The company has just released an updated version of their Content Management System (CMS) tool and is working hard adding new features by the day.
The core team is only 16 people, but the company is currently "hosting" ten interns brought in with their participation in the Google Summer of Code. The Google SoC allows students from all over the world to participate in projects with companies that have been approved by Google and provide mentoring during the process. Companies list their projects, and Google will match students with companies - sometimes in a competitive environment where students look for projects in their area of expertise.
Silverstripe is written in PHP and very modular. During the preview Sig installed a demo version in about three minutes - including the explanations for each step. I saw a test website up and running in no time. Modules can be added at any time, and work as plug-ins, adding features to the core functionality.
Sig told me the new version is much quicker to production, with a default theme that will get new users up and running in no time, while they customise the site to their look and feel.
Currently using PHP 5 and MySQL, one of the Google SoC-sponsored projects is the support for a broad range of database platforms, using the PHP 5 Data Objectes (PDO). Other projects included OpenID support, extended reporting, Google Maps support, localisation features and more.
The platform can be used for any type of CMS-based website, and includes plug-ins for forums, Flickr picture streams and more. One of the new features, also result of this year's Google SoC is the addition of web marketing promotions tools making it easy to create Sitemaps and automatically generate Google AdWords campaign to promote the site with Google's advertising solution.
You can download Silverstripe free. The company offers consulting services. Silverstripe is one of the applications nominated for the New Zealand Open Source Awards 2007 (and Sig wouldn't mind you voting for them).
Let's see: a company is importing those devices into the country, and even though people are buying an iPod with phone, they can't connect it directly to the local GSM (for now) operator Vodafone New Zealand. Why? Because it's locked to AT&T's network in the U.S.
So the options are:
a) buy an iPhone and use it as an iPod only and browse the Internet through Wi-Fi (which is not available everywhere you know) therefore having an iPhone without the phone, or
b) buy an iPhone and use it as an iPhone but with an AT&T number, paying to roaming fees to place and receive phone calls, paying four times the normal SMS prices and forcing your friends to place long distance international calls to reach you on an American number (did I mention you'd be paying to receive those calls as well?)
Now, what the article (and the importer) fails to mentions is that AT&T policy is that if the network detects more than four months of usage outside their "home" location, the cellular connection is cut:
An obliging customer service agent explained that if AT&T's computer sees four months of chitchatting in Alaska (or elsewhere out of AT&T coverage area), service will be automatically canceled.
But if you call AT&T ahead of time and explain to them that you'll be on an extended trip, you can avoid service termination -- at least for a little while.
In a second phone call, Siegel testily confirmed the four-month figure.
The importer also confuses EDGE with GPRS: "Surfing via wireless broadband network is fast; web access via EDGE on Vodafone is much slower" but fail to let users know that there's no Vodafone EDGE network in New Zealand, it's all GPRS - and patchy performance as we know. Of course the New Zealand Herald doesn't mention this in the article either.
In the meantime, kiwis could look for the cheap Chinese knock off on Trade Me, the "iPhone inspired" tPhone.
To start with I didn't know the site's name, but a quick Google search on one of the owners revealed a LinkedIn profile. In that profile there was this word out of context - iYomu, so I just had to enter this in the browser to find the website - still protected by a password, which I was supposed to get during the meeting with the owners.
It just happen that this morning I read one of the blogs in my vast collection of RSS feeds and found that the password to create an account is iyomubeta (thanks Sandy). Go on, you know you want to try. And you will be in to win US$5,000 (hey, I am just diluting the chances to everyone else now).
The first thing that caught my attention was the tagline - Socia Networking for Grown Ups. Seriously, it just looks like placing every other social network services in the same "for teenagers basket", but I really think LinkedIn and FaceBook have their merits, and are not for young kids only, au contraire.
And why use Flash for the most interesting things? It means I can't browse my communities from my mobile device, which I can happily do on FaceBook Mobile.
I will be getting some more information next week when meeting with iYomu and will be able to post more.
I am in both LinkedIn and FaceBook, feel free to add me as a friend. And I am on Geekzone Friends as well, of course.
UPDATE: I have posted a follow up now, after the meeting with iYomy directors.
So how does Ooma manage “free” voice calls? Say you call Manhattan. Ooma routes the call to an Ooma box to the 212 area code, with the local carrier accepting it as a regular outbound call. It works even if the destination number lacks an Ooma box.
