Total Pageviews

In Shake-Up, Apple\'s Mobile Software and Retail Chiefs to Depart

Scott Forstall, who has run software development for Apple's iPad and iPhone products, and John Browett, the head of the company's retail operations, are leaving Apple, in a rare management shake-up at the company.

The departure of Mr. Forstall, an Apple veteran, will shift his responsibilities to several other Apple executives. Most notably, Eddy Cue, the head of Apple's Internet services, will take over development of Siri and maps, two efforts Mr. Forstall oversaw that have been widely criticized for their reliability and accuracy.

Apple said in a news release that the management changes would “encourage even more collaboration” at the company. Mr. Forstall will leave Apple next year and serve as an advisor to Tim Cook, the chief executive, in the meantime.

Jony Ive, the head of Apple's industrial design, will take on more software responsibilities by providing more “leadership and direction for Human Interface,” Apple said. Craig Federighi, who was previously in charge of Apple's Mac software development, will also lead development of iOS, the software for iPads and iPhones.

The departure of Mr. Browett, who only joined Apple in April to lead its retail operations, followed a number of missteps by him. In August, Apple took the unusual step of apologizing for a plan to cut back on staffing at its stores. Apple said a search for a new head of retail is underway and that the retail team will report directly to Mr. Cook.



Killing the Computer to Save It

Killing the Computer to Save It

Jim Wilson/The New York Times

Peter G. Neumann

MENLO PARK, Calif. - Many people cite Albert Einstein's aphorism “Everything should be made as simple as possible, but no simpler.” Only a handful, however, have had the opportunity to discuss the concept with the physicist over breakfast.

Peter G. Neumann on Cyber Security Close Video See More Videos '

CONCEPT: Peter G. Neumann, about 12 years ago, at SRI International in Menlo Park, Calif.

One of those is Peter G. Neumann, now an 80-year-old computer scientist at SRI International, a pioneering engineering research laboratory here.

As an applied-mathematics student at Harvard, Dr. Neumann had a two-hour breakfast with Einstein on Nov. 8, 1952. What the young math student took away was a deeply held philosophy of design that has remained with him for six decades and has been his governing principle of computing and computer security.

For many of those years, Dr. Neumann (pronounced NOY-man) has remained a voice in the wilderness, tirelessly pointing out that the computer industry has a penchant for repeating the mistakes of the past. He has long been one of the nation's leading specialists in computer security, and early on he predicted that the security flaws that have accompanied the pell-mell explosion of the computer and Internet industries would have disastrous consequences.

“His biggest contribution is to stress the ‘systems' nature of the security and reliability problems,” said Steven M. Bellovin, chief technology officer of the Federal Trade Commission. “That is, trouble occurs not because of one failure, but because of the way many different pieces interact.”

Dr. Bellovin said that it was Dr. Neumann who originally gave him the insight that “complex systems break in complex ways” - that the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure and trustworthy.

The consequence has come to pass in the form of an epidemic of computer malware and rising concerns about cyberwarfare as a threat to global security, voiced alarmingly this month by the defense secretary, Leon E. Panetta, who warned of a possible “cyber-Pearl Harbor” attack on the United States.

It is remarkable, then, that years after most of his contemporaries have retired, Dr. Neumann is still at it and has seized the opportunity to start over and redesign computers and software from a “clean slate.”

He is leading a team of researchers in an effort to completely rethink how to make computers and networks secure, in a five-year project financed by the Pentagon's Defense Advanced Research Projects Agency, or Darpa, with Robert N. Watson, a computer security researcher at Cambridge University's Computer Laboratory.

“I've been tilting at the same windmills for basically 40 years,” said Dr. Neumann recently during a lunchtime interview at a Chinese restaurant near his art-filled home in Palo Alto, Calif. “And I get the impression that most of the folks who are responsible don't want to hear about complexity. They are interested in quick and dirty solutions.”

