IT pros expect cloud to overtake "on-premise" computing by 2015 |
| IT pros expect cloud to overtake "on-premise" computing by 2015 Posted: 08 Oct 2010 12:52 PM PDT According to a survey of 2,000 IT professionals worldwide, cloud computing will “overtaking on-premise computing by 2015 as the primary way organizations acquire IT.” IBM developerWorks, conducted the 2010 IBM Tech Trends Survey in August and September 2010 and published the results in early October. As the following chart illustrates, more than 65 percent expect that the cloud will likely, most likely, or definitely overtake on-premise computing as the way organizations acquire IT by 2015. The survey’s margin of error is +/- 2 percent. For more results from the survey, including a look at mobile application development, check out the article, New developerWorks survey shows dominance of cloud computing and mobile application development, written by Michael O’Connell, developerWorks Editor-in-chief. |
| iPhone and Android apps raise privacy concerns Posted: 07 Oct 2010 07:48 PM PDT
Last week, researchers from Duke University, Pennsylvania State University, and Intel Labs released the results of a study on 30 popular third-party Android apps. Using TaintDroid, a tool which the researchers created, they discovered that 20 of the studied applications exhibited “suspicious handling of sensitive data” and that 15 of the applications “reported users’ locations to remote advertising servers.” In addition to location information, the researchers discovered instances of applications transmitting a device’s phone number, IMSI code (unique code that identifies a user of a GSM or UMTS network), ICC-ID (unique SIM card serial number), and IMEI number (unique identifier for an individual device). They found that one application transmitted information each time the phone booted. “While this application displays a terms of use on first use, the terms of use does not specify collection of this highly sensitive data. Surprisingly, this application transmits the phone data immediately after install, before first use.” Not only are applications transmitting information that could be used to personally identify an individual, they are also sending geographic location data. The researchers found that 50 percent of the studied applications “exposed location data to third-party advertisement servers without requiring implicit or explicit user consent.” And while two of these 15 did display a EULA when first run, neither EULA indicated that such data would be collected and sent to advertisers.
“Packet captures were recorded using tshark12, the console-based libpcap capture utility. The resulting files were then analyzed using a suite of open-source tools including Wireshark, ngrep, and the Perl Net::Pcap libraries13 in order to determine what, if any, personally-identifiable information was being shared with third parties.” Smith also analyzed browser cookies placed on the device by applications. Of the 57 applications Smith evaluated, 68 percent transmitted the iPhone’s UDID (a unique device serial number), “to a remote server, owned either by the application developer or an advertising partner.” Some applications encrypted the data using SSL, but others transmitted the UDID and user’s name (either the logged-in user’s name or the iPhone's user-assigned name) in plain text. Applications were also found to place “extremely long-lived” tracking cookies on the iPhone. These cookies aren’t set to expire for several years. According to Smith, “these long-lived persistent cookies could allow for third parties to link UDIDs from old, discarded phones to individuals' new phones as they upgrade to the newest iPhone model every few years.” Choose your apps wiselyIn response to the Android study, a Google representative pointed out that users must approve the access when an application is installed. CNET quoted the representative: “On all computing devices, desktop or mobile, users necessarily entrust at least some of their information to the developer of the application,” the representative said. “Android has taken steps to inform users of this trust relationship and to limit the amount of trust a user must grant to any given application developer. We also provide developers with best practices about how to handle user data…We consistently advise users to only install apps they trust.” Under Apple’s latest iPhone Software License Agreement, users have already consented to having their location information collected. “By using any location-based services on your iPhone, you agree and consent to Apple’s and its partners’ and licensees’ transmission, collection, maintenance, processing, and use of your location data to provide such products and services.” So, what’s the takeaway from these studies? First, be very careful about which applications you install. If an application asks for access to information that doesn’t seem relevant to the application’s function, you might think twice about installing it. Second, if you do allow an application to access your private data, know that the information may be used in ways you didn’t intend. William Enck, one of the Android researchers, made this point to CNET. “Right now users have to be more diligent with the apps they install, look closely at the permission screen, and assume that that information may be misused.” Note: There is a poll embedded within this post, please visit the site to participate in this post's poll.In case you’re interested, here’s a video of TaintDroid in action: |
| You are subscribed to email updates from TR Dojo To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google Inc., 20 West Kinzie, Chicago IL USA 60610 | |
0 comments:
Post a Comment