Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home IT Management
    • IT Management

    Stupid Technology Tricks of 2006

    Written by

    eWEEK Labs
    Published December 10, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Patent Madness

      As we bid 2006 goodbye, I’m wishing we could also wave away at least some of the software patent absurdity that filled the year. From the NTP vs. Research In Motion wars that raged in January to the patent FUD-mongering surrounding Microsoft’s and Novell’s late-year collaboration agreement-and all of the billable hours in between-2006 was probably a bonanza for intellectual property attorneys. Not coincidentally, it was also a year in which nearly everyone in IT burned way too much time dealing with the effects of the U.S. Patent Offices too-hazy understanding of the word obvious.

      Here’s hoping 2007 is brighter-the Supreme Court has been hearing arguments in the patent case of KSR International v. Teleflex, which might result in a saner definition of what’s too obvious to patent.

      -Jason Brooks

      New Virus Vectors: Part I

      Back when software was delivered via 5.25-inch and 3.5-inch floppy disks, the fulfillment house producing the disks would occasionally introduce a virus.

      The software vendor would then unknowingly ship virus-laden disks to thousands of customers. Now, it’s MP3 players that are the vector of opportunity for viruses and spyware when vendors outsource production to manufacturing partners.

      This scenario originated in the fall of 2005, when Creative Labs shipped 3,700 Zen MP3 players carrying the Wullik-B virus. This year, consumer heavyweights McDonald’s and Apple Computer followed suit: As part of a prize promotion, McDonald’s Japan distributed self-branded MP3 players with a surprise-the QQpass spyware Trojan. Apple’s gaffe involved video iPods that carried the RavMonE.exe virus.

      -Michael Caton

      New Virus Vectors: Part II

      I called out Google last year after it was forced to put the brakes on its Google Web Accelerator application following a slew of privacy and security concerns.

      The search giant didn’t learn its lesson.

      Google came under fire-and rightfully so-in 2006 after it distributed e-mails containing the Kama Sutra worm to users of the Google Video Blog group. Apparently, three posts were made that contained the W32/Kapser.A@mm mass mailing virus-a worm that began circulating on the Internet in early 2006. More than 50,000 members received e-mail containing the worm from Google.

      Luckily, the Kama Sutra worm requires user interaction to do significant damage and is easily removed by anti-virus software. And since the incident, Google has adopted new procedures to prevent a similar incident from happening. The search giant also apologized in a written statement.

      I hope Google means it this time because I don’t want to write about it in this space again next year.

      -Anne Chen

      Out, Damn Spot

      Hewlett-Packard’s wireless “Memory Spot” data chip, disclosed in July, squeezes a remarkable number of mistakes into a space about the size of a grain of rice. This little device-integrating a capacitor array, modem, loop antenna, microprocessor and memory subsystem into a single component-is a dandy science project, but it demonstrates practices that an enterprise IT architecture should have long since left behind.

      The Memory Spot represents the minimal case of the data silo. Every device holds its own distinct collection of data, and the wireless link requires a probe to be within about a millimeter of the integral antenna. You won’t be able to take an album of photos and catalog them quickly, and you won’t be able to take a drawer of medical files, each with a Memory Spot on its cover, and swiftly identify patterns of drug interaction or post-operative infection.

      Enterprises should look at their operations to see how many places data is being captured-creating opportunities for error or loss or inconsistency-and try to shrink that number rather than merely shrinking the hardware.

      -Peter Coffee

      He Said, CentOS Said

      In March, the City of Tuttle, Okla., got its 15 minutes of fame when City Manager Jerry Taylor discovered a mysterious new Web page where the city home page should have been. Thinking a default Apache boilerplate screen was actually a sign of malfeasance, Taylor sprang into action. Armed with some bad information from his hosting provider, Taylor initiated a fiery exchange with folks supporting the open-source CentOS Linux distribution, accusing them of hijacking Tuttle’s Web site.

      Rather than listening to reasonable explanations from CentOS lead developer Johnny Hughes that CentOS was nothing more than an operating system and that the Web server was misconfigured, Taylor instead boasted of his tech cred and threatened to call the FBI. After much back and forth, Hughes posted the entire e-mail exchange on the CentOS Web site.

      Taylor quickly came under fire from open-source aficionados and, in Taylor’s words, “freaks out there that don’t have anything better to do.” Since few things are more entertaining to rubberneckers than a self-righteous individual being very wrong in an (albeit unexpectedly) public forum, Taylor was resolutely lambasted in Web forums as well as via his personal e-mail and voice mail. All’s well that ends well, however-Taylor received a raise in June, according to the Tuttle Times.

      -Andrew Garcia

      Cut and Run

      In September, Accenture pulled out of a $3.73 billion contract to revamp IT for the United Kingdom’s National Health Service. The project, called the National Program for Information Technology, is aimed at modernizing the way the NHS stores and manages medical records, appointments and prescriptions.

      Accenture walked away from the $12-billion-over-budget program that has been plagued by outages, flailing confidence and critical delays from supplier iSoft for its Lorenzo software suite. Computer Sciences will be taking over Accenture’s contract in January 2007.

      Aside from the wasted taxpayer dollars and reshuffled deck of consultants and suppliers, perhaps the most damaging fallout-at least for Accenture-may come from an increasingly skeptical user base. Regaining support of its user base will be a daunting task.

      -Victor Loh

      Ripping into RFID

      During this holiday season, as you stand in long lines at crowded malls, think about the fact that someone in the crowd could be recording your name, number and expiration date from your new swipeless credit card-all without you taking your card out of your wallet. And as you plan your overeas travel for the new year, think about how planned new passports will make it possible for strangers to remotely read your name and nationality as you walk out of the airport.

      All these “benefits” are made possible by the rush in 2006 to include RFID (radio-frequency identification) technology in areas where it has no business. Worse, while RFID makes credit cards and passports less secure, it provides almost no real benefit in return.

      -Jim Rapoza

      Data Disaster

      Load 26 million personal records on a laptop. Take laptop home. Lose laptop during home robbery. Win an eWeek Labs’ Stupid Technology Trick award.

      As the result of the May 2006 theft of a Veterans Administration laptop, millions of U.S. veterans were forced to take measures to protect themselves from the possibility of identity theft. The VA sealed its lock on the Stupid Technology Trick award when the events of May were repeated-albeit on a much smaller scale-in August. At that time, 16,000 VA patient records-including Social Security numbers, addresses and insurance carrier information-were lost.

      The FBI determined that the thefts were motivated by a desire to steal the laptop and external hard drive, and not the data the devices contained. While that’s nice to know, the question remains: Why was the personal data of 26 million-plus people allowed to be carried home by a VA employee?

      -Cameron Sturdevant

      eWEEK Labs
      eWEEK Labs

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.