An Early Voice for Security

Dr. Neumann, who left Bell Labs and moved to California as a single father with three young children in 1970, has occupied the same office at SRI for four decades. Until the building was recently modified to make it earthquake-resistant, the office had attained notoriety for the towering stacks of computer science literature that filled every cranny. Legend has it that colleagues who visited the office after the 1989 earthquake were stunned to discover that while other offices were in disarray from the 7.1-magnitude quake, nothing in Dr. Neumann's office appeared to have been disturbed.

A trim and agile man, with piercing eyes and a salt-and-pepper beard, Dr. Neumann has practiced tai chi for decades. But his passion, besides computer security, is music. He plays a variety of instruments, including bassoon, French horn, trombone and piano, and is active in a variety of musical groups. At computer security conferences it has become a tradition for Dr. Neumann to lead his colleagues in song, playing tunes from Gilbert and Sullivan and Tom Lehrer.

Until recently, security was a backwater in the world of computing. Today it is a multibillion-dollar industry, though one of dubious competence, and safeguarding the nation's computerized critical infrastructure has taken on added urgency. President Obama cited it in the third debate of the presidential campaign, focusing on foreign policy, as something “we need to be thinking about” as part of the nation's military strategy.

A version of this article appeared in print on October 30, 2012, on page D1 of the New York edition with the headline: Killing the Computer to Save It.

Killing the Computer to Save It

Killing the Computer to Save It

Jim Wilson/The New York Times

Peter G. Neumann

MENLO PARK, Calif. - Many people cite Albert Einstein's aphorism “Everything should be made as simple as possible, but no simpler.” Only a handful, however, have had the opportunity to discuss the concept with the physicist over breakfast.

Peter G. Neumann on Cyber Security Close Video See More Videos '

CONCEPT: Peter G. Neumann, about 12 years ago, at SRI International in Menlo Park, Calif.

One of those is Peter G. Neumann, now an 80-year-old computer scientist at SRI International, a pioneering engineering research laboratory here.

As an applied-mathematics student at Harvard, Dr. Neumann had a two-hour breakfast with Einstein on Nov. 8, 1952. What the young math student took away was a deeply held philosophy of design that has remained with him for six decades and has been his governing principle of computing and computer security.

For many of those years, Dr. Neumann (pronounced NOY-man) has remained a voice in the wilderness, tirelessly pointing out that the computer industry has a penchant for repeating the mistakes of the past. He has long been one of the nation's leading specialists in computer security, and early on he predicted that the security flaws that have accompanied the pell-mell explosion of the computer and Internet industries would have disastrous consequences.

“His biggest contribution is to stress the ‘systems' nature of the security and reliability problems,” said Steven M. Bellovin, chief technology officer of the Federal Trade Commission. “That is, trouble occurs not because of one failure, but because of the way many different pieces interact.”

Dr. Bellovin said that it was Dr. Neumann who originally gave him the insight that “complex systems break in complex ways” - that the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure and trustworthy.

The consequence has come to pass in the form of an epidemic of computer malware and rising concerns about cyberwarfare as a threat to global security, voiced alarmingly this month by the defense secretary, Leon E. Panetta, who warned of a possible “cyber-Pearl Harbor” attack on the United States.

It is remarkable, then, that years after most of his contemporaries have retired, Dr. Neumann is still at it and has seized the opportunity to start over and redesign computers and software from a “clean slate.”

He is leading a team of researchers in an effort to completely rethink how to make computers and networks secure, in a five-year project financed by the Pentagon's Defense Advanced Research Projects Agency, or Darpa, with Robert N. Watson, a computer security researcher at Cambridge University's Computer Laboratory.

“I've been tilting at the same windmills for basically 40 years,” said Dr. Neumann recently during a lunchtime interview at a Chinese restaurant near his art-filled home in Palo Alto, Calif. “And I get the impression that most of the folks who are responsible don't want to hear about complexity. They are interested in quick and dirty solutions.”

