Smart Office

Online Shopping Risky This Season

Online shopping is convenient, but risky, and the Government has issued a warning to consumers on the perils of online shopping this Christmas season.

Minister for Home Affairs And Justice, Brendan O’Connor, and the Minister for Broadband, Communications and the Digital Economy, Senator Stephen Conroy warned Australians to take some simple precautions while shopping in cyberspace and protect their personal information over the net.

Its cybersecurity website provides information for Australian internet users on what they need to do to protect personal information online.

O’Connor said:  “There are precautions that consumers can take to reduce the risk of credit card fraud, such as using anti-virus software and checking credit card statements regularly.”

Simple steps to protect your computer, yourself and your family online this festive season include:
– Shopping at secure websites by researching the merchant before placing an order and saving all transaction details.
– Be wary of seasonal e-cards or emails from suspicious senders, including those described as ‘friend’, misspelled words, or strange and vague subject lines.
– Never click on links in emails from people you don’t know, even from what may appear to be trusted sources. Banks will never ask for personal details such as PINS or passwords by email
– Don’t share your full name, date of birth, address or phone number with people or sites that you don’t know or trust.
– Install security software and update it regularly. Turn on automatic updates so that all your software receives the latest fixes.
– Get a stronger password and change it at least twice a year.
– Keep an eye on what your children are doing online and encourage them to report anything suspicious.

You can also find more information on cybersecurity at www.staysmartonline.gov.au. A booklet entitled “Protecting Yourself Online – What Everyone Needs to Know” is also available from [email protected]

Qantas Trials Next Generation Check In System In Perth

Qantas is trialling its Next Generation Check-in system at its domestic terminal at Perth Airport, with around 100,000 Qantas Frequent Flyers invited to take part.

Qantas Chief Executive Officer, Alan Joyce, said Next Generation Check-in would dramatically reduce check-in times, and eliminate queues for customers, allowing them to move quickly through the check-in area.
 “The majority of these customers will have received their new Qantas Frequent Flyer Card embedded with “intelligent Q” chip technology.
“With one touch of their Frequent Flyer Card on our new Q Card Readers, passengers will now be checked in within seconds. The new card will also act as a permanent boarding pass,” said Mr Joyce.
The check in facility includes a priority security lane with new walkthrough equipment to the screening area. New self check-in kiosks and automatic bag drop facilities will also benefit passengers with service agents able to circulate throughout the terminal to assist customers.
 “Perth is a very important market for Qantas and the recent $75 million upgrade of our domestic terminal made it the perfect choice to launch this trial phase of the project,” said Mr Joyce.
Throughout the Perth trial, construction and training will continue in Sydney, which will be ready to launch Next Generation Check-in later in 2010, followed by Melbourne, Brisbane, Adelaide and Canberra in 2011. The program is scheduled for completion in the second half of 2011.

PND Market On The Skids As In-Car Telematics Strengthens

A downward spiral has been forecast in personal navigation devices with the market set to halve while mobile navigation and telematics looks forward to a bright future.

A study by ABI Research says PNDs face a grim future resulting from over-inflated shipments which have created a false impression of market strength, and a slowdown in innovation.

However mobile navigation and telematics is going from strength to strength, with ABI forecasting more than 500 million downloads in 2016.

Senior Analyst Patick Connolly has called for a removal of cost barriers to customers, and to open up the OS to encourage app developers.

He said PND OEMs face tough decisions on whether to milk the PND cash cow for as long as possible or try and create a sustainable market, with secondary revenue sources such as data analytics, applications, traffic and advertising.

Many PND manufacurers have consolidated or exited the market, while others are developing new products in growing markets. These include in-car, recreational and fitness, tablets and mobile applications.

Connolly observes: “The connected PND market is forecast to represent almost 40% of all shipments by 2016. Yet, there is not enough time to allow this market to evolve organically, while ‘nickel and diming’ customers with high subscription fees.

“The existing business model must be overhauled, removing cost barriers for customers, boosting hardware platforms and opening up the OS to encourage application developers. Such measures might just accelerate uptake enough to save the overall market.”

Senior practice director Dominique Bonte adds:”Adopting this new approach will not only help to sustain the market, but will also open … areas that remain under the radar but are set to generate an increasingly large proportion of overall revenue.”

