phone services such as Skype and Vonage could provide a means for cybercriminals to send spam and launch attacks that cripple Web sites, experts have warned.

Moreover, because many voice over Internet protocol applications use proprietary technology and encrypted data traffic that can't easily be monitored, the attackers will be able to go undetected.

"VoIP applications could provide excellent cover for launching denial-of-service attacks," the Communications Research Network said Wednesday. The Communications Research Network is a group of industry experts, academics and policy makers funded by the Cambridge-MIT Institute, a joint venture between Cambridge University and the Massachusetts Institute of Technology.

The group urges VoIP providers to publish their routing specifications or switch to open standards. "These measures would...allow legitimate agencies to track criminal misuse of VoIP," Jon Crowcroft, a professor at Cambridge University in the U.K., said in a statement.

Essentially, some of the features to protect VoIP applications can now be used maliciously, Crowcroft said. "While these security measures are in many ways positive, they would add up to a serious headache if someone were to use a VoIP overlay as a control tool for attacks," he said.

In a denial-of-service attack, a flood of information requests is sent to a Web server, bringing the system to its knees and making it difficult or impossible to reach. Today, such attacks often involve many hacked computers, so-called "zombies," that have been networked in a so-called "botnet."

Cybercriminals rent out use of their botnets on the black market. About 60 percent of the world's spam is sent through such compromised computers, and the zombies are also used in extortion schemes where a Web site owner is told to pay or face a denial-of-service attack.

Botnets are typically controlled by an attacker via Internet Relay Chat. Zombies listen for instructions from their masters on IRC channels. Investigators monitor those channels to help catch cybercriminals, and Internet service providers can block traffic to the IRC servers used by zombies in order to thwart attacks, experts have said.

In other news:

VoIP applications such as eBay's Skype and Vonage could give cybercriminals a better way of controlling their zombies and covering their tracks, the Communications Research Network said. "If the control traffic were to be obfuscated, then catching those responsible for DoS attacks would become much more difficult, perhaps even impossible," the group said in a statement.

There has yet to be an instance of an online attack launched through a VoIP application, but the Communications Research Network believes it is only a matter of time. "If left unresolved, this loophole in VoIP security won't just decrease the likelihood of (attack) detection and prosecution, it could also undermine consumer confidence in VoIP," the group said.

Communications Research Network contacted VoIP providers with its concerns, it said. Skype and Vonage did not immediately respond to a request for comment.

Tell us what you think about this storyTalkBack E-mail this story to a friendE-mail View this story formatted for printingPrint

News

[Internet]

Tuesday 24th January 2006

UPDATED: IBM does IM with Yahoo!, AOL and Google 10:24AM

IBM has announced a series of deals with some of the world's major instant messaging suppliers to connect to its Lotus Sametime IM product. Big Blue has announced deals with Yahoo!, AOL to communicate with each other

IBM's deals with Yahoo! and AOL means that users of Lotus Sametime 7.5 can interact with Yahoo! Messenger, AOL's AIM and ICQ and the Apple iChat services. In addition to exchanging text instant messages, users will be able to see whether their friends and colleagues are online and manage their contact list.

The advantage for all these services is that IBM still controls the lion's share of corporate infrastructure with some 15 million Sametime users around the world. Although the perception of IM has changed over the years it is still regarded by many as a tool for casual chatting rather than a serious business tool. The deals with IBM give IM further credibility.

The interoperability



ADVERTISEMENT


will be based on the SIP / SIMPLE industry standard protocol, and will establish a server-to-server connection, requiring only one login ID. IBM says it is building a new SIP-based Real-Time Collaboration Gateway that is currently planned for release later this year.

In addition, IBM and Google say they intend to develop interoperability between the IBM Lotus Sametime enterprise IM and the Google Talk public IM network. Recently, Google announced that it planned to include SIP in a future release of Google Talk opening the possibility of another round of interoperability announcements in the future. The search engine IM client is already able to communicate with a number of smaller messaging products through the Jabber/XMPP interface

UPDATED:
It seems as though we might be at last coming to a time when all IM clients talk to each other. Although not involved in this latest round of love-ins, Microsoft announced an interoperability deal with Yahoo! last October. Perhaps it is not surprising that MSN Messenger is left out of the SameTime interoperability as Bill Gates was recently quoted as saying, 'IBM has always been our biggest competitor'.

