Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    Stupid Technology Tricks of 2006

    By
    eWEEK Labs
    -
    December 10, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Patent Madness

      As we bid 2006 goodbye, I’m wishing we could also wave away at least some of the software patent absurdity that filled the year. From the NTP vs. Research In Motion wars that raged in January to the patent FUD-mongering surrounding Microsoft’s and Novell’s late-year collaboration agreement-and all of the billable hours in between-2006 was probably a bonanza for intellectual property attorneys. Not coincidentally, it was also a year in which nearly everyone in IT burned way too much time dealing with the effects of the U.S. Patent Offices too-hazy understanding of the word obvious.

      Here’s hoping 2007 is brighter-the Supreme Court has been hearing arguments in the patent case of KSR International v. Teleflex, which might result in a saner definition of what’s too obvious to patent.

      -Jason Brooks

      New Virus Vectors: Part I

      Back when software was delivered via 5.25-inch and 3.5-inch floppy disks, the fulfillment house producing the disks would occasionally introduce a virus.

      The software vendor would then unknowingly ship virus-laden disks to thousands of customers. Now, it’s MP3 players that are the vector of opportunity for viruses and spyware when vendors outsource production to manufacturing partners.

      This scenario originated in the fall of 2005, when Creative Labs shipped 3,700 Zen MP3 players carrying the Wullik-B virus. This year, consumer heavyweights McDonald’s and Apple Computer followed suit: As part of a prize promotion, McDonald’s Japan distributed self-branded MP3 players with a surprise-the QQpass spyware Trojan. Apple’s gaffe involved video iPods that carried the RavMonE.exe virus.

      -Michael Caton

      New Virus Vectors: Part II

      I called out Google last year after it was forced to put the brakes on its Google Web Accelerator application following a slew of privacy and security concerns.

      The search giant didn’t learn its lesson.

      Google came under fire-and rightfully so-in 2006 after it distributed e-mails containing the Kama Sutra worm to users of the Google Video Blog group. Apparently, three posts were made that contained the W32/[email protected] mass mailing virus-a worm that began circulating on the Internet in early 2006. More than 50,000 members received e-mail containing the worm from Google.

      Luckily, the Kama Sutra worm requires user interaction to do significant damage and is easily removed by anti-virus software. And since the incident, Google has adopted new procedures to prevent a similar incident from happening. The search giant also apologized in a written statement.

      I hope Google means it this time because I don’t want to write about it in this space again next year.

      -Anne Chen

      Out, Damn Spot

      Hewlett-Packard’s wireless “Memory Spot” data chip, disclosed in July, squeezes a remarkable number of mistakes into a space about the size of a grain of rice. This little device-integrating a capacitor array, modem, loop antenna, microprocessor and memory subsystem into a single component-is a dandy science project, but it demonstrates practices that an enterprise IT architecture should have long since left behind.

      The Memory Spot represents the minimal case of the data silo. Every device holds its own distinct collection of data, and the wireless link requires a probe to be within about a millimeter of the integral antenna. You won’t be able to take an album of photos and catalog them quickly, and you won’t be able to take a drawer of medical files, each with a Memory Spot on its cover, and swiftly identify patterns of drug interaction or post-operative infection.

      Enterprises should look at their operations to see how many places data is being captured-creating opportunities for error or loss or inconsistency-and try to shrink that number rather than merely shrinking the hardware.

      -Peter Coffee

      He Said, CentOS Said

      In March, the City of Tuttle, Okla., got its 15 minutes of fame when City Manager Jerry Taylor discovered a mysterious new Web page where the city home page should have been. Thinking a default Apache boilerplate screen was actually a sign of malfeasance, Taylor sprang into action. Armed with some bad information from his hosting provider, Taylor initiated a fiery exchange with folks supporting the open-source CentOS Linux distribution, accusing them of hijacking Tuttle’s Web site.

      Rather than listening to reasonable explanations from CentOS lead developer Johnny Hughes that CentOS was nothing more than an operating system and that the Web server was misconfigured, Taylor instead boasted of his tech cred and threatened to call the FBI. After much back and forth, Hughes posted the entire e-mail exchange on the CentOS Web site.

      Taylor quickly came under fire from open-source aficionados and, in Taylor’s words, “freaks out there that don’t have anything better to do.” Since few things are more entertaining to rubberneckers than a self-righteous individual being very wrong in an (albeit unexpectedly) public forum, Taylor was resolutely lambasted in Web forums as well as via his personal e-mail and voice mail. All’s well that ends well, however-Taylor received a raise in June, according to the Tuttle Times.

      -Andrew Garcia

      Cut and Run

      In September, Accenture pulled out of a $3.73 billion contract to revamp IT for the United Kingdom’s National Health Service. The project, called the National Program for Information Technology, is aimed at modernizing the way the NHS stores and manages medical records, appointments and prescriptions.

      Accenture walked away from the $12-billion-over-budget program that has been plagued by outages, flailing confidence and critical delays from supplier iSoft for its Lorenzo software suite. Computer Sciences will be taking over Accenture’s contract in January 2007.

      Aside from the wasted taxpayer dollars and reshuffled deck of consultants and suppliers, perhaps the most damaging fallout-at least for Accenture-may come from an increasingly skeptical user base. Regaining support of its user base will be a daunting task.

      -Victor Loh

      Ripping into RFID

      During this holiday season, as you stand in long lines at crowded malls, think about the fact that someone in the crowd could be recording your name, number and expiration date from your new swipeless credit card-all without you taking your card out of your wallet. And as you plan your overeas travel for the new year, think about how planned new passports will make it possible for strangers to remotely read your name and nationality as you walk out of the airport.

      All these “benefits” are made possible by the rush in 2006 to include RFID (radio-frequency identification) technology in areas where it has no business. Worse, while RFID makes credit cards and passports less secure, it provides almost no real benefit in return.

      -Jim Rapoza

      Data Disaster

      Load 26 million personal records on a laptop. Take laptop home. Lose laptop during home robbery. Win an eWeek Labs’ Stupid Technology Trick award.

      As the result of the May 2006 theft of a Veterans Administration laptop, millions of U.S. veterans were forced to take measures to protect themselves from the possibility of identity theft. The VA sealed its lock on the Stupid Technology Trick award when the events of May were repeated-albeit on a much smaller scale-in August. At that time, 16,000 VA patient records-including Social Security numbers, addresses and insurance carrier information-were lost.

      The FBI determined that the thefts were motivated by a desire to steal the laptop and external hard drive, and not the data the devices contained. While that’s nice to know, the question remains: Why was the personal data of 26 million-plus people allowed to be carried home by a VA employee?

      -Cameron Sturdevant

      eWEEK Labs

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×