I will be keeping the blog up-to-date, posting with the latest information on this event (the largest tech event in New Zealand), and having some guest bloggers posting their impressions as well.
I have setup a special SMS auto-reply using the 842.co.nz service, that will provide you with the latest information on this event, updated twice a week until the event, when I will try and update throughout the day.
If you are attending the event and want to write as a guest blogger (before and during the event), or if your company is showing or sponsoring sessions, or if you are presenting a session, please let me know, and I will try to get as much information as possible to post in that blog.
If you are a Microsoft MVP attending the sessions, please let me know.
During this meeting I had a chance to explore more about the service and ask questions raised n my previous blog post.
To start with the site is still in beta (the password to access the registration page is iyomubeta), but both David and Frances tell me the feedback has been very good so far.
The whole idea is to create an easy to use web site with social networking features accessible to "grown ups", who are in the 30 - 50 age segment. Frances, who is also responsible for the user experience and interface, tells me that most of the people in this age bracket are not interested in some of the "gimmicks" found in more teen-oriented sites such as myspace and bebo (this the largest social network in New Zealand).
I questioned the use of a Flash-based interface and France replied that it's a "standard" in most web browsers, and it could be used to make the whole experience easier for the people that want a piece of social networking action but are not worried about browser compatibility, AJAX support, and other things.
The site name iYomu stands for "I, you, me, us" and you say it as it's written ("I Yo mu").
David is the founder and doesn't have a technology background - hence the idea of creating something easy for people like himself to use. The service is fully backed by some investment rounds from local and international investors.
Their business model does not include advertising, rather relying on "upselling" features. For example people will be able to upload up to 1GB of files for secure storage and sharing with friends and family. If more than 1GB is needed then iYomu will be happy to sell you more space. They see this as an important feature for professional users who could have documents secured stored on iYomu, for later use during travel or meetings.
The "iDNA" allows users to create a profile based on answers to a questionaire covering different aspects of personality. This "iDNA" can later be used to find potentialy compatible friends in the network.
You can create and join groups, but those groups don't have discussion forums or postings. I asked about this and Frances reply was that "the feedback we received is that most people are interested in finding others in the same interest group, but not necessarily have a group-wise discussions, rather having one-on-one discussions".
I also asked if they have plans to make this an open platform, such as Facebook, which now allows third party developers to create plug-in applications. They think this is something that can happen, but not from the start.
iYomu will be launched in Auckland 13 August 2007 with a "large promotion" that Frances and David promise will draw a big deal of attention to the service. I wasn't told what is happening, but I will be in Auckland on the date (for the Microsoft Tech Ed), so I might find out more then.
It is indeed an interesting concept, although I am still not convince of the benefits of the Flash-based interface, but they certainly have invested a big deal of time in their research and development, so let's see how it goes after the official launch.
So what's the FUD, I mean story? Someone noticed "lag" on his Internet connection and ran a sniffer program to see the traffic on his network. He was horrified to find out incoming connection requests from other computers connect to the Department of Defense and other organisations.
Wow! It never occurred to this person that the DoD could be infected with bots? Or perhaps there are Torrent users on these networks and his IP address was last used by a Torrent user, so those machines are just trying to reconnect?
No, the first thing in his mind was "Quick, bring the tin foil hat! The government is looking at my machine and Microsoft is participating on this!"
Now, let's give it... At least the more technically minded people on Slashdot pointed out that this could be the "background noise" he was seeing in the network, while the Digg users were quick with intelligent comments such as this:
What a surprise.
When are you people going to finally wake up and realize what's going on?
We're at war alright, only it's about us vs. the "terrorists"; it is about us vs. the corporate imperialists. They are the ones who own the terrorists AND our governments.
Oh, I forgot. Good stories about Microsoft are buried at Digg, only bad Microsoft stories and good Apple stories go up on the that site.
The company has just released an updated version of their Content Management System (CMS) tool and is working hard adding new features by the day.
The core team is only 16 people, but the company is currently "hosting" ten interns brought in with their participation in the Google Summer of Code. The Google SoC allows students from all over the world to participate in projects with companies that have been approved by Google and provide mentoring during the process. Companies list their projects, and Google will match students with companies - sometimes in a competitive environment where students look for projects in their area of expertise.
Silverstripe is written in PHP and very modular. During the preview Sig installed a demo version in about three minutes - including the explanations for each step. I saw a test website up and running in no time. Modules can be added at any time, and work as plug-ins, adding features to the core functionality.
Sig told me the new version is much quicker to production, with a default theme that will get new users up and running in no time, while they customise the site to their look and feel.
Currently using PHP 5 and MySQL, one of the Google SoC-sponsored projects is the support for a broad range of database platforms, using the PHP 5 Data Objectes (PDO). Other projects included OpenID support, extended reporting, Google Maps support, localisation features and more.
The platform can be used for any type of CMS-based website, and includes plug-ins for forums, Flickr picture streams and more. One of the new features, also result of this year's Google SoC is the addition of web marketing promotions tools making it easy to create Sitemaps and automatically generate Google AdWords campaign to promote the site with Google's advertising solution.
You can download Silverstripe free. The company offers consulting services. Silverstripe is one of the applications nominated for the New Zealand Open Source Awards 2007 (and Sig wouldn't mind you voting for them).
Let's see: a company is importing those devices into the country, and even though people are buying an iPod with phone, they can't connect it directly to the local GSM (for now) operator Vodafone New Zealand. Why? Because it's locked to AT&T's network in the U.S.
