Tag: technology

  • Microsoft Surface Pro model sells out

    Microsoft celebrated “amazing” response to its latest model of the Surface over the weekend,.

    Microsoft celebrated “amazing” response to its latest model of the Surface over the weekend, with the announcement that the tablet’s 128 GB model had sold out online and in stores across the country.

    We’re working with our retail partners who are currently out of stock of the 128GB Surface Pro to replenish supplies as quickly as possible

    -said Surface product chief Panos Panay in a company blog post Saturday.

    The larger model of the Surface sold out almost immediately online, and some stores reported that customers were lined up outside of Microsoft, Best Buy and Staples locations in lines reminiscent of Apple launches. But once customers got to many of those stores, particularly partner retailers, they found that Microsoft had only shipped a handful of the tablets to go on shelves.

    That led to plenty of chatter that Microsoft may have orchestrated a sellout by limiting the number of units it sent out into stores.

    ReadWrite’s Brian Proffitt wrote that this appearance of planned scarcity reminds him of the Apple iPad 2 launch, when the company gave very limited amounts of the tablets to non-Apple stores.

    Of course, Microsoft may have been working to keep itself out of a different supply pickle — putting too many Surface Pros onto shelves and having to suffer the embarrassment of seeing them languish there.

    Microsoft hasn’t released sales data apart from the news that its larger model had sold out, so it will be some time before we can puzzle out whether this was really a representation of roaring demand or a supply problem on Microsoft’s end.

    Reviews of the Surface Pro have been lukewarm, with many folks not quite sure what to make of the device.

    The Surface Pro is generally viewed as a tablet but is probably more fairly compared to laptops. As a tablet it’s a clunky device with bad battery life. As a laptop, it’s a lightweight machine that will run legacy Windows software and works with either of Microsoft’s two models of QWERTY keyboard.

    There haven’t been solid numbers on the device’s tablet sibling, the Surface RT, either, though analysts estimate that Microsoft has moved at least 700,000 units since its October debut.


  • When E-Mail Turns From Delight to Deluge

    IN the not-so-distant past, the chipper AOL sound of “You’ve got mail!” filled me with giddiness and glee.

    IN the not-so-distant past, the chipper AOL sound of “You’ve got mail!” filled me with giddiness and glee. I would eagerly check my in-box, excited to see what message had arrived.

    Those days are long gone. Now, when I examine my various e-mail accounts, my main emotion is dread.

    One morning last week, I sat at my desk and stared at my Gmail in-box; 40,000 unread e-mails stared back. (That big number is a function of my life as a writer, and of having five different accounts, work and personal.) Feeling unusually invigorated, I attacked the mountain, trashing subscription newsletters and social networking alerts en masse. I typed brief confirmations for various meetings, sent long-overdue R.S.V.P.’s and replied to a few friends who had sent warm notes of hello. In an hour, I worked my way through roughly 100 e-mails.

    Satisfied by a morning well spent, I left for an early lunch. But when I returned to my desk an hour later, it was as if I’d never deleted a thing. There were dozens of new messages, each waiting to be tackled.

    Frustrated, I closed my e-mail and couldn’t bring myself to return to it for the rest of the day.

    It wasn’t always like this. E-mail was once a great tool for communication, one that was less intrusive than the telephone and faster than the Postal Service. Now, even when it works as designed, it’s a virtual nightmare — and, occasionally, an actual one. I’ve had many a stress dream about missing important notes from my boss.

    Where have we gone wrong?

    Part of it has to do with how stagnant the format of e-mail has remained, while the rest of communication and social networking has surged light years ahead, says Susan Etlinger, an analyst at the Altimeter Group, who studies how people use and interact with technology and the Internet. E-mail is largely arranged along a linear timeline, with little thought given to context and topic.

    “It’s become another timeline or feed,” she says. “It goes by and then it’s done. The current model of e-mail feels obsolete.”

    She also says that while most e-mail providers are trying to block spammers and phishers from bombarding people, they have barely begun to tackle the problem of social spam — a plague of unnecessary and unwanted e-mail that includes alerts from social networks like LinkedIn, Twitter and Tumblr.

    “The spam problem has mostly been fixed, at least, in terms of what is legitimately supposed to be spam,” she said. “It’s the unwanted e-mails that are so horrifying.”

