HP to Offer Printing by E-Mail

June 18, 2010

The booming popularity of mobile devices is fairly good evidence that a lot of people find the idea of computing on the go to be attractive.  One of the things that has been a bit of a stumbling block is the difficulty of getting hard-copy output from many mobile devices.  Apple’s iPad™, for example, does not have any native printing capability.  Even with a conventional laptop, finding a printer that is available for use, and for which your machine has a driver, is not always easy.

Last week, Hewlett-Packard announced that it was introducing a new feature with selected printer models.  In conjunction with a Web-based facility, the HP ePrintCenter, the system allows a mobile device user to submit a print job to a compatible printer by sending a document to a special E-mail address associated with the printer.  The E-mail is delivered to one of HP ePrint servers, which then formats the print job appropriately for the target device, and prints it.  (The target printer must be accessible from the Internet.)

The service will also include a new capability that will allow users to schedule printing of selected content on a regular basis.

Following a successful pilot study in two major cities, HP has announced a new service called Scheduled Delivery, which allows customers to choose content to be pushed to a printer at a designated time each day or week. For example, they might choose a customized news feed from msnbc.com to arrive at 7 a.m. for picking up on their way out of the door, or they might choose fun kids activities from Disney to be ready when the children get home from school.

Somewhat more ominously, the announcement also mentions that the system has the capability to allow “selected content partners” to provide premium content with embedded advertising.

This leads me to wonder whether the ePrintCenter might become just another conduit for spam.  The idea of using E-mail as the submission mechanism is clever; E-mail is a very familiar application to most users, and it  uses protocols designed for reliable delivery.  Using it, however, also gets you E-mail’s disadvantages: mainly its general lack of security, and susceptibility to spam.   There is not a lot of information available about security with ePrint (after all, it has not yet been officially released); let’s hope that HP has figured out a clever way to protect the system against abuse.

Following a successful pilot study in two major cities, HP has announced a new service called Scheduled Delivery, which allows customers to choose content to be pushed to a printer at a designated time each day or week.(2) For example, they might choose a customized news feed from msnbc.com to arrive at 7 a.m. for picking up on their way out of the door, or they might choose fun kids activities from Disney to be ready when the children get home from school.

Thunderbird 3.0.5 Released

June 18, 2010

The Mozilla folks have released a new version of the Thunderbird E-mail client, version 3.0.5.   There are no major changes in this release; message indexing performance has been improved, and several other bug fixes are included.  Further information is in the Release Notes.   You can get the new version via the built-in update mechanism (Main menu: Help / Check for Updates), or you can download versions for Mac OS X, Windows, and Linux here..


Getting Enough Sleep

June 17, 2010

Back in the early days of PCs, when MS-DOS more or less ran the world, reducing computers’ energy consumption was fairly simple: like incandescent lamps, you turned PCs off when they were not being used.  (I remember the educational effort we had to put forth, when we first introduced networked UNIX workstations, to teach users not to just switch them off.)    Today, most people leave their machines on almost all the time, especially if the are networked; in enterprise networks, this is often required to allow applications for backups, network management, malware scanning, and the like to run.  Modern hardware generally has the ability to go into “sleep mode”, which substantially reduces energy consumption, but this is hard to monitor or manage if done on a machine-by-machine basis.

A new report from Microsoft Research discusses an interesting approach to managing sleep.  Instead of relying on individual sleep settings on each machine, they set out to design a sleep management system that will work across a network segment.  The research is described in a paper to be presented at the annual USENIX technical conference in a few days; you can download the paper here [PDF].   The system that the team developed and deployed has two main components:

  • A sleep notifier process that runs on each of the clients whose slumber is to be managed.  When the client is about to go to sleep, it notifies the other component,
  • A sleep proxy application, which runs on a dedicated machine on the same network segment as the clients.  This machine monitors network traffic on behalf of the sleeping clients, and wakes them when something requires their attention.

In essence, when the client is about to go to sleep, usually because a stated time interval has elapsed with no activity, the following occurs:

  1. The sleep notifier on the client tells the sleep proxy that the client is going to sleep.  The notification also specifies which TCP ports the clients is listening on.
  2. The sleep proxy uses ARP probes to assume the sleeping clients IP address.
  3. The sleep proxy monitors network traffic directed to the client; if it sees traffic that the client needs to handle (e.g.,  a TCP SYN request on an active port), it sends the client a “wake on LAN” packet.  The original requestor will re-send the request when the original times out, and the client will then respond as usual.

The idea is a clever one.  Some current network cards have a limited ability to filter traffic intended for a sleeping machine, and “awaken” it only for certain types of packets.  In this case, since the sleep proxy is running on a general-purpose computer, it can accommodate fairly complex rules (which might, for example, be time-of-day dependent); it also, of course, allows for monitoring of how much sleep is actually achieved, and what events may cause some machines to suffer from “insomnia”.  (The team found that, on their network, IT’s network applications, like malware scanning, accounted for most of the “wakefulness” observed.)