 

Internet First: Wedding Streamed Live On YouTube

Two billion people across the globe are expected to watch the wedding of Prince William and Kate Middleton via an official royal channel streamed live on the internet on YouTube.


Click to enlarge

It’s the first time a British royal wedding is to be covered on the internet, with the streaming event also accompanied by a live multi-media blog assembled by royal officials.

Google, which owns YouTube, said it was ‘thrilled” to host the coverage.

The four hour feed will be taken from broadcaster, BBC, without its commentary, with official royal staff providing live commentary and historic information, interesting links, photographs and video footage as well as a Twitter feed, said the palace in a statement.

The feed will include William and Kate’s journey to and from Westminster Abbey; the service; the appearance of the couple on the balcony of Buckingham Palace; and a military flypast.

It would be the “most digital and interactive coverage of a royal wedding to date”, the palace said.

Previously accused of being ‘out of touch’ with modern Britain, the House of Windsor is embracing the internet and social media applications in an unprecedented manner.

 

Fans will be able to extend their own video of congratulations to the couple on an official video “Wedding Book” on YouTube, and photographs of the wedding will be released via Flikr.

Other announcements on the day will also be published on the official wedding site www.officialroyalwedding2011.org.

 Live Tweets from an @ClarenceHouse account will be integrated into the blog, and anyone wanting to send messages of congratulations on Twitter can use the hashtag #rw2011.

A social networking site Facebook (www.facebook.com/TheBritishMonarchy) has also been set up.

St James’s Palace said in a statement: “Facebook users can click the ‘I’m attending’ button on ‘The Royal Wedding’ event to show their interest in the event.”

The April 29 event will be streamed live on www.youtube.com/theroyalchannel at 7pm AEST.

Is Kinect Paving The Way for Biometrics?

It may yet prove to be a sign of things to come.

Socially acceptable and fun activities are paving the way for a sinister move by companies into the world of facial recognition and biometrics, which may yet become the norm in more widespread activities such as access control and security in general.

The Xbox 360’s Kinect, the peripheral used in Microsoft’s gaming console, uses facial recognition and infrared sensors, as the log in process for players engaging in its games, greeting returning gamers by name after recognising their faces when they step in front of the video console.

The technology used includes a visible light camera, an infrared-based depth sensor, and microwaves, as it tracks movements of those playing the game, translating their real-life motions onto on-screen movements.

The games are hugely popular with families.

Earlier this month, Kinect Sports won a BAFTA (British Academy of Film and Television Award) for the best family game, but its appeal is far wider than just sports fanatics with three other games, Dance Central, Kinect Adventures and Kinectimals also being nominated in the family category.

Kinect is also the world’s fastest selling consumer electronic device, breaking the Guinness World Records after consumers snapped up 10 million devices in the first two months of going on sale in November 2010.

But Kinect is not just a game play device. With its camera and infrared sensor, which maps players’ bodies and faces using facial recognition technology, it has branched into the world of biometrics, allowing gamers to sign in without using an ID and password, but automatically, by being able to differentiate their facial features from other game players.

 

However, its accuracy was brought into question within days of the device going on sale. US Watchdog Consumer Reports, which tested the Kinect soon after its release said lighting was seen to affect the gaming device’s facial recognition system from working properly when Gaming review site Gamespot complained that two of its dark skinned employees had problems logging in to the game.

Despite log in problems, however, Microsoft’s move into biometric identification is both novel and sinister. Anonymity has long been a key feature of video gaming with gamers happy to engage in combat as long as their identity was fake. But observers claim that people aren’t likely to rebel against the technology, as long as the stakes remain low.

Computer gaming, for instance, is not a high stake activity like banking, for instance. But what happens when gaming starts converging with other things like social networking, which could well lead it to filter into financial areas, such as shopping and banking?

Observers have noted that introducing the technology in such a low stakes environment such as gaming, where the younger generation, in particular, are repeatedly exposed to the technology, may de-sensitize them to later uses.

And face recognition technology is finding its way into a number of other ‘acceptable’ social uses.

In the US, a face-matching dating website is using the technology to help people find their partners.

FindYourFaceMate.com’s Christina Bloom said who we date depends a lot on how much they look like us.

Bloom claims that couples often have very similar facial features and that facial similarities seem to help with the initial attraction.

