Tuesday, September 30, 2008

Enterprise-focused Web Communication : Cisco and Jabber Inc.

Cisco is adding another company to its enterprise-focused Web communication products. Jabber Inc. (the company ) is in the process of being acquired.

Jabber (the standard) originally presented in May 2006 is a widely-accepted set of Linux-based, open source streaming XML protocols and technologies that enable any two entities on the Internet to exchange messages, presence, and other structured information in close to real time. Jingle (originally Google Talk’s effort to integrate SIP-based VoIP with the XMPP specification) is a new set of extensions to the Jabber protocols for use in VoIP, video, and other peer-to-peer multimedia sessions.

Jabber Inc. provides instant messaging software that supports different devices and applications, and allows users on different networks (Google Talk, Yahoo Messenger) to connect and communicate with each other. Their presence and messaging technologies could be integrated into Cisco's WebEx Connect and Unified Communications platforms.

Wednesday, September 10, 2008

Google Android Developer Challenge - Winning Mobile Apps

The Google Android Developer Challenge (round 1 of 2) to encourage the developer community to build outstanding mobile apps for the Android platform has concluded and winning apps can be previewed at http://code.google.com/android/adc_gallery/ . A brief rundown on the some of the ones that appeal to me:


Using the always-on and location awareness features and Google Maps integration, Cab4Me enables calling a taxi to any location worldwide with a single click. You do not need to know the number of the local cab company. You do not need to enter or even know the address you want to be picked up at. You do not need to place a call. I want it to work in Cambridge and Berlin, especially on cold, rainy nights when there are public transit strikes.


PicSay is an image editor for your mobile phone camera. Photos can be enhanced with color correction, highlighting, or distortion effects, you can add word balloons and titles to them and then share them via e-mail, your blog, or photo sharing sites. PicSay uses reverse geocoding via Android's location API to provide address information that can be used as text for a picture--instant (and customized) birthday cards, spontaneous dinner invitations, remarkably silly dog moments captured and documented!


No more uninformed, impulse buying with GoCart to help me gather as much information as I need to make smart, informed purchase in realtime in realplace with a bridge to online--"users can scan the barcode of a product in a store using their phone’s built-in camera. Once scanned, it will search for all the best prices on the Internet and through the inventories of nearby, local stores. After scanning a product, users can also read online reviews or create price alerts to help monitor price drops. Ah! No more walking through Frys, encountering the wireless keyboard section, memory being jogged that you need a new one (can't get my speech recognition software to run on Vista), thinking this looks nice and the price is right and then purchasing it at the counter along with the blank DVDs that you originally stopped it to buy, then wondering on the way home what the Amazon reviewers have to say about it or if you could have gotten it cheaper at Best Buy - which is also on your way home. And, as the developer suggests, using the wish list function to build a list for brainstorming gift ideas for the holiday season.

Tuesday, September 9, 2008

Our Multicore Future - a Ramble

The August hiatus has come and gone, and Silicon Valley is heating up - it seems like SV runs on an academic calendar with September being the fresh beginning a new year.

Earlier this summer I used the phrase "our multicore future" and was challenged about my certainty of its impact on our computing and communications infrastructure for the coming decade and beyond. So this sent me back to 1999 to re-read a chapter I had written for a book published by PwC where I discuss the collision of Moore’s Law with the laws of physics and its implications for future computing architectures.

The 20th century semiconductor approach to making smaller and more powerful transistors is scaling – reducing all the dimensions proportionally—to increase the number of transistors and increase the speed of the circuit. However, once the feature size of a transistor is scaled to below the sub-micron domain, the properties that control the operation of the device begin to change and limit further miniaturization. These fundamental limits are imposed by the laws of physics and thermodynamics -- where microprocessors can get no faster and electronics can get no smaller -- and potentially bring to a close the phenomenal 40 year economic ride that had given us some much innovation and has so dramatically changed our world.

How do we transition from the past to the future? What will intervene between the computing architecture of the past and the potential architectures of the future - molecular, optical, quantum or DNA computing? What will the worldwide semiconductor industry devise to sustain the multi-billion dollar investment the design and manufacturing infrastructure? What might extend Moore's Law for several more orders-of-magnitude? This is where our multicore future could take center stage.