An Early Voice for Security

Dr. Neumann, who left Bell Labs and moved to California as a single father with three young children in 1970, has occupied the same office at SRI for four decades. Until the building was recently modified to make it earthquake-resistant, the office had attained notoriety for the towering stacks of computer science literature that filled every cranny. Legend has it that colleagues who visited the office after the 1989 earthquake were stunned to discover that while other offices were in disarray from the 7.1-magnitude quake, nothing in Dr. Neumann's office appeared to have been disturbed.

A trim and agile man, with piercing eyes and a salt-and-pepper beard, Dr. Neumann has practiced tai chi for decades. But his passion, besides computer security, is music. He plays a variety of instruments, including bassoon, French horn, trombone and piano, and is active in a variety of musical groups. At computer security conferences it has become a tradition for Dr. Neumann to lead his colleagues in song, playing tunes from Gilbert and Sullivan and Tom Lehrer.

Until recently, security was a backwater in the world of computing. Today it is a multibillion-dollar industry, though one of dubious competence, and safeguarding the nation's computerized critical infrastructure has taken on added urgency. President Obama cited it in the third debate of the presidential campaign, focusing on foreign policy, as something “we need to be thinking about” as part of the nation's military strategy.

A version of this article appeared in print on October 30, 2012, on page D1 of the New York edition with the headline: Killing the Computer to Save It.

Google Signs Deal With Warner Music Group

Google got one of the key pieces of its digital music puzzle in place over the weekend when it finally signed a deal to bring the catalog of the Warner Music Group - with Green Day, Madonna, Neil Young, the Red Hot Chili Peppers and hundreds of other acts - to its Play store.

The news of the deal was tucked in a Google company blog post on Monday that was mostly about new models of its Nexus phones and tablets. But for Google's music service, which has struggled to gain traction against iTunes, Amazon and the myriad of other digital services, it is an important step. It means that Google's millions of Android users - whose devices do not have iTunes - will finally have an essentially complete catalog of MP3s to buy.

“We're now working with all of the major record labels globally, and all the major U.S. magazine publishers, as well as many independent labels, artists and publishers,” wrote Andy Rubin, the company's senior vice president for mobile and digita l content.

Google also announced in its blog post that its music store will open in Western Europe on Nov. 13.

In Europe, it will introduce “scan and match,” a crucial feature for cloud music. It matches songs on a customer's computer to a master database on Google's servers, allowing users to skip the laborious task of uploading every single song. (The feature will not be ready in the United States until “soon after” its introduction in Europe on Nov. 13, Mr. Rubin wrote.

Warner controls about 15 percent of the world's recorded music market, according to the trade publication Music & Copyright. But it was absent when Google announced its MP3 store last November; Warner was also the last of the big record labels to sign a deal with Spotify, the digital music service.

In March, Google consolidated its MP3 store, along with the Android app marketplace and stores for movies, television and magazines, under the Play umbrella. Its branding efforts included a truck that gave out free ice cream at the Celebrate Brooklyn concerts in New York this summer.



On Instagram, 10 Photos a Second of #sandy

As Hurricane Sandy churns its way through the Atlantic, those in its path are turning to their smartphones, and specifically Instagram, to document and share their experiences. Their output runs the gamut, from shocking to silly.

People are posting shots of deserted city centers, waterlogged streets, self-portraits in scuba gear and images borrowed from the apocalyptic film “The Day After Tomorrow.”

The easiest way to see many of the storm-related photos is through a site called Instacane that is pulling together all images that are tagged with terms like “Sandy” and “hurricane.”

The site, according to Instagram, was originally created by two developers named Peter Ng and Chris Ackermann. It was first set up last August as a way to collect images related to Hurricane Irene.

Last winter, people used Instagram to capture the blizzard that blanketed parts of the country, revealing a kaleidoscoped view of the storm, parsed into thousa nds of vantage points. But the service has grown tremendously over the last year, pushing past 100 million users and billions of photographs.