 

The face-matching dating website helps people narrow down their prospects by zeroing in on nine features, like your eyes, ears, nose, chin, or mouth, all helping to build an increasingly detailed picture of the person being profiled.

Experts claim that when audiences are able to interact with biometrics at a socially acceptable level, the technology is able to gain traction within other uses, and could pave the way for more widespread use in the home, such as to control home security, access control and even in identification.

Mistrust of the technology has been one reason why biometrics has so far failed to take off in more serious applications such as banking, but more acceptable functions, such as identifying members of the household to control other entertainment systems, and home automation controls for temperature, light and heating, for instance, could take off, simply for their novelty.

Facial recognition apps are also on the rise. Face.com, a global leader in face recognition technology on the web, recently announced an upgrade in its technology which will allow it to process increased numbers of photos in a second.

It’s a technology that is used in Facebook’s Phototagger and PhotoFinder, and is used by the social networking site to authenticate its members when they lose or forget their passwords, by putting up pictures of the member’s friends’ faces and suggesting likely names which the user must name correctly in order to gain access to their web page.

According to the company, Face.com has been found to be effective even in challenging conditions such as lighting, background, picture angle, and even focus of the pictures.

And now Chinese technology companies like Hanvon are making it even easier for companies and home businesses to use face recognition with low cost devices used to monitor staff or admit entry.

Hanvon’s Face ID uses infra red technology to scan a 3D image of a person’s face. These images are stored on the device’s internal chip, so it doesn’t have to be connected to an external server.

It can recognise up to 1400 faces and costs around US $720. Hanvon is now selling the device in 55 countries.

Tablets: What Do You Use Yours For?

With the mass market appeal of Tablets at an all time high, and given that Apple sold 7.3 million devices in the last quarter of 2010 for a total of 14.7 million since the iPad’s launch last year, (hardly surprising given that Apple had no real competition apart from Samsung’s Galaxy Tab which arrived late in the year) it’s clear that the Tablet is the must-have gadget for 2011.

But what do Tablet owners use the popular device for, and what are its likely future uses?

As part of my own research, I asked the question on my Facebook status, and found that ‘work emails’, ‘showing taxi drivers where to go on the Map’, ‘using the GPS locator’, ‘reading books’ and ‘anything else that would mean taking the lap top out of the bag’ were the most pressing needs addressed by the popular device.

But while the Tablet has clearly found its way into both the living room and on the go, consumers are going to demand better end-user experiences, and more than just convenience from their portable devices.

Post CES, and the imminent launch of the 10.1 inch Motorola Xoom, RIM’s 7 inch BlackBerry PlayBook, the 10.1 inch Asus EeePad Slider which has the added benefit of a slide-out keypad, two HP Web OS slates, not to mention Apple’s iPad 2, there’s going to be a lot of choice.

According to new research published by In-Stat, the top three ranked uses for future tablet owners will be email, personal information management, and multimedia consumption (audio, video and gaming).

“Last year’s small crop of Tablets was being touted as potential e-readers; a way to compete against the extremely popular Amazon Kindle lineup,” says Stephanie Ethier, Senior Analyst at In-Stat. 

“But this next generation of Tablets is clearly being marketed as consumer multimedia consumption devices positioned to compete squarely against the Apple iPad.”

 

Earlier this week, IDC published its report on the shipment of Media Tablets worldwide showing the market grew 45.1 percent in the third quarter of 2010, and Apple’s iPad dominating with 90 percent of units shipped.

It identified Media Tablets as form factor devices with colour displays larger than 5 inches and smaller than 14 inches running lightweight operating systems (such as Apple’s iOS and Google’s Android OS) and can be based on either x86 or ARM processors, which include the iPad and Galaxy Tab.

IDC also forecast strong demand for e-readers, which are single-purpose focussed devices. In the e-reader market, IDC identified Amazon as the market leader, with more than 1.1 million units shipped and 41.5 Percent share worldwide, with Pandigital, Barnes and Noble (exclusive to the US market), Sony and Hanvon following.

IDC believes both tablets and e-readers will continue to flourish throughout 2011.

Among its research on use of Tablets, In-Stat said nearly 55 percent of survey respondents who own Tablets spent 9 hours or more using their Tablet each weak.

