Archive for January, 2017

Submitted by: Michael Pappas

Question: 1

Which statement about QoS default behavior is true?

A. Ports are untrusted by default.

B. VoIP traffic is passed without being tagged.

C. Video traffic is passed with a well-known DSCP value of 46.

D. Packets are classified internally with an environment.

E. Packets that arrive with a tag are untagged at the edge of an administrative domain.

Answer: E

Frames received from users in the administratively-defined VLANs are classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames.

For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used.

Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value when it passes through the ingress port.

Question: 2

Refer to the exhibit.

Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two.)

A. Set the subnet mask on edge-1 to 255 255.255.252.

B. Reduce the MTU on edge-1 to 1514.

C. Set the OSPF cost on edge-1 to 1522.

D. Reduce the MTU on edge-1 to 1500.

E. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface.

Answer: D, E

A situation can occur where the interface MTU is at a high value, for example 9000, while the real value of the size of packets that can be forwarded over this interface is 1500.

If there is a mismatch on MTU on both sides of the link where OSPF runs, then the OSPF adjacency will not form because the MTU value is carried in the Database Description (DBD) packets and checked on the other side.

Question: 3

Which statement about MPLS is true?

A. It operates in Layer 1.

B. It operates between Layer 2 and Layer 3.

C. It operates in Layer 3.

D. it operates in Layer 2.

Answer: B

MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

Question: 4

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.

Question: 5

Which two switch states are valid for 802.1w? (Choose two.)

A. listening

B. backup

C. disabled

D. learning

E. discarding

Answer: D, E

Port States

There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state.

Question: 6

Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?

A. It reduces the need for a backup data center.

B. It can redirect user requests to locations that are using fewer network resources.

C. It enables the ISP to maintain DNS records automatically.

D. It eliminates the need for a GSS.

Answer: B

Question: 7

Which identification number is valid for an extended ACL?

A. 1

B. 64

C. 99

D. 100

E. 299

F. 1099

Answer: D

Question: 8

Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)

A. the type of cable that is connected to the interface.

B. The uptime of the interface

C. the status of the physical layer of the interface

D. the full configuration of the interface

E. the interface’s duplex settings

Answer: A, C

The show controller command provides hardware-related information useful to troubleshoot and diagnose issues with Cisco router interfaces. The Cisco 12000 Series uses a distributed architecture with a central command-line interface (CLI) at the Gigabit Route Processor (GRP) and a local CLI at each line card.

Question: 9

Which three options are the HSRP states for a router? (Choose three.)

A. initialize

B. learn

C. secondary

D. listen

E. speak

F. primary

Answer: B, D, E

HSRP States

Question: 10

While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?

A. show ip interface brief

B. show ip nat statistics

C. show ip statistics

D. show ip route

Answer: A

Initiate a ping from an end device in one VLAN to the interface VLAN on another VLAN in order to verify that the switch routes between VLANs. In this example, ping from VLAN 2 (10.1.2.1) to Interface VLAN 3 (10.1.3.1) or Interface VLAN 10 (10.1.10.1). If the ping fails, verify that IP routing is enabled and that the VLAN interfaces status is up with the show ip interface brief command.

Question: 11

Which protocol authenticates connected devices before allowing them to access the LAN?

A. 802.1d

B. 802.11

C. 802.1w

D. 802.1x

Answer: D

Explanation:

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term ‘supplicant’ is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicants identity has been validated and authorized. An analogy to this is providing a valid visa at the airport’s arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Question: 12

What is a difference between TACACS+ and RADIUS in AAA?

A. Only TACACS+ allows for separate authentication.

B. Only RADIUS encrypts the entire access-request packet.

C. Only RADIUS uses TCP.

D. Only TACACS+ couples authentication and authorization.

Answer: A

Authentication and Authorization

RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization.

TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information.

During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.

Question: 13

Which statement about the IP SLAs ICMP Echo operation is true?

A. The frequency of the operation .s specified in milliseconds.

B. It is used to identify the best source interface from which to send traffic.

C. It is configured in enable mode.

D. It is used to determine the frequency of ICMP packets.

Answer: D

This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing.