The challenges are many -- particularly on the hardware side with interconnect technology between/among cores and on the software side with new programming paradigms required to harness the power of multicores -- and I will be pointing out new relationships and developments and writing small vignettes on this topic in the weeks and months to come.

PwC: PricewaterhouseCoopers Technology Forecast 2000. "Beyond the forecast: technologies in the 21st century.”

Tuesday, July 29, 2008

Telco 2.0 meets the consumerization of software and its cousin Web. 2.0.

The speculation has been on the wire and in the blogosphere for days but today (07/29) Allegis Capital confirmed today that its portfolio company Ribbit was acquired by BT in an all cash deal, for around $105 Million (not bad for a company that came out of stealth mode less than year ago). BT acquired the company to accelerate its Telco 2.0 strategy and commented that the acquisition would hasten its transformation to a "next-generation, platform-based, software-driven services company."

I used Ribbit to help illustrate the Innovation and Trends presentation I gave in Berlin in March this year. As a pure-play platform with a multi-protocol soft-switch that bridges telephony & next-gen networks and protocols, Ribbit’s open Flash/Flex-based API enables non-telephony developers to quickly build voice-centric applications or integrate voice into Rich Internet applications.

Some of its basics:

Manages mobile voicemail like email on a computer and on a mobile phone.

Turns voicemail into text to make voice messages sharable, searchable, and actionable.

Take and make mobile calls from any browser or web page - such as iGoogle, Facebook, others.

With Ribbit’s consumer service, Amphibian (released in Jan. 2008), users can link their mobile phones with the Ribbit service online where one manage/route mobile calls and voice mail, including voice-to-text and voice-to-mp3 conversions; take or make mobile calls from Web pages using Ribbit widget along with an enhanced caller id feature integrated into a social networking milieu.

In March 2008, Ribbit for Saleforce was in beta and provided “…mobile calls, voice messages and text transcriptions automatically flow into Salesforce where they can play, read, store, search, and act on voice communications. Take and make calls in Salesforce with an online clone of a mobile phone…”

Ribbit reports that it has around 5,000 app developers working with its platform and BT reports it will keep Ribbit as a separate entity.

Wednesday, June 25, 2008

uconnect: Detroit Autos as Wireless Hotspots

Some 2009 Chrysler vehicles will have a dealer installed option for wireless internet access which will work over the cellular infrastructure.

The system will link laptops to the internet and cellular phones and MP3 players to the car's onboard electronics, with the ability to control an Apple iPod with radio and steering wheel controls. The system also has navigation and real-time traffic features, controlled by voice recognition or a touch screen.

The car will have its own 30GB hard drive, with options for three-channel satellite TV and satellite radio service. The system will work while the car is in motion so that passengers can work on their email or surf.

Thursday, June 19, 2008

From Dilbert to Dude: Web 2.0 in the Enterprise

...from the Churchill Club meeting June 17, 2008...just a note - most enterprise 2.0 social networking sites are restricted to the enterprise or the enterprise and its customers or trading partners. Instead of challenging the corporate hierarchy, it should be thought of as complementing it. It also increases collaboration, sometimes from employees who are geographically separated. Some enterprises see it as a marketplace of ideas.

Technologies customized sites with open-source platforms, blogging or wiki platforms, or the Facebook platform.

Incorporating Web 2.0 technologies into the enterprise offers great benefits...and great challenges.


Social networking in the enterprise, or Enterprise 2.0, increases collaboration and idea sharing among employees as well as customers and can even lower employee turnover. Risks include legal issues that could arise or what to do if inappropriate material gets posted on the site. Companies can set up posting guideline.


Best Buy has set up a social networking site for employees which has attracted 20,000 users. Employees can do activities such as using audio files or blogging and can post an idea and get funding for it. They have had to remove only 3 postings out of some 30,000 to 50,000 entries.

Oracle built its social networking site integrated with the company's LDAP directory system, with the ability to make contacts with people. About 10,000 people use it every week and share things like news articles, PowerPoint presentations, and budgets.



Saturday, June 14, 2008

Bluetooth-enabled Devices Track Human Congestion

Researchers in the Civil Engineering department at Purdue University have devised a way to pick up the identifying addresses from Bluetooth devices in consumer electronics. Because each device has its own distinct digital signature, its travel time can be tracked by detectors installed at intersections or along highways and other locations.
One faculty member says "Now we have a way to measure how slow traffic is on a given stretch of road or how long it's taking people to get through airport security at a given concourse and time of day."