It’s free to you, though it does cost the Ooma box in far-flung area codes, but most of the local call plans are flat rate and come with unlimited calling. Ooma piggybacks on existing phone services, bringing all the things you expect from a traditional phone service, like dialing 911. (Walt Mossberg gives his thumbs up to this service.)
In telecom lingo, this is called distributed termination. The more boxes on the Ooma network, the more termination points - and , more voice calls the system can carry to the public switched phone networks.
Think of it another way: What the PC did to the mainframe, Ooma is doing it to the telecom switch.
I cannot overstate the wrath Ooma will feel from incumbents. Since Ooma threatens the carriers’ core business, they’ll do their best to crush it, arguing Ooma bypasses the local access regulatory structure.
Well, this is incredible indeed. And while simple in its essence, it is probably a lot of technology crammed into the Ooma box.
While this happens there, here in good old New Zealand we are still trying to unbundle the local loop, have naked DSL and a decent broadband service...
Fellow Microsoft MVP Jaap van Ekris has written an article touching this subject and what IT departments can do to bring "rogue" Windows Mobile devices in line with their security policies:
Major point in this article is that it is necessary for ICT departments to take measures to secure mobile devices, regardless who is the owner of the physical device, and that measures are relatively easy to take and that users should not be hindered too much by it. Many companies have developped a blind spot for mobile devices in general, especially the ones that are taken along by employees themselves.
Companies are in fact taking counterproductive measures to protect their interest: most companies only allow the desktop sync with these devices, which makes these devices unseen and uncontrollable even if they are completely filled with company information. To stop this, companies do have to grasp any means possible to gain control over these devices: it requires querrilla tactics to find uncontrolled devices in your infrastrucure and convert them into well protected containers of information.
The combination of the prices going down and the need of effectiveness is noticeable in business settings. A lot of devices are simply entering the company through the backdoor: people are simply buying devices themselves and take them to work to hook them up to whatever they will find. According to research conducted by HP, 83% of all devices found in companies are privately owned. Still these devices are used in business contexts and contain company information. Since the devices are privately owned IT departments ignore them, making them unmanaged risks in the company. This introduces the need for guerrilla tactics: you will have to find unusual ways to gain control over devices that legally are beyond your control or otherwise you will lose control over your data completely.
There is a need to gain control over these devices: they are in fact a risk. They are not considered under the company control, but still they contain company confidential information.
A couple of years ago we touched this subject here on Geekzone, with the article "Defining a security policy for Windows Mobile", but since then, with Windows Mobile 5 and Windows Mobile 6 new features are built into the OS making things easier.
If you don't want to install Yahoo! Widgets (previously known as Konfabulator) then you can always visit the Symantec Security Response page for updates.
I just read on their Security Response Blog that their ITM system is being update, and it looks good.
Now, I don't run Symantec software anymore. A lot of people complain it's bloated, hard to uninstall, sometimes requires reinstallation because it loses its configuration, and it may be all true.
But the information they are giving away for free is interesting. So go check it out.
I’ve often wondered - but why don’t many online main stream media sites link when they refer to blogs or websites?
I find it slightly ironic - particularly when they write about new media/blogging.
I’m not sure if it’s laziness, fear of loosing readers from a site or if it’s just a different philosophy of web design - but I would have thought if a site was seriously interested in providing useful content for their readers that they’d hyperlink mentions of other websites.
The whole thing came up from a story on BusinessWeek, talking about how bloggers make money - except that BusinessWeek didn't give out any link love. Exactly like we see here in New Zealand when talking about the on-line editions of the big newspapers...
That's for you, Motorola.
If you have those installed (and who doesn't in these days of YouTube?) then download the patches here and here.
Many of the vulnerabilities are cross-platform, and between them, they have most OS-browser combinations covered. You are vulnerable until you install the patches. Read the advisories from the vendors and grab the patches here and here.
The English are feeling the pinch in relation to recent terrorist threats and have raised their security level from "Miffed" to "Peeved." Soon, though, security levels may be raised yet again to "Irritated" or even "A Bit Cross." Londoners have not been "A Bit Cross" since the blitz in 1940 when tea supplies all but ran out. Terrorists themselves have been re-categorized from "Tiresome" to "A Bloody Nuisance." The last time the British issued a "Bloody Nuisance" warning level was during the great fire of 1666.