ICMP Echo Operation

The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply.

In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.

Figure 1. ICMP Echo Operation

The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times.

Configuring a Basic ICMP Echo Operation on the Source Device

SUMMARY STEPS

1. enable

2. configure terminal

3. ip sla operation-numbe

4. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-name]

5. frequency seconds

6. end

Question: 14

Which type of interface can negotiate an IP address for a PPPoE client?

A. Ethernet

B. diale

C. serial

D. Frame Relay

Answer: B

Question: 15

Which option is a benefit of switch stacking?

A. It provides redundancy with no impact on resource usage.

B. It simplifies adding and removing hosts.

C. It supports better performance of high-needs applications.

D. It provides higher port density with better resource usage.

Answer: D

A stackable switch is a network switch that is fully functional operating standalone but which can also be set up to operate together with one or more other network switches, with this group of switches showing the characteristics of a single switch but having the port capacity of the sum of the combined switches.

About the Author: Test Information:Total Questions 228Test Number: 200-105Vendor Name: CISCOCert Name: CCNATest Name: Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)Official Site:

certswarrior.com

For More Details:

certswarrior.com/exam/200-105/

Get20% Immediate Discount on Full Training MaterialDiscount Coupon Code: CertsWarrior20off

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1962644&ca=Computers+and+Technology }

25
Jan

Dell joins Microsoft-Nortel VoIP Team

   Posted by:    in Uncategorized

Saturday, October 20, 2007

Dell Inc. announced on Tuesday that it will partner up with the Microsoft-Nortel Innovative communications alliance (ICA) team to sell Unified Communications and VoIP products.

The announcement on Tuesday the 16th of October 2007 includes Dell selling VoIP, data and wireless networking products from Nortel and the Microsoft Office Communications Server 2007 and other unified communications products.

The partnership with both manufacturers should allow Dell to provide a pre-integrated solution.

In March 2007, competitors IBM and Cisco announced they would join in the competition for developing unified communications applications and the development of open technologies around the unified communications and collaboration (UC2) client platform an application programming interfaces (APIs) offered by IBM as a subset of Lotus Sametime.

“We want to make it simple for our customers to deploy unified communications so their end users can get access to all their messages in one place – whether its e-mail, phone or mobile device. This will pave the way for more business-ready productivity tools,” said vice president of solutions, Dell Product Group, Rick Becker.

  • Customers have four options:
    • Core Office Communication Server 2007 – provides instant messaging and on-premise Microsoft Live Meeting.
    • Office Communication Server: Telephony – enables call routing tracking and management, VoIP gateway and public branch exchange (PBX) integration.
    • Audio and Video Conferencing – allows point-to-point conference, video conference and VoIP audio conference.
    • Exchange Unified Messaging – provides voicemail, e-mail and fax in Microsoft Outlook, and anywhere access of Microsoft Outlook Inbox and Calendar.
25
Jan

Florida man charged with stealing Wi-Fi

   Posted by:    in Uncategorized

Update since publication

This article mentions that Wi-Fi stands for “Wireless Fidelity”, although this is disputed.

Thursday, July 7, 2005

A Florida man is being charged with 3rd degree felony for logging into a private Wi-Fi (Wireless Fidelity) Internet access point without permission. Benjamin Smith III, 41, is set for a pre-trial hearing this month in the first case of its kind in the United States.

This kind of activity occurs frequently, but often goes undetected by the owners of these wireless access points (WAPs). Unauthorized users range from casual Web browsers, to users sending e-mails, to users involved in pornography or even illegal endeavours.

According to Richard Dinon, owner of the WAP Smith allegedly broke into, Smith was using a laptop in an automobile while parked outside Dinon’s residence.

There are many steps an owner of one of these access points can take to secure them from outside users. Dinon reportedly knew how to take these steps, but had not bothered because his “neighbors are older.”

Friday, March 3, 2006

The possibility of large-scale protests in the face of the 3,000 journalists covering the Melbourne 2006 Commonwealth Games, has event organisers and the Government worried.