Sunday, June 8, 2008

Innovation from the Edge: Consumerization of ICT


…SMS, WiFi, Bluetooth, Google Desktop, IM, VoIP, Flash Drive, Wiki, Skype, YouTube, Facebook, Second Life, Saleforce.com , Blogging, Web 2.0, Mashups, Ribbit, Social Networks, Google Apps,WebEx, iPhone, Social Search…

In recent years, many innovations in technology and communications have come from the consumer side, that is, from The Edge. From the PC to the iPhone, from YouTube to social search, innovation has been embraced by the individual and force fed into the enterprise.

Back in 2005 Gartner Group advised us that the practice of introducing new technologies into consumer markets and having them bleed into industry and the enterprise would be one of the most significant trends affecting information technology (IT) during the next 10 years. At the same time, they warned us of the new threats, security risks and organizational chaos posed by this trend.

But these consumer-led innovations filled corporate voids and out of the “chaos” emerged new forms of enriched communication and information flow, enhanced productivity and empowered corporate citizens, and led to the discovery of new ideas, the creation of new business models and the opening of new markets.

Many forward-looking companies have or are creating enterprise-ready versions of their consumer-oriented technologies—for example Google Search, 3G iPhones, the Facebook Platform or FaceForce (Salesforce+FaceBook) and Ribbit for Salesforce while MarCom departments use YouTube and MySpace to create novel customer touchpoints. With enterprise social networking enabling collaboration and idea sharing among employees, branded and white label social networking vendors are offering social networking platforms via an SaaS model.

In the past, military, industrial, and business markets steered R&D efforts; today, the individual, the consumer is also in the driver’s seat.

Now the security issues are real –from botnet infestations to cybercrime --but they can and must be managed—technology enables business—we’ve known that for a long time.

On June 4th, I attended a half day session here in Palo Alto on "The Consumerization of Software" sponsored by the SDForum and Accel Partners so I could hear first hand what some in the Silicon Valley community were thinking about the topic, mostly from the venture perspective, and how it plays on in the software industry:

The cutting edge of “software” is undergoing a structural change as new business models, and new strategies for customer acquisition have supplanted the Y2K era of enterprise software models. Centralized buying decisions driven by the CIO have given way to “democratic” or consumer-like adoption behavior within the enterprise. Open-source software, software-as-a-service (SaaS) and other “bottom-up” rather than “top-down” models are exploiting this trend. Some companies in this space include Salesforce.com, Facebook, Netsuite, Genius.com, Ribbit, Citrix Online, Parature, Hyperic, Zimbra, Qliktech and Echosign, many of which are in the Accel portfolio.

By way of introduction, Richard Wong from Accel said, “We are seeing a new generation of software companies that are beginning to disrupt the traditional incumbents. The rise of open-source and the growth of software-as-a-service (SaaS) companies are creating a next generation of players that deliver value in a new go-to-market approach.”

Accel’s Kevin Efrusy welcomed the audience to talk about the shift in adopting new technologies and espoused his Consumerization Thesis:

A potential customer has to understand the value in less than 1 minute, and get the benefit in less than 1 hour – otherwise you have lost him/her.
New companies with products in the space need to ruthlessly limit scope, the number of account touch points required and configuration options – simplicity and focus are key. Understand viral marketing and keep in mind that a B2B viral cycle is longer than say a Facebook consumer cycle. Establish metrics that reflect customer success.
The panel discussion entitled A View on Software from Wall Street with Brendan Barnicle (Pacific Crest), Charles Carmel (Cisco) and Mike Maples (Maples Investments) posed the question:

How do you build a grassroots adoption of your technology, product, service?

  • Solve the Day Zero problem –the end user grasps the initial value proposition in less than a minute and benefits from it less than an hour.
  • Start with an easy to use tool addressing specific solution that doesn’t cost anything to adopt (the 1 minute, 1 hour thesis)
  • Get enough users; add features they say they want. At some point they will start wanting to use it at work.