IBM says Sametime 7.5 should be available sometime in the middle of this year.

Steve Malone

Read comments: 0

Add comments

Email a friend

Add to Scrapbook

Related News

Sponsored Links

Buy IBM - ShopGenie
Can't find the best IBM laptop deals? ShopGenie can help you find the best price & spec for your needs. Read performance reviews before you buy. All top name brands: Apple, Sony, Toshiba & more.

Buy IBM I at Shopping.com
Find, compare and buy products in categories ranging from PC laptops to digital cameras. Read product reviews and compare prices on over a million products.

IBM I At Dealtime.co.uk
Find, compare and buy products in categories ranging from PC laptops to digital cameras. Read product reviews and compare prices on over a million products.

IBM Global Services
IBM global services offer solutions for your business to help it compete in today's marketplace. From web hosting to consulting, we provide a fantastic service.

Find IBM Items on eBay.co.uk
Buy and sell computers and accessories on eBay.co.uk, the UK's online marketplace.

Back to top

Monday, January 23, 2006

Lily and Me so far....

I have come to know Lily again and she has become my friend again. This has been the greatest gift.
I have also learned to accept that she is kinda of heavy and the varcouse vains, but the issue is that something is going on with her and adam, but she really doesn't want to say what. What I heard from Adam was that he said, she is fat.. Well, the issue is that she is changing but I will always see her as lily.. I have to also accept that I wasn't the best looking guy at that time because of my acne..

Yes, if the chance came up to be with her for ever, I would take it..

I still love her today, I don't care what people would say, I would make it work..

Yes, I am still in love after all these years, but I have a love that is a love for sister.. That is the love I have for her.. Yes, that is all I can do..

The party on Saturday, I brought out alot of stuff which I am clear today. Yes, alot of stuff were handeled and fixed.. .Yes, I expressed myself and everything is out and clear..

I am free today, but what do I do now?

That is my problem what do I do with this new freedom.. All my issues are settled..

What do I do now?

That is the main issue today, what do I do with this freedom?

Lily's Birthday Party 1-21-2006

Lily's Birthday Party

Yes, this was really great, I have found some more freedom.

I arrived at 6pm which I was two hours late and then I had three fishes.
It was gret Lily was there and Adam was cooking the fish. Well, I requested three fishes and they were great.

Alex then offered me to drink. She made some wicked drink which I drank and Lily drank it at the same time. It was great we drank from the same juice... We were married just for one day. she gave me the day that I always wanted.. Yes, this was really great and I have everything fulfilled and done with..

I meet Lily's best friend who calls herself the columbian lady.. Well, she asked me do you love lily? I said, yes, but that was a diffrent time... Shen then said, that she loved me...
I think she had to much to drink or was she talking for lily.. Shit, has lily fallen for me now? No, I don't want that, what can I offer her? Shit, I am in trouble now, she is in love with me, but I knew this would happen... What can I do now?

The Columbian lady told me to stop doing this to my life... I really didn't understand her. Well, I really don't want to call lily, because I really dont need to. Yes, I love her, but she needs to email me first..

Yes, I will wait for her email. Yes, I know lily will ignore the question.

The issue is that she asked me a question if I loved Lily?
I said, Yes, but that was a diffrent time...

But, the issue was that she asked out in public..

Well, I didn't answer her. This should be told to Lily and not to her..

Then , Me and Lily and her Parents we stayed under the heater.. Yes, this was really nice because we talked as if we were a family. Man, well, I am her's and always will be her's..

Yes, but I don't want to care for her, because Adam has his family remember briana is what keeps him there and that is it..

I won..

Frank Martinez

Wednesday, January 18, 2006

Takafumi Horie Good article read it.

akafumi Horie Talkasia Transcript

Wednesday, November 23, 2005 Posted: 0847 GMT (1647 HKT)
if(cnnEnableCL) { var clStoryUrl = ( typeof cnnStoryUrl != "undefined" ? cnnStoryUrl : "" ); if (location.hostname.indexOf('cnn.com') < domid="storyCLLinkSpots&id=" origin="cnnsafe&site=" nkw="3'," category="cnnworld'" url="'" site="cnn_world_dyn_ctxt&maxCount=" domid="storyCLLinkSpots&id=" origin="cnnsafe&site=" nkw="3'," category="cnnworld'" url="'" site="cnn_world_dyn_ctxt&maxCount=">

Hello and welcome to Talk Asia, I'm Lorraine Hahn. My guest today is flamboyant entrepreneur and the founder of Japanese internet powerhouse Livedoor -- Takafumi Horie.