The group “Black GST” – which represents Indigenous Genocide, Sovereignty and Treaty – are planning demonstrations at prominent Games events unless the Government agrees to a range of demands including an end to Aboriginal genocide, Aboriginal Sovereignty and the signing of a treaty.

The Black GST say they hope the focus of the world’s media will draw attention to the plight of indigenous Australians during the Games. Organisers say supporters are converging from across Australia and from overseas. Organisers say up to 20,000 people may take part in talks, rallies, colourful protests and many cultural festivities designed to pressure the Federal Government on Indigeneous rights issues. They want the Government to provide a temporary campsite for the supporters, saying “organised chaos was better than disorganised chaos.”

The 2006 Stolenwealth Games convergence, described by organisers as the “cultural festival of the 2006 Commonwealth Games,” was virtually opened on March 2nd with the launch of the official “Stolenwealth Games” website. Scoop Independent News and Perth Indymedia reported that the launch was held at Federation Square in Melbourne. The site contents were projected via wireless laptop by the Stolenwealth Games General Manager, and a tour of the website was given on the big screen. He said “overwhelming amusement was the response from the audience.” The group say permanent access points to the website are being set up at public internet facilities across Victoria during the coming weeks.

“Interest in the Stolenwealth Games is building all over the world and this fresh, exciting and contemporary site will draw in people from Stolenwealth Nations around the globe to find out about the latest news and events,” said a Stolenwealth Games spokesperson. “We have been getting many requests from around the world wanting to know about the Stolenwealth Games. We have provided many ways that individuals and organisations can support the campaign by spreading the word.”

The Victorian Traditional Owner Land Justice Group (VTOLJG) which represents the first nation groups of Victoria, has announced its support to boycott the 2006 Commonwealth Games until the Government “recognises Traditional Owner rights.” The group asserts that culture has been misappropriated in preparation for the Games.

Organisers of the campaign say they welcome the formal support from the Traditional Owners. “While some seek to divide and discredit Indigenous Australia, this support is further evidence that the Aboriginal people are united in opposition to the ongoing criminal genocide that is being perpetrated against the Aboriginal people” said Black GST supporter and Aboriginal Elder, Robbie Thorpe.

“We now have endorsement from the VTOLJG and the Aboriginal Tent Embassy for the aims and objectives of the Campaign and we are looking forward to hosting all indigenous and non-indigenous supporters from across Australia in March,” he said. The Black GST group have said “the convergence will be held as a peaceful, family-focussed demonstration against genocide, and for the restoration of sovereignty and the negotiations towards a Treaty.”

But the campaign has received flak in mainstream media, such as Melbourne’s Herald Sun, who wrote: “the proposal to allow BlackGST to set up an Aboriginal tent embassy at a site well away from the Commonwealth Games will be interpreted by some as the State Government caving in to a radical protest group. A major concern for the Government… is to protect the event from disruption… no chances should be taken…”

The Black GST has been planning the convergence for months, calling for Aboriginal people and their supporters to converge on Melbourne. The Melbourne-based Indigenous rights group have called on thousands of people concerned about the plight of indigenous Australians to converge on Melbourne during the Games, which they have dubbed “the Stolenwealth Games”. But the choice of Kings Domain has made conflict almost inevitable, as the area is one of the areas gazetted by the State Government as a “Games management zone”.

Under the Commonwealth Games Arrangements Act, any area gazetted as a management zone is subject to a range of specific laws – including bans on protesting, creating a disturbance and other activities. The protest bans will be in effect at different times and places, and offenders can be arrested. A spokeswoman for the Black GST, which advocates peaceful protest, said the site had been chosen because it was close to where the Queen will stay on March 15. “We figured that she is only in Melbourne for 27 hours or something like that so we thought we would make it easy for her to come next door and see us,” she said. “We are a very open, welcoming group, so she will be welcome to come and join us.”

Kings Domain is the burial site for 38 indigenous forefathers of Victoria. Black GST elder, Targan, said trade union groups have offered to install infrastructure at the site. The group initially worked with the State Government to find a suitable camp site, but the relationship broke down when the Government failed to meet a deadline imposed by the protesters. “While we are disappointed the ministers were not able to meet deadline on our request, we thank them for their constructive approach towards negotiations and the open-door policy exercised,” said Targan.