    Another panel discussed “Products for the end user instead of the manager” – for example, Siebel’s Salesforce management suite was focused on providing information at the executive management level; Saleforce.com came along and sales people found a productivity tool to manage information at their level and need. One takeaway is to build these new applications with the users in mind, not the managers.

    The representative from Cisco commented that WLAN technology was a bottoms-up effort as well; if one could be untethered at home or in a coffee shop, why not at the office?

    A third panel with Mike Ni (Netsuite), Duke Chung (Parature), Satish Dharmaraj (Zimbra) and Javier Soltero (Hyperic) spoke to “Beating the incumbents through bottom-up tactics” suggesting that a “try before you buy” and the ability to scale fast and cheaply were winning strategies.

    Consumerized software is paid for from op budgets, rather that capital outlays and “decisions” to use it most often bypasses the IT gatekeepers – removing the barrier between the customer and the product. This is a high velocity sales cycle – with a week to a month for implementation. Revenue models are mostly subscription-based or a similar hybrid mode—SaaS, subscription, pay-per-use, maybe per-person licensing. Price points are most often at low budget approval levels; requires no training, no change management, no consultants.

    Alliances for growth is important- put two good things together – examples Saleforce.com and Ribbit or Google Apps integration into Salesforce.com exposing their 1 million paid subscribers to Google Apps (and Salesforce CRM to users of Google Apps).

Tuesday, June 3, 2008

HD @ the Desktop from Intel

Intel announced its new chip set for PCs-the Intel 4 series which includes G45, G43, P45 and P43, will be used with the and Intel Core Duo 2 and Core 2 Quad processors.

Intel says it is there first chip set to integrate complete hardware high-definition pipelines for Blu-ray and other HD content playback. It's also their first to post-process HD content for improved visual quality. The chip set has Intel Clear Video Technology for HD playback and also has an enhanced 3-D graphics engine.

Saturday, May 31, 2008

Cisco TrustSec @ Stanford Networking Seminar

On May 29th, Fabio Mano presented a session on Cisco's TrustSec at the Stanford Networking Seminar. He prefaced his talk by saying this was the first time Cisco has presented this topic without a nondisclosure.

TrustSec is a fundamental change in the way enterprise network security is implemented. architecture builds on top of a strong identity framework to provide authentication for each network device and a centralized Role Based Access Control. All network entities including switches and routers, in addition to users and hosts, are identified and strongly authenticated to build a trusted network infrastructure. Identities are then mapped onto topology-independent Security Groups by a centralized Attribute Based Access Control policy engine, and carried within each packet through the network. Access control policies are no longer expressed in term of IP addresses, but simply in term of Security Groups.

To protect the integrity of the Security Group Tag each frame is encrypted at the egress port of every network device and decrypted at the next ingress port using the IEEE 802.1AE standard frame format (draft standards 802.1af and 802.1AR will also be supported).

By encrypting packets at every hop of the network user-data are protected over the entire enterprise network, preserving the capability to provide added-value services in the network (such as netflow, quality of service, load balancing, application-level caching,intrusion prevention).

Essentially TrustSec adds a layer of indirection to accomplish its goals. When I get a moment I'll add a simple diagram that expresses the layer of indirection.

Saturday, May 24, 2008

Microsoft Research Silicon Valley Roadshow

Every other year, Microsoft brings innovation roadshow to Silicon Valley and puts projects and their researchers on display at the Mountain View facility. This year's SV Roadshow was held on May 22. After some brief presentations from MSFT management, researchers demonstrated projects, fielded questions and exchanged thoughts during the remainder of the afternoon.

To start, Rick Rashid, the senior vice president of Microsoft Research, gave a short presentation about the company’s different areas of research. Rashid said “The reason you do basic research is for survival, it gives you the ability to change when change is critical... that is true for society and humanity more broadly, like if something really bad happens--war, famine, Google--you can respond.” He prefaced this by saying "...it's not because research can lead to profitable, innovative products although that’s a nice consequence."

Roy Levin who directs the research group in Mountain View indicated they focus on distributed computing and work on improving the delivery of Web search results and the sponsored links that are associated with the to search results.


Botnet Detection for Microsoft's Hotmail

This facility is a target for Botnet attacks. The researchers, Yinglian Xie and Fang Yu developed a technique for automatically detecting servers, or dynamic IP addresses, that send spam by focusing on addresses which change frequently (a traditional email server would have a more or less stable IP address). Their research suggests that 96% of mail servers on dynamic IP addresses actually send only spam.