Kevin Systrom, the founder and chief executive of Instagram, said via e-mail that there were 10 pictures per second tagged with “sandy” flowing through the service. In total, more than 230,000 images are using that hashtag - but there could be more related to the storm.

“Most are images of people prepping for the storm and images of scenes outdoors,” Mr. Systrom said. “I think this demonstrates how Instagram is quickly becoming a useful tool to see the world as it happens â€" especially for important world events like this.”

Instagram has played a role in other news events lately. Last month, an Instagram user saw, and photographed, an attempted suicide on the Brooklyn Bridge. And during the shooting at the Empire State Building in August, some of the first photographs from the scene appeared on Insta gram. Although both instances prompted controversy online, Instagram and services like it feel especially valuable in an era when news is not always delivered first by the television but through social networks and the people on them.



Like Apple, Google\'s Android Devices Now Come in Three Sizes

With the addition of the iPad Mini, Apple now offers touchscreen devices in three different sizes. And now its competitor Google is doing the same, introducing a 10-inch tablet, an upgraded 7-inch tablet and a new smartphone.

Introduced Monday, the Nexus 10, which Google developed with LG, is the company's first tablet that competes directly with Apple's 9.7-inch iPad. Most significantly, it undercuts the iPad's price: A Nexus 10 with Wi-Fi and 16 gigabytes of storage costs $400, compared to $500 for an equivalent iPad. Google did not say whether a model with cellular data would be available.

Also developed with LG, Google's Nexus 4 smartphone has a 4.7-inch screen and wireless charging capability. Google highlighted its new camera software, called Photo Sphere, which allows you to snap a picture up and down in different directions and stitch them together into a 360-degree view. (For comparison, the iPhone 5 has a 4-inch screen and camera software that allow s you to create a panoramic photo by panning left or right.) The phone starts at $200 with a T-Mobile contract, or $300 unlocked without a contract.

Google also upgraded its Nexus 7 tablet, which was introduced earlier this year, to include a cellular data connection called HSPA+, which is the predecessor to the newest cell technology, 4G LTE. The model with HSPA+ and 32 GB of storage costs $300, and it's compatible with AT&T's network.

All the devices include Google's latest Android software, 4.2 Jelly Bean. Among its features, Jelly Bean includes Google Now, a personal assistant that keeps track of your searches to do things like display the score of your favorite sports team, or keep you up to date on the status of your flight.



Daily Report: Cracking the Code on Mobile Ads

As more of us have access to the Internet and apps through our cellphones and tablets, advertisers are looking for new ways to reach us there, Claire Cain Miller reports in Monday's New York Times.

Some mobile ads remain just miniature versions of ads on Web sites, an echo of the early days of the Internet, when advertisers essentially slapped print ads online. But increasingly, advertisers are tailoring ads to phones by taking advantage of elements like their ability to track location, make a call, show maps with directions and add calendar alerts.

The stakes are significant for an industry that is still finding its way in the mobile world. Advertisers will spend a relatively small amount of money on ads on phones and tablets this year - $2.6 billion, according to eMarketer, less than 2 percent of the amount they will spend over all. Yet that is more than triple what they spent in 2010.

“An ever-growing percentage of our ad buy is mobile because that's where the consumer is,” said Chris McCann, president of 1-800-Flowers.com, which has run mobile ads urging people to call or walk into a nearby store. “It's the future for us.”

Coming up with ads that exploit the smaller mobile screen requires inventiveness from many parties: advertisers; digital publishers like Google, Apple and Facebook that sell ad space; and mobile ad networks like Millennial Media.

“What we're trying to do is think about the on-the-go user,” said Jason Spero, leader of global mobile sales and strategy at Google, which dominates advertising online and is far and away the leader in mobile advertising. “What does that user want when she's sitting in a cafe or walking down the street?”



They Know Where You\'re Throwing Those Birds

Data-Gathering via Apps Presents a Gray Legal Area

BERLIN - Angry Birds, the top-selling paid mobile app for the iPhone in the United States and Europe, has been downloaded more than a billion times by devoted game players around the world, who often spend hours slinging squawking fowl at groups of egg-stealing pigs.