A spokesman for Games Minister Justin Madden said the Government was still investigating other sites. Victoria Police Games security commander Brendan Bannan said he was not convinced the Black GST represented the views of most indigenous people. “We are dealing with the Aboriginal community and they don’t seem to support it at all … the wider Aboriginal community don’t support disruption to the Games at all,” he said.

The Government was told that Black GST supporters would camp in Fitzroy Gardens and other city parks should it fail to nominate a site. A spokesman for Aboriginal Affairs Minister Gavan Jennings said the Government was taking the issue seriously, but had not been able to finalise a campsite before the deadline.

Under special Games laws, people protesting or causing a disturbance in “Games management zones” can be arrested and fined. While prominent public spaces such as Federation Square, Birrarung Marr, Albert Park and the Alexandra Gardens fall under the legislation, such tough anti-protest laws cannot be enforced in the nearby Fitzroy Gardens.

Games chairman Ron Walker has urged the group to choose another date for its protest march through the city, which is currently planned to coincide with the opening ceremony on March 15. The group believes that an opportunity to gain attention for indigenous issues was lost at the Sydney Olympics and has vowed to make a highly visible presence at the Games.

The Black GST said the Australian Aboriginal Tent Embassy’s sacred flame, burning over many years at the Canberra site will be carried to Melbourne before the Games, and its arrival would mark the opening of the protest camp from where a march will proceed to the MCG before the Opening Ceremony.

Black GST claims supporters from all over Australia, including three busloads from the West Australian Land Council, will gather in Melbourne during the Games for peaceful protests.

Aboriginal Affairs Minister Gavin Jennings had offered Victoria Park to the protesters. Victoria Park, former home of Collingwood Football Club, where one of the strongest statements of Aboriginal pride, when St Kilda star Nicky Winmar in 1993 raised his jumper and pointed to his bare chest after racial taunts from the Collingwood crowd.

Black GST, which has labelled the Games the Stolenwealth Games, said the State Government had failed to find a suitable venue. Black GST may encourage protesters to camp in prominent parks such as Fitzroy Gardens and Treasury Gardens. Graffiti supporting the action has also appeared in central Melbourne.

Melbourne City councillor Fraser Brindley has offered his home to the Black GST organisers. “I offered my home up to people who are organising visitors to come to the Games,” he said. Cr Brindley will be overseas when the Commonwealth Games are held and has offered the free accommodation at his flat at Parkville. He said he agreed with the protesters’ view that treaties needed to be signed with indigenous Australians. “I’m offering it up to the indigenous people who are coming to remind Her Majesty that her Empire took this land from them,” said Cr Brindlley. Nationals leader Peter Ryan said: “This extremist group has no part in the Australian community.” Melbourne councillor Peter Clarke said the actions were embarrassing and that he would try to discourage him. “It’s not in the spirit of the Games,” he said.

Aboriginal elder, Targan, said the possibility of securing Victoria Park was delightfully ironic. “There’s a lot of irony going on,” Targan, 53, a PhD student at Melbourne University, said. “GST stands for Genocide, Sovereignty and Treaty. We want the genocide of our people to stop; we want some sovereignty over traditional land, certainly how it is used, and we want a treaty with the government,” Targan said.

24
Jan

Cisco sues Apple for iPhone trademark

   Posted by:    in Uncategorized

Friday, January 12, 2007

The iPhone only made its appearance as a prototype and there have been controversies aroused.

The dispute has come up between the manufacturer of the iPhone (which was resented on Wednesday for the first time) – Apple Inc. – and a leader in network and communication systems, based in San JoseCisco. The company claims to possess the trademark for iPhone, and moreover, that it sells devices under the same brand through one of its divisions.

This became the reason for Cisco to file a lawsuit against Apple Inc. so that the latter would stop selling the device.

Cisco states that it has received the trademark in 2000, when the company overtook Infogear Technology Corp., which took place in 1996.

The Vice President and general counsel of the company, Mark Chandler, explained that there was no doubt about the excitement of the new device from Apple, but they should not use a trademark, which belongs to Cisco.