Born in 1972, Horie founded a small Internet startup called "Living on the Edge" when he was just 23.

He dropped out of Tokyo University to concentrate on his business, and in a few short years turned it into a multi-billion dollar enterprise, with a staff of nearly 2 thousand.

Renamed Live Door, the company's internet business now encompasses networking, consulting, e-commerce, e-finance and software development.

But Horie has been as much in the news for his personality as his business acumen.

Bold and brash, he has shaken up the Japanes establishment with attempts to gain control of FujiTV and buy troubled Osaka baseball team, the Kintetsu Buffaloes.

Failing in both bids, the undeterred Horie turned to politics and recently ran as an independent candidate in Japan's parliamentary elections.

Takafumi Horie -- Welcome to the Talk Asia! Thank you very much for spending time with us. Appreciate that. You have said you are not interested in politics, but you recently ran in the elections. Why?

TH - It's not that I'm not interested in politics, but rather, I think that the people who become politicians in Japan are not very dynamic. Honestly, I find business much more interesting than politics. But the political situation in Japan is critical at the moment. There just aren't enough politicians who have good qualifications. Normally I wouldn't want to get involved in politics, but I think we have a dangerous situation in Japan, and I felt I had to do something about it.

LH - What changes then do you think Japan needs?

TH - In particular, it needs financial reforms. We need monetary reforms to better regulate how money is spent and how it flows. Japan is a country that's good at trade and commerce. There are many people here who are very good at doing business, so that's where we should be channeling our energies. We should look to develop areas that have the potential for growth -- areas such as biotechnology, IT, life-science and financial services. I think these are very important areas for the future development of Japan's economy.

LH - And you think you can be the person that can bring these changes?

TH -- Yes I think so! That's why I ran in the election. Although I failed to be elected, we did see the public come out in support of reforms. In this election, the candidates who were seen as reformists, as candidates who can accelerate change in Japan, they were the ones who did well. In the Cabinet, the members who are in the position to promote financial and monetary reforms, such as Minister Heizo Takenaka, gained power.

LH - Some people called it a publicity stunt. Was it?

TH - No, as I said, the reason I entered the election race was to promote reforms. For us who engage in business, we will be severely affected if financial and structural reforms don't proceed.

Another reason I declared my candidacy was to create a situation where people go to vote because they have an interest in the election, not because they think it's a duty. If my running in the election creates an interest among the people, then they will feel more involved and understand that the election is an important event.

LH - How far in politics do you want to go? Do you want be prime minister one day?

TH - I do want to become Prime Minister! But it's all right if I'm not as long as a good, brilliant person gets the position.

LH - Some people say that you are into this shock therapy, you like to shock people out of their complacency. Is this something that you actually really do?

TH -- Maybe in some ways it's true. But it's not that I'm deliberately trying to shock people all the time. I'm just doing things that are obvious to me. It's because the public doesn't understand my way of thinking that they get surprised. Sometimes, I find it frustrating, but I suppose that can't be helped. The problem is with Japan's education system. Japanese children grow up with very narrow and inflexible education, compared with children in other countries. Fixing the way they think when they grow up is difficult. So when I say things that, to me, are obvious, others often find it shocking because they're not used to a different way of thinking. For example, Japanese people really like savings, and they value the system of "lifetime employment" and seniority. It's difficult to change that way of thinking.

LH - It seems so un-Japanese to think the way you do and to do the things you do, a very maverick sort of approach.

TH -- Well I don't really perceive myself as being typically Japanese. In a way, I feel I'm a Citizen of the World, a universal person. I look at things from a very neutral perspective and I'm able to look objectively at what people in Japan and elsewhere are thinking. Because I'm thinking in a broader way, I feel like I am able to make better decisions.