Despite the plethora of new Tablets being launched this year, however, more than 40 percent of future Tablet purchasers planned to buy an Apple iPad.


 

Qantas Expands Fleet For Regional Services

Qantas and Bombardier Aerospace, headquartered in Canada, have sealed a deal for the purchase of seven new Q400 NextGen aircraft to be delivered from 2011.

The new aircraft will be operated by Qantas’ regional airline subsidiary, QantasLink, which operates more than 2000 flights each week to 54 destinationa across Australia. 
The contract, which is valued at approximately US$218 million, will see the Q400 NextGen aircraft equipped with upgraded cabin interiors and larger overhead compartments.
Qantas Chief Executive Officer, Alan Joyce, said: “The aircraft really suits QantasLink’s operations and is extremely popular with the airline’s customers. We have therefore made the decision to acquire another seven aircraft for delivery from the
first half of 2011.”
Joyce said the airline had invested over A$600 million in 21 Bombardier Q400 aircraft over the last four years, representing a significant commitment to the Group’s regional operations and increased capacity on existing routes. As part of its commitment to investigate further network growth, QantasLink recently began international aircraft Q400 aircraft services between Cairns and Papua New Guinea.
 
Gary R Scott, President of Bombardier Commercial Aircraft, said: “Bombardier Q400 and Q400 NextGen airliners are replacing or complementing jet services, replacing smaller and older turboprops, and reaching out to new markets while providing a superb passenger experience and cost-competitive advantage to operators.” 
Launched in March 2008, the Q400 NextGen turboprop airliner is the most recent development in the evolution of the Q400 aircraft, and the advanced successor to the Dash 8/Q-Series family of aircraft. It provides an ideal balance of passenger comfort and operating economics with a reduced environmental footprint.
Bombardier has also delivered 300 out of a total of 385 Q400 and Q400 NextGen aircraft as part of an additional order from Qantas. 

Qantas To Resume A380 Flights To US

Following the grounding of the A380 fleet and suspension of all Qantas A380 flights between Los Angeles and Australia, the Airline has announced it will resume services this weekend.

The service will resume with the QF93 from Melbourne to Los Angeles on 16 January.

Qantas suspended the flights last November, after problems surfaced with the A380 aircraft in Singapore. The safety measure was implemented to enable the company to monitor performance of the Rolls-Royce Trent 900 engine used by the A380s.

A statement released by the company said that after extensive engineering analysis and close consultation with Rolls-Royce, Airbus and the European and Australian regulators, Qantas, Rolls-Royce and the Civil Aviation Safety Authority are now satisfied that it is appropriate for Qantas to resume A380 flying on the Los Angeles-Australia routes.

Qantas Chief Executive Officer, Alan Joyce, said: “As always, safety has been our first priority in assessing when and where to bring A380s back into service over the past month. Only when we, our manufacturers and our regulators were completely satisfied that it was safe to begin flying the aircraft again did we resume A380 services, initially on London routes only.

“We are now confident that we can begin flying the A380 to and from Los Angeles without any conditions on the use of maximum engine thrust.

“In the meantime, our A380 engine inspection process continues as we gradually restore the aircraft to our international network. We are operating a full international and domestic schedule, using our entire range of aircraft.”

For the remainder of January, Qantas will operate 14 A380 services per week between split between Melbourne and Sydney to routes including Singapore, London and Los Angeles routes. The company said A380 frequencies on London and Los Angeles routes will be steadily increased from next month, as aircraft return to service and new deliveries join the fleet.

LinkedIn Joins Forces With Nielsen Market Intelligence Service

With Australians leading the world in terms of engagement with social networking sites, LinkedIn has added a powerful new tool for advertisers and media buyers to measure their effectiveness by joining Nielsen’s tag based digital audience measurement service, Market Intelligence.

The move will enable it to be benchmarked against other Australian websites, by providing information on the number of daily unique browsers, page impressions, geographic location of users and daily reporting on duplication of LinkedIn with other web sites. The company’s first reported numbers for 1 December this year notched up 137,223 daily unique browsers and 1,372,917 page impressions.

Stuart Bartram, Sales Director at LinkedIn, said: “Our decision to join Nielsen’s Market Intelligence service and tag our site is in direct response to feedback from our advertiser clients that they want in-depth insights on our audience make-up to assist with their advertising decisions.”