InkSeine

Raman Sarin demonstrated the InkSeine (not the river, instead the fishing net) software that lets tablet computers be controlled pens instead of keyboards or a mouse and at the same time completely rethinks the user interface. The software and a tutorial can be downloaded from http://research.microsoft.com/inkseine/ .

LaserTouch

LaserTouch uses an overhead infrared camera and two laser to enable surface computing on any flat screen which could potentially make it more affordable than other solutions in this realm. Andy Wilson developed the sensing software than enables the interface; it is the same technology as the TouchWall, a surface computing whiteboard that MSFT introduced to the market earlier this month. There are no plans as of this time to commercialize the prototype seen here.

Translation Technology

Andrea Jessee demonstrated a Windows Live application of their language translation technology. I've used it several times, from Japanese to English or from German to English and it works better than others that I have tried. Also the user interface is quite good. It works very well for reading news stories and has a feature where you can tell it that you are translating something "technical". You can try it at translator.live.com . Remember that text embedded in a graphic does not translate!

Boku is a lightweight programming language for children (it's being tested by 9-12 year age group). It is carried out on the Xbox 360 3D gaming environment and controlled by the Xbox game controller and should be available sometime in 2009.

Several projects addressed parallel programming and multicore computing challenges including DryadLINQ - a programming environment for large scale data parallel computing. It combines .NET Language Integration Query (LINQ) and the Dryad distribution engine engine and Automatic Mutual Exclusion employing a new technique, "transactional memory" to help manage execution threads and simplify the process of writing synchronized concurrent programs.

The goal of Keyword Generation and Query Classification is to produce a list of keywords associated with specific topics. Applications include improving ranking and relevance for search and presenting more relevant online advertising associated with a query.

The WOW project is the WorldWide Telescope, a rich visualization environment that functions as a virtual telescope and integrates imagery collected from the best ground- and space-based telescopes in order to create guided explorations of the universe, The Visual Experience Engine which enables seamless panning and zooming allows anyone to create and present media-rich immersive experiences to share with others.

Other projects of a more academic nature include Chuck Thacker's BEE3 to revitalize architecture research in chip design at the university level and Catherine van Ingen's E-Science in the Cloud to help eco-science researchers deal with the massive amounts of data that is and will be generated by ubiquitous sensors.

Friday, May 16, 2008

10 Top Trends from the VC Community Perspective

Some things to ponder from the Churchill Club Meeting, May 14, 2008.

Data stored by different service providers will be combined to create more intelligent services.

Oil will have increasing difficulty competing with biofuels made from cheap nonfood crops for transportation.

Water technology will replace abating global warming as a global priority.

The mobile device industry's migration to smart phones will produce great disruption for big industry players.

Booming market for healthy aging technologies.

Four-fifths of the world population will carry mobile Internet devices within five to 10 years.

Algorithms will be constructed to develop new industrial chemicals, new biofuels and eventually artificial intelligence.

The mobile phone is your most important device.

There is going to be a venture capital shakeout.

Within five years everything that matters to you will be available on a device that fits on your belt or in your purse.

Thursday, May 8, 2008

Juniper Networks Network Endpoint Assessment @ Stanford Networking Seminar

Network Endpoint Assessment: Stephen Hanna from Juniper Networks (he's on the IETF WG for Network Endpoint Assessment) spoke today at the Stanford Networking Seminar about an integrated approach to network security. He's on the IETF WG for Network Endpoint Assessment. His points are well-taken -- network security components exist in silos and the components don't communicate with each other. Integration could serve network security but requires a well-managed, highly-structured environment, the kind one would find in an organization or enterprise.

What would happen when some or many integrated components applied to the public internet? For example, if one were to assess endpoints (think about who would be responsible for the assessment function) -and disallow vulnerable end-user devices, how many disenfranchised netizens would there be world-wide. A secure (and botnet-free) internet is desireable from many perspectives, but how is it to be accomplished short of "clean slate" initiatives?


PDF of Presentation Slides can be found at http://netseminar.stanford.edu/seminars/05_08_08.pdf (right click then save...).