World history and geography are subjects that really fascinate me, I enjoy studying them. And the more I read up about the history of religions, cultures and so forth, the more I realize how little most people know, how limited their knowledge is about the world. And I think that's why there are many conflicts and problems in this world. They happen because people are trying to deal with things with limited, insufficient knowledge and that's not ideal.

LH - In terms of your bid for a controlling stake in Fuji television, what were you thinking? How could something like this benefit Livedoor, for example?

TH - Well, the Broadcasting Administration in Japan is extraordinary. The TV stations for terrestrial broadcasting have enormous amounts of power. In Tokyo, there are 6 stations -- 5 private ones and "NHK public broadcasting" -- and they have a monopoly. And because they have a monopoly, satellite broadcasting has been doomed to failure. Why has the era of "multi-channels via commercial satellite" NOT come to Japan like it has in countries such as the United States?

Japan probably has the highest viewing rate of terrestrial channels in the world. In the US, the big three networks are collapsing. In South Korea too, with the penetration of broadband, terrestrial TV stations are losing power. In fact, terrestrial TV stations around the world have ALL been losing power, except in Japan. So if we get the viewers of the terrestrial channels into the internet, access to our portal site will increase, and we can expect to see viewers shifting from TV to the internet. That's what I wanted to do.

LH - Were you surprised at how fast and how aggressive the industry was in closing ranks?

TH - No I wasn't really surprised. The terrestrial TV channels have a "vested interest," nursed by the old-style "administration of broadcasting" governed by the Ministry of Telecommunication. They have been enjoying benefits and see no need to change. At the end of the day, it's the consumers who are losing out. I don't know if they even realize it or not.

LH - Mr. Horie, we're going to take a very, very short break. When we come back, we'll ask Takafumi Horie about the power of the internet and what he thinks the next big boom will be. Stay with us.

BLOCK B:

LH - Welcome back to Talk Asia. My guest today is the founder of Livedoor, Takafumi Horie. Mr. Horie, you formed a website consulting company and design firm called Living on the Edge when you were only 23 years old. That's very, very young.... Where did the idea and where did the money come from?

TH -- I borrowed 6 million yen from an acquaintance to start the business. I first became aware of the internet 2 years before starting the business. I knew it would change the world.

LH - Now when the internet bubble happened a few years ago, didn't that scare you off the business?

TH - Because we paid attention to the internet early on, we were able to conduct our IPO before the Internet Bubble burst, and we managed to gain a huge capital from that. After the bubble burst, a lot of companies failed, and we were able to buy them cheap. I always had faith in the internet. I believed in it and thought it was obviously going to change the way the world worked. I really did not understand why others were selling their stock. As stock prices plunged, I just bought them, one after another, since I had the money. I guess I was rather lucky.

LH - What do you think will be the next big boom for the internet?

TH -- I think wireless broadband will be the next big wave.

LH - What is next for Livedoor and for you, personally?

TH - Next is working with a Russian company to host a space trip within 2 years. We're going on the orbit around the earth.

My other goal is to promote world peace. We have set up a fund for biological development, and have invested in a company called "Yugu-Rayna". It develops a "green bug" -- a single-celled algae, a micro-organism -- that produces nutrition with just carbon dioxide and water. It has all the vitamins, and human beings can survive by eating this. (pause)

There are two uses for it, I think. One is to help people in poor countries like Africa, where many don't have enough to eat. If we give them water and this single-celled algae, we can supply the nutrition. And by extension, we would be able to save some people from poverty and hunger.

The second use is to help the environment. This green bug has the ability to stabilize carbon dioxide 80 times better than a rice plant can. Therefore, it can help stop global warming. If you put a bio-plant in your factory, you can greatly decrease the amount of carbon dioxide output. We are also working on that project.

LH - When you said space, what did you mean? You mean actually going up into space?

TH - Well I DO want to go up into space, but more than that, I'm dissatisfied with the fact that humans have only gone to the moon. I want to go to Mars! I want to eventually go beyond the solar system! I want to make it happen for all the people who have come out saying things like that!

LH - Mr. Horie, we're going to take another very, very short break. When we come back, we'll be talking to Takafumi Horie about how a small town boy, made good. Stay with us.

BLOCK C:

LH - Welcome back to Talk Asia. My guest is Livedoor's Takafumi Horie. Mr. Horie, talk to me about growing up in Fukuoka. I mean, it must be so different from now, having... living in, in Tokyo.