LinkedIn site metrics will also be included in Nielsen’s soon-to-be-launched hybrid service, which combines tagging and panel based measurement approaches.

Matt Bruce, Managing Director of Nielson’s online business in Australia, confirmed there had been strong demand from the market for greater audience measurement insights into the LinkedIn site. “With more than a third of Australians aged 18 to 35 having registered on LinkedIn, and a membership community including highly educated executives earning above average incomes, LinkedIn is likely to generate a lot of interest from advertisers.”

A social media business benchmarking study conducted by Nielsen and Community Engine in 2010 found 71 percent of businesses intend to participate in social media marketing this year, and around a quarter of companies (23 percent) which had engaged with social media sites, reporting a strong or reasonable return on investment.

Social Networking A Gateway For Criminals, Says Expert

LinkedIn, Facebook, Twitter and social networking in general are proving to be a gateway for criminals trawling the internet for information that can be exploited to do harm to both businesses and consumers, according to security analysts.

Lloyd Borett, security expert at AVG (AU/NZ), which specialises in security software solutions, says: “Online social networks have sprung up for business, hobbies, schools and religious groups. Used properly, they are a unique communications tool to keep in touch with friends and colleagues. But like any online tools, social networking sites can be abused by hackers and cyber criminals.”
While social networking has been argued to provide tangible benefits for business, a survey by Manpower claimed only 20 per cent of companies worldwide have a social networking policy in place. 
Leading research and advisory company, Gartner, predicts that social networking will overtake email by 2014, and according to a new survey by Regus, 40 per cent of businesses have used social networking successfully for business development. 
Meanwhile, in the first six months of this year, LinkedIn‘s members grew by 40 per cent to 70 million, and Twitter grew to 190 million users. Around 250 million people log into Facebook everyday. 
Borrett warns that both casual and business users should be careful about what they post online, so as not to provide ‘gateway data’ to criminals.  He advises companies to get acquainted with the privacy settings and tools on the social networks that are used. “The bottom line is – all employees should be aware of which social sites they are allowed to use during working hours,” he said.
 

The term “gateway data’ was coined by Herbert ‘Hugh’ Thompson, a professor in the Computer Science department at Columbia University in New York, to refer to the confidential information harvested from social networking sites.

“Criminals have got to be able to leverage the information that people are sharing to do harm at some point,” he said. The gateway data identified by Thompson can be used in a variety of ways. 
For example, discovering someone’s mother’s maiden name from Facebook could, in turn, be used to answer a password prompt question on an email account. Even if that account is a personal account, the user will have been compromised and the hacker is one step closer to all the business information they want.
Hackers look for lots of fragments of data to reveal a larger piece of confidential information. So the separation between personal and business data is not as distinct as people think. In fact there could be no boundaries between them at all, says Borett.
Borrett also warns about the popularity of shortened URLs on sites such as Twitter. “The problem with shortened links is that they usually don’t bear any resemblance to the original URLs, which means that users don’t know what they’re clicking. People click with the intention of going to a specific site, but the link can be easily hacked to send them to a site containing Trojans, spyware, rootkits and other malware instead.” 
 

The danger of an unguarded approach to social networking is not just about risks to physical property on a personal or corporate level. Identity theft is also a serious concern. The Australian Government web site Stay Smart Online contains useful advice on using social networking sites safely at www.staysmartonline.gov.au.

The shift in attitudes about personal information sharing among its user base caused Facebook to change its privacy rules in late 2009 with some of its 350 million worldwide users concerned that the company was out of step with identity theft and online security.
Industry opinion suggests that while businesses have adopted Facebook (and perhaps even more prevalently LinkedIn and Twitter) as a networking tool, the privacy improvements that the social networking giant brought to bear were not commensurate to the risks that now exist at a corporate networking level. 
A central part of how social networking sites engage their audience, is getting users to post more personal content. This builds up profile and identity. “Within the business environment this identity becomes intellectual property – and this needs to be locked down,” says Borett.
Some advice on how to manage information briefs include restricting information detailing which companies you are meeting to avoid highlighting your business partners and prospects to competitors, not revealing your product innovations prior to their official launch so not to weaken their impact, and not pumping out details of which companies you can’t stand dealing with, or whose products you hate, which might just be one step away from a defamatory court case.