The iPhone developed by Cisco is a device which allows users to make phone calls over the voice over Internet protocol (VoIP).

24
Jan

Apple introduces iPhone and Apple TV

   Posted by:    in Uncategorized

Wednesday, January 10, 2007

Apple Inc. today has introduced the much-anticipated iPhone at the Macworld Conference in San Francisco.

The iPhone is claimed to be “a revolutionary mobile phone” as stated on the Apple website. The device appears to be running a mobile version of the Apple operating system Mac OSX. It is approximately the same size as a 5th generation iPod, it has a 3.5-inch LCD touchscreen display that is used to access all features of the phone including number dial, as well as making phone calls. The iPhone plays music, movies, displays pictures and is able to connect to a wireless network.

Apple CEO Steve Jobs unveiled the device by walking onto the stage and taking the iPhone out of his jeans pocket. During his 2 hour speech he stated that “Today Apple is going to reinvent the phone, We are going to make history today”.

Today Apple also released their Media Center device – Apple TV. It will directly compete with Microsoft’s Media Center operating system. Apple has taken a different approach to the media center market; rather than storing content (such as movies, music and photos) on the device, Apple TV connects to a computer (Mac and Windows) over a wirless network connection and plays all content stored on that computer. This makes it substantially easier for users to organize their media content.

24
Jan

Rail network in Kashmir comes under attack

   Posted by:    in Uncategorized

Saturday, April 3, 2010

Nearly two feet of the rail route in Kashmir, India was blown up by militants near the Pulwama district, affecting train services from north to south Kashmir. The blast came a few days after militants fought with the Indian army in the area, thereby killing fourteen people.

“There were no casualties, as no trains were running when the militants set off a powerful bomb on the railway track,” said Aijaz Ahmad, a local police official. He added that train services have been temporarily suspended.

According to police, the attackers detonated an Improvised Explosive Device (IED) near Galbug at about 10 PM local time (4:30 PM UTC), Thursday night. Two feet of the rail track on the Qazigund-Baramulla area was damaged. This track was developed two years ago, police sources stated. The attack came just before senior officers were supposed to inspect ongoing works in the Kashmiri railways.

The track was repaired on Friday morning and train services resumed in the region. Kamal Saine, Deputy Inspector General of Police, south Kashmir, told the Press Trust of India agency that the damage to the track was not significant and it took a short time to mend it.

Thursday, December 20, 2007

Wikinews reporter David Shankbone is currently, courtesy of the Israeli government and friends, visiting Israel. This is a first-hand account of his experiences and may — as a result — not fully comply with Wikinews’ neutrality policy. Please note this is a journalism experiment for Wikinews and put constructive criticism on the collaboration page.

This article mentions the Wikimedia Foundation, one of its projects, or people related to it. Wikinews is a project of the Wikimedia Foundation.

Dr. Yossi Vardi is known as Israel’s ‘Father of the Entrepreneur’, and he has many children in the form of technology companies he has helped to incubate in Tel Aviv‘s booming Internet sector. At the offices of Superna, one such company, he introduced a whirlwind of presentations from his baby incubators to a group of journalists. What stuck most in my head was when Vardi said, “What is important is not the technology, but the talent.” Perhaps because he repeated this after each young Internet entrepreneur showed us his or her latest creation under Vardi’s tutelage. I had a sense of déjà vu from this mantra. A casual reader of the newspapers during the Dot.com boom will remember a glut of stories that could be called “The Rise of the Failure”; people whose technology companies had collapsed were suddenly hot commodities to start up new companies. This seemingly paradoxical thinking was talked about as new back then; but even Thomas Edison—the Father of Invention—is oft-quoted for saying, “I have not failed. I have just found ten thousand ways that won’t work.”

Vardi’s focus on encouraging his brood of talent regardless of the practicalities stuck out to me because of a recent pair of “dueling studies” The New York Times has printed. These are the sort of studies that confuse parents on how to raise their kids. The first, by Carol Dweck at Stanford University, came to the conclusion that children who are not praised for their efforts, regardless of the outcome’s success, rarely attempt more challenging and complex pursuits. According to Dweck’s study, when a child knows that they will receive praise for being right instead of for tackling difficult problems, even if they fail, they will simply elect to take on easy tasks in which they are assured of finding the solution.