    These frustrations seem universal. And they are not going away anytime soon, particularly given the news that the post office is planning to drop the delivery of certain mail on Saturdays. Our dependence on e-mail is only growing. Indeed, Pingdom, a Web site that monitors Internet use, published a report in January saying that there are 2.2 billion e-mail users worldwide, and that global e-mail traffic has reached 144 billion messages a day.

    Some preliminary answers to this digital quandary are emerging.

    Google offered its version of a solution with Priority in-box, a feature that tries to automatically identify urgent messages. And Apple recently introduced a “V.I.P.” tag that will push a notification to the user when an e-mail arrives from a previously designated important person. These help, but they are not enough on their own.

    Even using both systems, I still resort to keeping an eye on my in-box through the day and jotting down a list — on paper — of people to write back at the end of the day or before bed. It’s archaic at best, and I rarely get to everyone before the day is out.

    Of course, there is a regimented, minimalist approach to clearing out in-boxes each day — otherwise known as In-Box Zero — but that requires a level of constant attention and maintenance beyond the scope of my time and patience.

    I was starting to consider e-mail bankruptcy — ditching my account and signing up for a new one — until I heard about a new option in the e-mail wars, an iOS app called Mailbox, which promises to change how we manage our mail.

    Mailbox, in a way, harks back to an older, simpler system in which you checked your mail — the paper kind — and sorted it as soon as you received it. You read the most pressing letters first, tossed away the junk and set aside pieces of mail that could be dealt with later. The app does much the same thing, by letting users sort their in-box into three neat columns, in a much sleeker and prettier interface than the basic mail clients available for the iPhone or most Android phones.


  • Linux Foundation ships UEFI Secure Boot workaround

    The Linux Foundation’s open source workaround for Unified Extensible Firmware Interface.

    The Linux Foundation’s open source workaround for Unified Extensible Firmware Interface (UEFI) Secure Boot has shipped, and while it’s not necessarily the easiest way to boot Linux on UEFI-enabled PCs, its authors claim it should now work with any bootloader and any distribution.

    The Linux community was first alerted to potential problems with Secure Boot in 2011, when computer boffins warned that the digital signing restrictions in UEFI could lock Linux out of PCs that shipped with Windows installed and the firmware security features enabled.

    With Secure Boot switched on, the UEFI firmware will only boot operating systems that have been digitally signed, which is problematic for free software. In particular, software that is licensed under the GPLv3 – such as the popular Linux bootloader Grub 2 – is explicitly incompatible with Microsoft’s signing scheme.

    For its part, Microsoft argued that OEMs were free to allow users to disable Secure Boot, so long as those who did so understood that they were reducing the overall security of their systems. But Linux enthusiasts observed that some OEMs were actually disabling the Secure Boot switch in their firmwares, leaving customers with no way to turn it off (and thus, no way to boot Linux).

    Linux kernel hackers wasted no time attacking the problem, and a number of potential workarounds were soon mooted. With the official release of the Linux Foundation’s method on Friday, there are now two working techniques for booting Linux on UEFI Secure Boot machines.

    The first is Matthew Garret’s Shim, some variant of which is currently used by Fedora, Suse, Ubuntu, and a number of smaller Linux distros. This method has the advantage of being fairly painless for end users, while allowing small distros to support Secure Boot without dealing directly with Microsoft.

    The new method proposed by the Linux Foundation is slightly more complicated than the Shim method, but it does a better job of supporting the full Secure Boot OS loading API. Specifically, Shim doesn’t support the standard UEFI LoadImage() and StartImage() calls, which means some UEFI-compatible bootloaders won’t work with it.

    The Linux Foundation’s pre-bootloader does support such loaders – including gummiboot and efilinux – but the price is that it makes systems that use it harder to maintain.

    The Linux Foundation’s method is based on cryptographic hashes rather than signing keys, which means that every time the kernel or bootloader for a specific machine is updated, the user must manually add the new hash for that component to the list of permitted binaries. Doing so requires being physically present at the machine, which makes this method unsuitable for servers that are managed remotely.

    Some of this may change in the future, however. Garrett says he is currently working on merging the Linux Foundation’s code with Shim to produce a new loader that can support both approaches – though when such a combined tool might emerge remains up in the air.

    For now, Linux hackers who would like to try out the Linux Foundation’s method can download the code for its loader from maintainer Jim Bottomley’s website. ®