TH - There was very little stimulation there. I was very bored! It was difficult to meet people, especially interesting people. I wanted to move to a place with a larger population, where there are a lot of smart people, interesting and eloquent people. So I came to Tokyo.

LH - Did you always want to be a rich and powerful business man?

TH - Oh I just always assumed that I would naturally become one!

LH- Wow, that is amazing. Now, you dropped out of school. I believe you wouldn't recommend that to most people, right?

TH - No, that's not entirely true. I got into Tokyo University, which was difficult to do. In Japan, university entrance exams are extremely hard, and just getting into the good schools is already a proof of one's abilities.

LH - So did you feel that you had to leave university? In order to, you know, become, let's say, who you are now, start a business?

TH -- I often wonder why I had to spend 18 to 20 years in the Japanese school system, which I found very boring. I could have started in business much earlier. Now, I'm having more fun.

LH - Y'know when... before I even met you, there was always this image, this media image, of you. Fast cars, fast women... Y'know... The t-shirt, the very casual look... Is that, is that, really you?

TH - That's the real me. I don't care much about appearances or image.

LH - So is that a symbol of a new Japan?

TH -- Am I a symbol? Hmm, I'm not sure! I just know that there are a lot of people out there who are younger than I am, and I wish to be a role model for them. If they have a dream, I want to help them keep that motivation high, so that they can realize their dream. I want to show people that they CAN have fun in life.

LH - Why do you think the establishment dislikes you so much? I mean, they've called you various names...

TH - That's just the jealousy of the men! That's it!

LH - I was just going to ask you. Is it jealousy, is it fear, and does it bother you?

TH -- Well I find it bothersome but it's kind of pitiful in a way. So I just try to ignore it.

LH - You have authored 5 books, best sellers. And in those books, you said money can buy anything. Do you really believe that?

TH -- You'll need to read all the books to fully understand what I was trying to say. What I meant was that the easiest way to achieve any goal is to make money first. When a person decides that he wants to do something, there are several ways he can go about it. He could spend a lot of time and effort, work hard, and he might achieve his goal. But -- IF you make money first, and use that money to help you get what you want, it will be easier. That is what I meant.

LH - So it's almost reality for you, then, that money can buy just about anything.

TH -- Recognizing that reality is what is important. People like me understand that it is true. But there are very naïve people out there who have never been told the truth about money, and I think they should be! Why does money not perish? Why is it used so widely? Because Money is human kind's greatest invention. Money doesn't discriminate. Money doesn't care whether a person is poor, whether a person comes from a good family, or what his skin color is. Anybody can make money. Conversely, human beings discriminate a lot. The human mind discriminates all the time. Money doesn't discriminate.

LH - So money can buy love? Yes?

TH - That's a difficult question to answer but I did address it in my book. The rate of unmarried Japanese people is rising. People in other countries, even if they are unmarried, have partners. Here in Japan, there are many guys who are like the character in that recent show "Train Man", who have never talked to girls. As I mentioned in my book, before you can fall in love and have a loving relationship, you need to meet someone. You need to be able to say "I love you" to someone. And what makes you to be able to say "I love you" is confidence. And the easiest way to gain confidence is to have money. That's something that anyone can do, earn some money. Then you can think, I can do it! And you gain confidence.

LH - You own a racehorse. (Horie: yeah) Is that fun for you? Is that a part of a hobby or...?

TH - It used to be a hobby. I like gambling and betting on horse races. But these days I find managing corporate business more interesting, 100 times more interesting.

LH - So what do you do to relax? Do you find time to rest and sleep and... ?

TH - The three desires of human beings are eating, sex, and sleeping. Humans never get tired of those three things. Even though you sleep everyday, you don't grow tired of sleeping. Even though you eat everyday, you don't grow tired of eating. I just love things that you can't grow tired of.

LH - Many people respect you for what you have achieved in your life. What advice would you give to the youth of today?

TH - Probably the most important thing I would advise is to take action. Don't be passive! Don't drag your feet! Transfer the things you are thinking about in your head into real action! You may be thinking a lot in your head, but remember, nothing moves forward with just thoughts. When you think of something, instantly move and act on it. You might fail, but that's ok! It's really ok!

LH - Take a chance, yes?

TH - Yeah.