Only one month earlier the Times produced another story for parents to agonize over, this time based on a study from the Brookings Institution, entitled “Are Kids Getting Too Much Praise?” Unlike Dweck’s clinical study, Brookings drew conclusions from statistical data that could be influenced by a variety of factors (since there was no clinical control). The study found American kids are far more confident that they have done well than their Korean counterparts, even when the inverse is true. The Times adds in the words of a Harvard faculty psychologist who intoned, “Self-esteem is based on real accomplishments. It’s all about letting kids shine in a realistic way.” But this is not the first time the self-esteem generation’s proponents have been criticized.

Vardi clearly would find himself encouraged by Dweck’s study, though, based upon how often he seemed to ask us to keep our eyes on the people more than the products. That’s not to say he has not found his latest ICQ, though only time—and consumers—will tell.

For a Web 2.User like myself, I was most fascinated by Fixya, a site that, like Wikipedia, exists on the free work of people with knowledge. Fixya is a tech support site where people who are having problems with equipment ask a question and it is answered by registered “experts.” These experts are the equivalent of Wikipedia’s editors: they are self-ordained purveyors of solutions. But instead of solving a mystery of knowledge a reader has in their head, these experts solve a problem related to something you have bought and do not understand. From baby cribs to cellular phones, over 500,000 products are “supported” on Fixya’s website. The Fixya business model relies upon the good will of its experts to want to help other people through the ever-expanding world of consumer appliances. But it is different from Wikipedia in two important ways. First, Fixya is for-profit. The altruistic exchange of information is somewhat dampened by the knowledge that somebody, somewhere, is profiting from whatever you give. Second, with Wikipedia it is very easy for a person to type in a few sentences about a subject on an article about the Toshiba Satellite laptop, but to answer technical problems a person is experiencing seems like a different realm. But is it? “It’s a beautiful thing. People really want to help other people,” said the presenter, who marveled at the community that has already developed on Fixya. “Another difference from Wikipedia is that we have a premium content version of the site.” Their premium site is where they envision making their money. Customers with a problem will assign a dollar amount based upon how badly they need an answer to a question, and the expert-editors of Fixya will share in the payment for the resolved issue. Like Wikipedia, reputation is paramount to Fixya’s experts. Whereas Wikipedia editors are judged by how they are perceived in the Wiki community, the amount of barnstars they receive and by the value of their contributions, Fixya’s customers rate its experts based upon the usefulness of their advice. The site is currently working on offering extended warranties with some manufacturers, although it was not clear how that would work on a site that functioned on the work of any expert.

Another collaborative effort product presented to us was YouFig, which is software designed to allow a group of people to collaborate on work product. This is not a new idea, although may web-based products have generally fallen flat. The idea is that people who are working on a multi-media project can combine efforts to create a final product. They envision their initial market to be academia, but one could see the product stretching to fields such as law, where large litigation projects with high-level of collaboration on both document creation and media presentation; in business, where software aimed at product development has generally not lived up to its promises; and in the science and engineering fields, where multi-media collaboration is quickly becoming not only the norm, but a necessity.

For the popular consumer market, Superna, whose offices hosted our meeting, demonstrated their cost-saving vision for the Smart Home (SH). Current SH systems require a large, expensive server in order to coordinate all the electronic appliances in today’s air-conditioned, lit and entertainment-saturated house. Such coordinating servers can cost upwards of US$5,000, whereas Superna’s software can turn a US$1,000 hand-held tablet PC into household remote control.

There were a few start-ups where Vardi’s fatherly mentoring seemed more at play than long-term practical business modeling. In the hot market of WiFi products, WeFi is software that will allow groups of users, such as friends, share knowledge about the location of free Internet WiFi access, and also provide codes and keys for certain hot spots, with access provided only to the trusted users within a group. The mock-up that was shown to us had a Google Maps-esque city block that had green points to the known hot spots that are available either for free (such as those owned by good Samaritans who do not secure their WiFi access) or for pay, with access information provided for that location. I saw two long-term problems: first, WiMAX, which is able to provide Internet access to people for miles within its range. There is already discussion all over the Internet as to whether this technology will eventually make WiFi obsolete, negating the need to find “hot spots” for a group of friends. Taiwan is already testing an island-wide WiMAX project. The second problem is if good Samaritans are more easily located, instead of just happened-upon, how many will keep their WiFi access free? It has already become more difficult to find people willing to contribute to free Internet. Even in Tel Aviv, and elsewhere, I have come across several secure wireless users who named their network “Fuck Off” in an in-your-face message to freeloaders.

Another child of Vardi’s that the Brookings Institution might say was over-praised for self-esteem but lacking real accomplishment is AtlasCT, although reportedly Nokia offered to pay US$8.1 million for the software, which they turned down. It is again a map-based software that allows user-generated photographs to be uploaded to personalized street maps that they can share with friends, students, colleagues or whomever else wants to view a person’s slideshow from their vacation to Paris (“Dude, go to the icon over Boulevard Montmartre and you’ll see this girl I thought was hot outside the Hard Rock Cafe!”) Aside from the idea that many people probably have little interest in looking at the photo journey of someone they know (“You can see how I traced the steps of Jesus in the Galilee“), it is also easy to imagine Google coming out with its own freeware that would instantly trump this program. Although one can see an e-classroom in architecture employing such software to allow students to take a walking tour through Rome, its desirability may be limited.

Whether Vardi is a smart parent for his encouragement, or in fact propping up laggards, is something only time will tell him as he attempts to bring these products of his children to market. The look of awe that came across each company’s representative whenever he entered the room provided the answer to the question of Who’s your daddy?

23
Jan

Apple introduces iPhone and Apple TV

   Posted by:    in Uncategorized

Wednesday, January 10, 2007

Apple Inc. today has introduced the much-anticipated iPhone at the Macworld Conference in San Francisco.

The iPhone is claimed to be “a revolutionary mobile phone” as stated on the Apple website. The device appears to be running a mobile version of the Apple operating system Mac OSX. It is approximately the same size as a 5th generation iPod, it has a 3.5-inch LCD touchscreen display that is used to access all features of the phone including number dial, as well as making phone calls. The iPhone plays music, movies, displays pictures and is able to connect to a wireless network.

Apple CEO Steve Jobs unveiled the device by walking onto the stage and taking the iPhone out of his jeans pocket. During his 2 hour speech he stated that “Today Apple is going to reinvent the phone, We are going to make history today”.

Today Apple also released their Media Center device – Apple TV. It will directly compete with Microsoft’s Media Center operating system. Apple has taken a different approach to the media center market; rather than storing content (such as movies, music and photos) on the device, Apple TV connects to a computer (Mac and Windows) over a wirless network connection and plays all content stored on that computer. This makes it substantially easier for users to organize their media content.

23
Jan

Apple introduces iPhone and Apple TV

   Posted by:    in Uncategorized

Wednesday, January 10, 2007

Apple Inc. today has introduced the much-anticipated iPhone at the Macworld Conference in San Francisco.

The iPhone is claimed to be “a revolutionary mobile phone” as stated on the Apple website. The device appears to be running a mobile version of the Apple operating system Mac OSX. It is approximately the same size as a 5th generation iPod, it has a 3.5-inch LCD touchscreen display that is used to access all features of the phone including number dial, as well as making phone calls. The iPhone plays music, movies, displays pictures and is able to connect to a wireless network.

Apple CEO Steve Jobs unveiled the device by walking onto the stage and taking the iPhone out of his jeans pocket. During his 2 hour speech he stated that “Today Apple is going to reinvent the phone, We are going to make history today”.

Today Apple also released their Media Center device – Apple TV. It will directly compete with Microsoft’s Media Center operating system. Apple has taken a different approach to the media center market; rather than storing content (such as movies, music and photos) on the device, Apple TV connects to a computer (Mac and Windows) over a wirless network connection and plays all content stored on that computer. This makes it substantially easier for users to organize their media content.