While regular players are familiar with the particular destructive qualities of certain of these birds, many are unaware of one facet: The game possesses a ravenous ability to collect personal information on its users.

When Jason Hong, an associate professor at the Human-Computer Interaction Institute at Carnegie Mellon University, surveyed 40 users, all but two were unaware that the game was storing their locations so that they could later be the targets of ads.

“When I am giving a talk about this, some people will pull out their smartphones while I am still speaking and erase the game,” Mr. Hong, an expert in mobile application privacy, said during an interview. “Generally, most people are simply unaware of what is going on.”

What is going on, according to experts, is that applications like Angry Birds and even more innocuous-seeming software, like that which turns your phone into a flashlight, defines words or delivers Bible quotes, are also collecting personal information, usually the user's location and sex and the unique identification number of a smartphone. But in some cases, they cull information from contact lists and pictures from photo libraries.

As the Internet goes mobile, privacy issues surrounding phone apps have moved to the front lines of the debate over what information can be collected, when and by whom. Next year, more people around the world will gain access to the Internet through mobile phones or tablet computers than from desktop PCs, according to Gartner, the research group.

The shift has brought consumers into a gray legal area, where existing privacy protections have failed to keep up with technology. The move to mobile has set off a debate between privacy advocates and online businesses, which consider the accumulation of personal information the backbone of an ad-driven Internet.

In the United States, the data collection practices of app makers are loosely regulated, if at all; some do not even disclose what kind of data they are collecting and why. Last February, the California attorney general, Kamala D. Harris, reached an agreement with six leading operators of mobile application platforms that they would sell or distribute only mobile apps with privacy policies that consumers could review before downloading.

In announcing the voluntary pact with Amazon, Apple, Google, Hewlett-Packard, Microsoft and Research in Motion, whose distribution platforms make up the bulk of the American mobile app market, Ms. Harris noted that most mobile apps came without privacy policies.

“Your personal privacy should not be the cost of using mobile apps, but all too often it is,” Ms. Harris said at the time.

But simple disclosure, in itself, is often insufficient.

The makers of Angry Birds, Rovio Entertainment of Finland, discloses its information collection practices in a 3,358-word policy posted on its Web site. But as with most application makers around the world, the terms of Rovio's warnings are more of a disclaimer than a choice.

The company advises consumers who do not want their data collected or ads directed at them to visit the Web site of its analytics firm, Flurry, and to list their details on two industry-sponsored Web sites. But Rovio notes that some companies do not honor the voluntary lists.

As a last resort, Rovio cautions those who want to avoid data collection or ads simply to move on: “If you want to be certain that no behaviorally targeted advertisements are not displayed to you, please do not use or access the services.”

Despite multiple requests by phone and Internet over five days, Rovio did not respond to questions.

Policy practices like Rovio's often do little to inform consumers. Most people simply click through privacy permissions without reading them, said Mr. Hong, the Carnegie Mellon professor. His institute is developing a software tool called App Scanner that aims to help consumers identify what types of information an application is collecting and for what likely purpose.

In Europe, lawmakers in Brussels are planning to bring Web businesses for the first time under stringent data protection rules and to give consumers new legal powers, the better to control the information that is being collected on them.

Proposed revisions to the European Union's General Data Protection regulation now before the Civil Liberties, Justice and Home Affairs Committee of the European Parliament would require Web businesses to get explicit consent from consumers to collect data. A proposal would also give consumers the ability to choose what information an app can store on them without losing the ability to use the software.

But the drafting of the revisions, which are not expected until late 2013 at the earliest, has set off a concerted lobbying battle by global technology companies, most of which are based in the United States, to weaken the consent requirements, which could undermine the advertising-
financed business models that drive many free applications.

A version of this article appeared in print on October 29, 2012, on page B7 of the New York edition with the headline: Data-Gathering via Apps Presents a Gray Legal Area.