So the options are:
a) buy an iPhone and use it as an iPod only and browse the Internet through Wi-Fi (which is not available everywhere you know) therefore having an iPhone without the phone, or
b) buy an iPhone and use it as an iPhone but with an AT&T number, paying to roaming fees to place and receive phone calls, paying four times the normal SMS prices and forcing your friends to place long distance international calls to reach you on an American number (did I mention you'd be paying to receive those calls as well?)
Now, what the article (and the importer) fails to mentions is that AT&T policy is that if the network detects more than four months of usage outside their "home" location, the cellular connection is cut:
An obliging customer service agent explained that if AT&T's computer sees four months of chitchatting in Alaska (or elsewhere out of AT&T coverage area), service will be automatically canceled.
But if you call AT&T ahead of time and explain to them that you'll be on an extended trip, you can avoid service termination -- at least for a little while.
In a second phone call, Siegel testily confirmed the four-month figure.
The importer also confuses EDGE with GPRS: "Surfing via wireless broadband network is fast; web access via EDGE on Vodafone is much slower" but fail to let users know that there's no Vodafone EDGE network in New Zealand, it's all GPRS - and patchy performance as we know. Of course the New Zealand Herald doesn't mention this in the article either.
In the meantime, kiwis could look for the cheap Chinese knock off on Trade Me, the "iPhone inspired" tPhone.
To start with I didn't know the site's name, but a quick Google search on one of the owners revealed a LinkedIn profile. In that profile there was this word out of context - iYomu, so I just had to enter this in the browser to find the website - still protected by a password, which I was supposed to get during the meeting with the owners.
It just happen that this morning I read one of the blogs in my vast collection of RSS feeds and found that the password to create an account is iyomubeta (thanks Sandy). Go on, you know you want to try. And you will be in to win US$5,000 (hey, I am just diluting the chances to everyone else now).
The first thing that caught my attention was the tagline - Socia Networking for Grown Ups. Seriously, it just looks like placing every other social network services in the same "for teenagers basket", but I really think LinkedIn and FaceBook have their merits, and are not for young kids only, au contraire.
And why use Flash for the most interesting things? It means I can't browse my communities from my mobile device, which I can happily do on FaceBook Mobile.
I will be getting some more information next week when meeting with iYomu and will be able to post more.
I am in both LinkedIn and FaceBook, feel free to add me as a friend. And I am on Geekzone Friends as well, of course.
UPDATE: I have posted a follow up now, after the meeting with iYomy directors.
So how does Ooma manage “free” voice calls? Say you call Manhattan. Ooma routes the call to an Ooma box to the 212 area code, with the local carrier accepting it as a regular outbound call. It works even if the destination number lacks an Ooma box.
It’s free to you, though it does cost the Ooma box in far-flung area codes, but most of the local call plans are flat rate and come with unlimited calling. Ooma piggybacks on existing phone services, bringing all the things you expect from a traditional phone service, like dialing 911. (Walt Mossberg gives his thumbs up to this service.)
In telecom lingo, this is called distributed termination. The more boxes on the Ooma network, the more termination points - and , more voice calls the system can carry to the public switched phone networks.
Think of it another way: What the PC did to the mainframe, Ooma is doing it to the telecom switch.
I cannot overstate the wrath Ooma will feel from incumbents. Since Ooma threatens the carriers’ core business, they’ll do their best to crush it, arguing Ooma bypasses the local access regulatory structure.
Well, this is incredible indeed. And while simple in its essence, it is probably a lot of technology crammed into the Ooma box.
While this happens there, here in good old New Zealand we are still trying to unbundle the local loop, have naked DSL and a decent broadband service...
Fellow Microsoft MVP Jaap van Ekris has written an article touching this subject and what IT departments can do to bring "rogue" Windows Mobile devices in line with their security policies:
Major point in this article is that it is necessary for ICT departments to take measures to secure mobile devices, regardless who is the owner of the physical device, and that measures are relatively easy to take and that users should not be hindered too much by it. Many companies have developped a blind spot for mobile devices in general, especially the ones that are taken along by employees themselves.
Companies are in fact taking counterproductive measures to protect their interest: most companies only allow the desktop sync with these devices, which makes these devices unseen and uncontrollable even if they are completely filled with company information. To stop this, companies do have to grasp any means possible to gain control over these devices: it requires querrilla tactics to find uncontrolled devices in your infrastrucure and convert them into well protected containers of information.
The combination of the prices going down and the need of effectiveness is noticeable in business settings. A lot of devices are simply entering the company through the backdoor: people are simply buying devices themselves and take them to work to hook them up to whatever they will find. According to research conducted by HP, 83% of all devices found in companies are privately owned. Still these devices are used in business contexts and contain company information. Since the devices are privately owned IT departments ignore them, making them unmanaged risks in the company. This introduces the need for guerrilla tactics: you will have to find unusual ways to gain control over devices that legally are beyond your control or otherwise you will lose control over your data completely.
There is a need to gain control over these devices: they are in fact a risk. They are not considered under the company control, but still they contain company confidential information.
A couple of years ago we touched this subject here on Geekzone, with the article "Defining a security policy for Windows Mobile", but since then, with Windows Mobile 5 and Windows Mobile 6 new features are built into the OS making things easier.
If you don't want to install Yahoo! Widgets (previously known as Konfabulator) then you can always visit the Symantec Security Response page for updates.
I just read on their Security Response Blog that their ITM system is being update, and it looks good.
Now, I don't run Symantec software anymore. A lot of people complain it's bloated, hard to uninstall, sometimes requires reinstallation because it loses its configuration, and it may be all true.
But the information they are giving away for free is interesting. So go check it out.