The specific implementation tested does have some areas for improvement.  It produces a noticeable delay when a client machine first wakes from sleep, although most of this is due to the time the client itself takes to wake up.  It also, currently, only handles TCP traffic; some modifications would be necessary to handle UDP-based applications.

Still, this is interesting work.  Managing energy consumption is a relative newcomer to the list of IT management concerns.  Tools that help us understand how to do this job better are potentially quite valuable.


Ken Jennings v. Watson ?

June 16, 2010

Back in May of last year, I wrote a couple of posts here about an IBM project to build a software system that could be a successful contestant on Jeopardy!, the popular, long-running TV game show.  IBM has already managed, in 1997, to have its software, running on its Deep Blue supercomputer, win a chess match against Garry Kasparov.  Jeopardy! is in many ways a tougher nut to crack: the clues are given in natural language (clues are categorized), and the contestant must come up with a question that the clue answers.  For example, a recent category was “The 50 US States”, and the clue was, “The only state with a two-word name where neither word occurs in any other state name..”    The correct response is, “What is Rhode Island?”  (As a long-time viewer of Jeopardy!, I’d characterize that as a fairly easy question.)   Another example, from many years ago, was in the category “Words”; the clue was “A moral reservation, or an apothecary’s unit”.  Answer: “What is a scruple?”

The New York Times now has a magazine preview article up that gives an overview and progress update on the project.   The IBM team knew from the outset that it was tackling a tough assignment.

Software firms and university scientists have produced question-answering systems for years, but these have mostly been limited to simply phrased questions. Nobody ever tackled “Jeopardy!” because experts assumed that even for the latest artificial intelligence, the game was simply too hard: the clues are too puzzling and allusive, and the breadth of trivia is too wide.

Playing the game successfully requires not only a large store of factual knowledge, but the ability to identify relationships and links quickly, often on the basis of word play in the categories or clues.  There are existing systems that answer natural language questions (notably Wolfram Alpha, developed by Steve Wolfram), but they rely on carefully constructed data bases crafted to include the links necessary to answer particular types of questions.

IBM apparently now thinks that the system, which runs on a Blue Gene supercomputer and is called Watson (after Thomas, not Dr. John H.), is close to being ready for a public test.  The company has been running in-house matches against human contestants, and gradually refining the set of algorithms that Watson employs.  One difference from some previous “artificial intelligence” approaches is that Watson uses a large number of algorithms to look for relationships, and takes a statistical view of the world, trying to determine which potential answers are most likely to be right.  This kind of approach is made feasible, in part, because the development of the Internet has made an enormous body of written material, of all kinds, available in digital form.  And, of course, much cheaper processing power and memory capacity mean than Watson can “learn” from a truly immense “textbook”.

Unlike its Deep Blue chess software, which impressed many but had little commercial application, IBM sees the technology in Watson as something that might be very applicable to real-world systems.

John Kelly, the head of I.B.M.’s research labs, says that Watson could help decision-makers sift through enormous piles of written material in seconds. Kelly says that its speed and quality could make it part of rapid-fire decision-making, with users talking to Watson to guide their thinking process.

One idea mentioned in the article is a medical diagnostic “assistant”, which could help doctors cope with the constant stream of new information on diseases and treatments.

He [Kelly] imagines a hospital feeding Watson every new medical paper in existence, then having it answer questions during split-second emergency-room crises. “The problem right now is the procedures, the new procedures, the new medicines, the new capability is being generated faster than physicians can absorb on the front lines and it can be deployed.”

The producers of Jeopardy! have agreed to have a special televised match between Watson and selected former winners, possibly as early as this fall.  It should be fascinating to watch.


Apple Updates Snow Leopard

June 16, 2010

Apple has released a new version, 10.6.4, of the OS X “Snow Leopard” operating system for the Mac.  This release fixes more than 20 security flaws in the system; further details are in Apple’s security bulletin.  The new version can be obtained through the built-in Software Update mechanism, or can be downloaded here.  (There are several different download versions for different system configurations.)

Because of its security content, I recommend that you install this update as soon as you reasonably can.


Windows XP Flaw Being Exploited

June 15, 2010

There have been several reports today that a recently-discovered flaw in the Help and Support Center component of Microsoft Windows XP and Server 2003 is being actively exploited.   The vulnerability is serious; if a user were to view a maliciously-crafted Web page, or click on a malicious link in an E-mail message, the attacker could remotely execute code with the same privileges as the local user.  The attack makes use of the HCP protocol used by the Help and Support Center.

Microsoft has not yet released a fix for this problem; they do, however, have a suggested work-around that disables the HCP protocol.  Instructions for doing this manually (which involves editing the Windows Registry — not for the faint of heart) are included in the Security Advisory mentioned above, under  the heading “Workarounds”.  Alternatively, you can visit this Microsoft Support page, and click on the FixIt link under Enable this Fix.  Either of these methods will unregister the HCP protocol, and prevent the exploit from succeeding.  The downside of the work-around is that some functions of the Help and Support Center will not work, or crash.

I’ll post another note here if additional information or a patch becomes available.


Follow

Get every new post delivered to your Inbox.

Join 30 other followers

%d bloggers like this: