Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Jennifer Sultan Pleads Guilty to Selling Prescription Drugs





At the height of dot-com mania 13 years ago, Jennifer Sultan and a few colleagues sold their small technology company for $70 million in stock and cash. She and her boyfriend rented a large house in the Hamptons for the summer and bought a spacious loft near Union Square.







John Marshall Mantel for The New York Times

Jennifer Sultan faced 15 years to life on the top charge against her, and a potential for more prison time on other counts.







In the years since, that temporary flush of wealth evaporated and Ms. Sultan, 38, developed an addiction to prescription painkillers.


On Friday, she sat handcuffed in a courtroom at State Supreme Court in Manhattan. In exchange for a promise of a four-year prison sentence, she pleaded guilty to selling prescription painkillers and conspiring to sell a firearm.


She was arrested last July and accused of being part of a ring that sold prescription drugs and guns. Four others arrested with Ms. Sultan had already pleaded guilty. One, Nicholas Mina, a former New York City police officer, agreed to serve more than 15 years in prison as part of a plea bargain under which he admitted stealing guns from his colleagues’ precinct house lockers and selling them. Mr. Mina was also addicted to prescription painkillers.


Though Ms. Sultan’s lawyer said she had hoped for less than four years, she faced 15 years to life in prison on the top count against her and the potential for more prison time on other charges. She said little in court but smiled broadly several times as she spoke quietly with her lawyer, Frank Rothman.


“She was happy to be done with it, but she was not happy with the sentence,” Mr. Rothman said afterward.


Ms. Sultan grew up in West Long Branch, N.J., five miles north of Asbury Park, and graduated from New York University in 1996. She and her boyfriend at the time, Adam Cohen, worked at a company, Live Online, that was an early pioneer in live streaming events on the Internet.


After the sale of Live Online, efforts by Ms. Sultan and Mr. Cohen to start other technology companies failed. Ms. Sultan explored other interests, including acupuncture and holistic health.


Early last year, a city narcotics investigator discovered an advertisement Ms. Sultan had placed on Craigslist offering prescription painkillers for sale. She and Mr. Cohen were still living in the penthouse loft near Union Square that they bought after the sale of Live Online.


Five times from February through June, she sold pills to an undercover officer, according to her indictment. One sale took place at the Starbucks on Union Square. In another, she sold 183 oxycodone tablets to the officer for $4,400 at a Starbucks in the Flatiron district near the school where she was studying acupuncture.


A separate investigation into the ring that sold stolen guns and pain medication picked up Ms. Sultan sending a text message to the man accused of being the ringleader, Ivan Chavez, saying she wanted to sell him a .357 Magnum handgun for $850, according to a separate indictment obtained by the Manhattan district attorney.


Mr. Chavez was sentenced to 20 years in prison.


Ms. Sultan and Mr. Cohen, who was not accused of participating in the drug and guns ring, filed for bankruptcy in 2010. Last August, the bankruptcy judge ordered them to vacate the loft to allow a bankruptcy trustee to sell it. The 5,600-square-foot loft is still listed for sale at just under $6 million.


She has been incarcerated since her arrest in July because she was unable to raise $85,000 for bail. With credit for good behavior and time served since her arrest, Ms. Sultan could be released from prison in about two years.


Read More..

Gadgetwise Blog: App Smart Extra: Starry Night

Stars, galaxies, meteors and satellites were the subject of App Smart this week as I tested out astronomy apps to help identify objects in the night sky. These apps typically use your phone or tablet’s sensors to display a view of what you’re pointing your device at in the sky in real time, helping you identify planets and constellations. Here are more apps like this to try out:

Star Walk — 5 Stars Astronomy Guide is a popular iOS app, costing $3. It has the same kind of dynamic star display as other apps in its class, and it’s easy to use. It’s also jam-packed with imagery and data on the 200,000 stars and planets in its database, and has a calendar so you can keep track of interesting celestial events. I particularly like the beautiful imagery it uses to show constellations and detail on the planets.

SkySafari 3 may be useful for more experienced star gazers. It has data on 120,000 stars and 220 star clusters, nebulae and galaxies, as well as detailed information pages written by professional astronomers. The basic version costs $3 on iOS, but there’s a Plus edition for $15 that has data on 2.5 million stars and can control some wired and wireless telescopes. The Pro edition is $40 and has many more stars and features but is aimed at the serious amateur astronomer.

Alternatively, and much more simply, there’s SkEye Astronomy, available as a free Android app. It has a businesslike feel, and is slightly sparing on user interface touches like icons. But it is powerful, and essentially works in much the same way as Star Walk or SkySafari does. There’s a $9 SkEye Pro version that has more stars in its database and can help you spot satellites too. But the free edition is fine for the casual astronomer. The app is not ideal you’re a complete beginner, however, as it lacks the kind of detailed background data on stars and so on that similar apps have.

The benefit to stargazing apps like these is that they also work during the day, or in a city that’s too light-polluted to let you see more than a handful of stars. This means you can turn them on at any time to learn more about astronomy.

Quick call: The Popular instant messaging app WhatsApp has been updated to a new version for Windows Phone 8. It has better support for Windows Live Tile displays and extras like a back-up system.

Read More..

Bits Blog: One on One: Sugata Mitra, 2013 TED Prize Winner

Are teachers keeping students from learning in the digital age? Sugata Mitra, a professor of educational technology at Newcastle University, believes so. Dr. Mitra is best known for an experiment in which he carved a hole from his research center in Delhi into an adjacent slum, placing a freely accessible computer there for children to use.

The children quickly taught themselves basic computer skills. The “hole in the wall” experiment, as it is known, led Dr. Mitra to develop the idea of learning environments in which teachers would merely be supervisors as children taught themselves by working together at computer terminals. On Tuesday Dr. Mitra was given the 2013 TED Prize, which grants him $1 million to build a learning laboratory based on this principle.

Q.

What did you learn from the original “hole in the wall” experiment?

A.

The first thing to point out is that it was done 14 years ago, at a time when few children in India had access to computers. I noticed the rich parents saying that their sons and daughters must be gifted, because they were so good with computers. And since we know that gifted kids are not born only to rich parents, why would there not be similar children in the slums? I was curious to see what would happen if I gave an Internet-connected computer to the kind of kids who never had one.

We noticed that they learned how to surf within hours. It was a bit of a surprise. Long story short, they would teach themselves whatever they had to to use the computer, such was the attraction of the machine.

Q.

What does this mean for education?

A.

In those days, the main question was what does it mean for training, because back then people were trained to use computers. So I said it looks like we don’t have to do that.

But I got curious about the fact that the children were teaching themselves a smattering of English. So I started doing a whole range of experiments, and I found that if you left them alone, working in groups, they could learn almost anything once they’ve gotten used to the fact that you can research on the Internet. This was done between 2000 and 2006.

I came to England in 2006, and the schools said, why aren’t you doing it here? So I did, and I realized that what I’ve got has nothing to do with poor children. It probably is just a new way in which children learn in this new environment. It needs two things. First, broadband. That’s fine, everybody loves that. The second thing is, it needs the teacher to stand back.

At first I thought that the children were learning in spite of the teacher not interfering. But I changed my opinion, and realized this was happening because the teacher was not interfering. At that point, I didn’t become entirely popular with teachers. But I explained to them that the job has changed. You ask the right kind of question, then you stand back and let the learning happen.

Q.

Do schools need to be radically changed to implement this, or is this a technique that fits into the current structure of schools?

A.

At the moment I pitch it as a technique that you can bring into your schools. But that’s not the real story, which is that the current schooling system is a leftover from the Victorian age of empire. In that world, there were no computers, no telegraphs and data was carried around on ships. This meant that the pillars of education were reading, writing and arithmetic. That age is gone. The system was wonderfully engineered, but we don’t need it anymore; we need something else. But you can’t just say that without saying how you do it.

What I’m doing is I’m putting my foot in the door by saying here’s a new way. Try it. If you’re happy with it, then I’ll say let’s look at the curriculum top to bottom. If we can convert the curriculum into big questions, if we can turn assessment into peer assessment, then neurophysiology tells us that learning gets enhanced. Finally, if you add admiration — what I call the grandmother’s method, where you stand behind and encourage them. Put all of this together and you get a new way to do schooling.

Q.

So it seems that you’re saying we don’t need teachers at all.

A.

We need teachers to do different things. The teacher has to ask the question, and tell the children what they have learned. She comes in at the two ends, a cap at the end and a starter at the beginning.

Teachers are not supposed to be repositories of information which they dish out. That is from an age when there were no other repositories of information, other than books or teachers, neither of which were portable. A lot of my big task is retraining these teachers. Now they have to watch as children learn.

Q.

Is there a problem with this in that it will serve the good students well, but leave those who need more coaching behind?

A.

Well, yes, to some extent. But there are some interesting things about children working in groups if those groups are self-made. Once you let children do that, the system has a self-correcting ability. Having said that, will there be good students and bad students? Of course.

Q.

Does this work for all levels of instruction?

A.

It doesn’t work the same way with adolescents, and definitely not with adults. With 8- to 12-year-olds, that’s the age where big questions turn them on.

Q.

What are your specific plans with the prize?

A.

In order to see if this sort of self-organized learning environment is suitable I need to have one in which I have some control over and can do measurements with. So I want to build one of these learning spaces somewhere.

It will be totally automatic, completely controlled from the cloud. There will be a supervisor, but that person is not going to be a computer expert or a teacher in anything. She — and it will probably be a she — will be there only for health and safety requirements.

The rest of the school, if we call it a school, is a facility that I can hand over to a mediator from the cloud. She logs in from her home, wherever her home is, and she’s able to control everything inside, the lights, the air-conditioning, you name it. Then there are four mediators who Skype in and use the pedagogical method. That’s going to take a lot of work.

The second bit is that schools all over the world have been using this method. We need to do a massive multiplication, and TED is going to help me do that. I am going to try to put that into homes; get your children and their friends together. Then, every time they do it, I’ll ask them to collect data and send it to a Web site. If I succeed, in two years I’ll have massive data from all over the world. By that time I’ll be done building the facility and I’ll be ready to build a new model.

Q.

Where do you think this school will be?

A.

I’d like to do it in India, because I’d know how to get it done. There will be less of a learning curve, I know who the contractors are, and I know how not to get cheated. So I’d like to do it there, but it’s not set in stone.

Read More..

Gadgetwise Blog: A Wireless Speaker With a Wi-Fi Connection

When we talk wireless speakers, we still generally mean speakers that connect to players by Bluetooth.

There is nothing wrong with Bluetooth, but Wi-Fi, which can carry a lot more information, can sound a lot better. That is part of the reason we are seeing more Wi-Fi and Apple AirPlay speakers on store shelves.

Among them is the Libratone Zipp, a 10-inch tall canister with a fuzzy cover that makes it look like a small, colorful roll of carpet.

The Zipp’s Wi-Fi connection is supposed to be Apple- and Android-friendly. The connection with the iPhone was easy; in my test I set the iPhone’s Wi-Fi network to Libratone, then went to the music player, hit the AirPlay button, picked Libratone again and was connected through the play direct feature. That feature broadcasts directly from the phone to the speaker without going through your larger Wi-Fi network.

Connecting with a Android phone was did not work so easily, which is to say at all. Even with help from support and a software update, I was unable to get a Motorola RAZR Maxx to connect. Support said the problem seemed to be a faulty speaker.

The Zipp says it also supports DLNA, which should make it work with Windows, but I didn’t test that feature.

The Zipp is portable – it claims four hours of battery life when using Wi-Fi – but it isn’t exactly light weight, tipping the scales at four pounds.

The sound quality is good, thanks partially to a 4-inch woofer and a pair of 1-inch ribbon speakers, although I don’t know if it’s fair to call a monaural speaker “high fidelity,” as Libratone does.

There is one major drawback to using Wi-Fi to connect a player and speaker. Once the Wi-Fi is occupied by the Zipp, you can’t use it to connect to your Pandora, Slacker or other streaming audio account. So no streaming audio. You could get around this by connecting the device using a USB cable, which also doubles the Zipp’s battery life.

The Zipp, which comes in any of eight colors, starts at $400 list price online.

Read More..

Gadgetwise Blog: Q&A: Staying Safe From Java Threats

I hear lots of scary stuff about hackers getting into computers thru Java. What do I need to do to make my Mac and PC safe? Any worries about tablets?

Java is a computing platform with its own programming language that is used in many games, business applications and other utilities. It runs on more than 850 million computers worldwide and is used often by Web browsers. Recent attacks on Apple and Facebook used a flaw in the Java Web browser plug-in to infect computers with malicious software when visiting certain sites, and the Department of Homeland Security even issued a warning about Java back in January.

Computers running Windows, Mac OS X and Linux are most at risk. Tablets running systems like Android and iOS are not generally affected; mobile browsers have a setting for the JavaScript programming language, but JavaScript is basically unrelated to Java and its not subject to the current malware issues.

Disabling Java in your Web browser should protect your computer from the recent types of security threats, although you may not be able to play certain games or use Java-dependent applications. Oracle, which develops Java, has instructions for disabling Java in several browsers on Windows, Mac and Linux systems. Independent security sites, like Krebs on Security and Sophos, have additional information.

Apple released its own Mac OS X update to deal with the Java problem on Feb. 19, and the Macworld site has an article on going beyond the browser plug-in and removing Java altogether. Oracle has instructions for uninstalling Java completely on a Windows system, as well as on a Mac.

Read More..

Disruptions: Disruptions: Google Flu Trends Shows Problems of Big Data Without Context

Several years ago, Google, aware of how many of us were sneezing and coughing, created a fancy equation on its Web site to figure out just how many people had influenza. The math works like this: people’s location + flu-related search queries on Google + some really smart algorithms = the number of people with the flu in the United States.

So how did the algorithms fare this wretched winter? According to Google Flu Trends, at the flu season’s peak in mid-January, nearly 11 percent of the United States population had influenza.

Yikes! Take vitamins. Don’t leave the house. Wash your hands. Wash them again!

But wait. According to an article in the science journal Nature, Google’s disease-hunting algorithms were wrong: their results were double the actual estimates by the Centers for Disease Control and Prevention, which put the coughing and sniffling peak at 6 percent of the population.

Kelly Mason, a public affairs spokeswoman for Google, said the company’s Flu Trends site was meant to be only one source in addition to the C.D.C. and other flu surveillance methods. “We review and potentially update our model each season,” she said.

Scientists have a theory about what went wrong, as well.

“Several researchers suggest that the problems may be due to widespread media coverage of this year’s severe U.S. flu season,” Declan Butler wrote in Nature. Then add social media, which helped news of the flu spread quicker than the virus itself.

In other words, Google’s algorithm was looking only at the numbers, not at the context of the search results.

In today’s digitally connected world, data is everywhere: in our phones, search queries, friendships, dating profiles, cars, food, reading habits. Almost everything we touch is part of a larger data set. But the people and companies that interpret the data may fail to apply background and outside conditions to the numbers they capture.

“Data inherently has all of the foibles of being human,” said Mark Hansen, director of the David and Helen Gurley Brown Institute for Media Innovation at Columbia University. “Data is not a magic force in society; it’s an extension of us.”

Society has encountered similar situations for centuries. In the 1600s, Dr. Hansen said, an early census was recorded in England as the Great Plague of London killed tens of thousands of Britons. To calculate the spread of the disease, officials started recording every christening and death in the city. And although this helped quantify the mortality rate, it also created other problems. There was now an astounding collection of statistical information for scientists to review and understand, but it took time to develop systems that could accurately assess the information.

Now, as we enter a world of big data, we have to learn how to apply context to these numbers.

Dr. Hansen said the problem of data without context could be summed up in a quote from the playwright Eugène Ionesco: “Of course, not everything is unsayable in words, only the living truth.”

I experienced this firsthand in the spring of 2010, when I was an adjunct professor at New York University teaching graduate students in the Interactive Telecommunications Program.

I created a class called “Telling Stories With Data, Sensors and Humans,” with the goal of determining whether sensors and data could become reporters and collect information. Students built little electronic contraptions with $30 computers called Arduinos, and attached several sensors, including ones that could detect light, noise and movement.

We wondered if we could use these sensors to determine whether students used the elevators more than the stairs, and whether that changed throughout the day. (Esoteric, sure, but a perfect example of a computer sitting there taking notes, rather than a human.)

We set up the sensors in some elevators and stairwells at N.Y.U. and waited. To our delighted surprise, the data we collected told a story, and it seemed that our experiment had worked.

As I left campus that evening, one of the N.Y.U. security guards who had seen students setting up the computers in the elevators asked how our experiment had gone. I explained that we had found that students seemed to use the elevators in the morning, perhaps because they were tired from staying up late, and switch to the stairs at night, when they became energized.

“Oh, no, they don’t,” the security guard told me, laughing as he assured me that lazy college students used the elevators whenever possible. “One of the elevators broke down a few evenings last week, so they had no choice but to use the stairs.”

E-mail: bilton@nytimes.com

Read More..

Bits: Online Gambling Heats Up

The two big casino states, Nevada and New Jersey, are racing into online gambling as a way of protecting their turf. They will in essence become laboratories for what is and is not feasible in Internet wagering.

Nevada legislators, who previously authorized online poker, hurriedly passed a new bill this week that allows the state to enter into deals with other states to essentially pool their gambling populations. “This is the day we usher Nevada into the next frontier of gaming,” Brian Sandoval, Nevada’s governor, said on Thursday as he signed the bill.

In the year since online poker became a theoretical possibility in Nevada, no company has yet offered it. One problem: It’s too small a market, especially in a state where it is not exactly hard to gamble the old-fashioned way — by plunking your body down in a casino or, for that matter, just about anywhere else.

“We don’t have a universe of players,” Pete Ernaut, a Nevada political consultant, told The Las Vegas Review-Journal. “So for us, what we get to offer to a state like California or Texas is that we have the most mature regulatory infrastructure. We have the most mature financial, auditing and collection capabilities, much greater than some of those states, and they have the players.”

Meanwhile, New Jersey is also barreling ahead. Chris Christie, the governor, is likely to sign a revised bill permitting a variety of online gambling as soon as next week. All online ventures will be under the tight control of the Atlantic City casinos. Delaware, the smallest of the three states that are moving ahead with online gambling, also has ambitious plans.

In a harbinger of the new age, gamblers at the Borgata casino in Atlantic City will, as USA Today put it, “be able to lose their shirts without wearing one.” Gamblers staying in one of the casino’s 2,000 rooms can now place their bets right there without venturing onto the casino floor. From there it is only a small step to just staying home and gambling from the hammock.

Internet companies that make online games are watching all this with considerable interest. “Is 2013 going to be a game-changer?” asked Paul Thelen of Big Fish Studios, which began offering a gambling app in Britain last fall. “No. But in 2014, it starts getting interesting.”

Read More..

In a Slight Shift, North Korea Widens Internet Access, but Just for Visitors





HONG KONG — North Korea will finally allow Internet searches on mobile devices. But if you’re a North Korean, you’re out of luck — only foreigners will get this privilege.




Cracking the door open slightly to wider Internet use, the government will allow a company called Koryolink to give foreigners access to 3G mobile Internet service by next Friday, according to The Associated Press, which has a bureau in the North.


The North Korean police state is famously cloistered, a means for the government to keep news of the world from its impoverished people. Only the most elite North Koreans have been allowed access to the Internet, and even they are watched. And although many North Koreans are allowed to have cellphones, sanctioned phones cannot call outside the country.


Foreigners were only recently allowed to use cellphones in the country. Previously, most had to surrender their phones with customs agents.


But it is unlikely that the small opening will compromise the North’s tight control of its people; the relatively few foreigners who travel to North Korea — a group that includes tourists and occasional journalists — are assigned government minders.


The decision, announced Friday, to allow foreigners Internet access comes a month after Google’s chairman, Eric E. Schmidt, visited Pyongyang, the North’s capital. While there he prodded officials on allowing Internet access, noting how easy it would be to set up through the expanding 3G network of Koryolink, a joint venture of North Korean and Egyptian telecommunications corporations. Presumably, Mr. Schmidt’s appeal was directed at giving North Koreans such capability.


“As the world becomes increasingly connected, their decision to be virtually isolated is very much going to affect their physical world, their economic growth and so forth,” Mr. Schmidt told reporters following his visit. “We made that alternative very, very clear.”


North Koreans will get some benefit from the 3G service, as they will be allowed to text and make video calls, The Associated Press said. They can also view newspaper reports — but the news service mentioned only one source: Rodong Sinmun, the North’s main Communist Party newspaper.


Read More..

IHT Rendezvous: North Korea Widens Internet Access, but Just for Visitors

HONG KONG — North Korea will finally allow Internet searches on mobile devices and laptops. But if you’re a North Korean, you’re out of luck — only foreigners will get this privilege.

Cracking the door open slightly to wider Internet use, the government will allow a company called Koryolink to give foreigners access to 3G mobile Internet service by March 1, The Associated Press reported.

The decision, announced Friday, comes a month after Google’s chairman, Eric E. Schmidt, visited Pyongyang and prodded officials on allowing Internet access, noting how easy it would be to set up through Koryolink’s expanding 3G network. Presumably, his appeal was directed at giving North Koreans such capability.

“As the world becomes increasingly connected, their decision to be virtually isolated is very much going to affect their physical world, their economic growth and so forth,” Mr. Schmidt told reporters after arriving at Beijing International Airport following his visit to North Korea. “We made that alternative very, very clear.”

Foreigners were only recently allowed to use cellphones in the country. Previously, they had to surrender their phones with customs agents.

Read More..

Gadgetwise Blog: An Invisible Wetsuit for Phones and Tablets

It’s a little heart-stopping to watch someone purposely dunk a cellphone or tablet in a water tank. Seeing it continue to work underwater is astonishing.

It does because the components inside have been nano-coated. Such coatings are best applied to a phone’s components before assembly. You can have nano coating done afterward through Liquipel, but it will cost you.

A cellphone case can seal against most water, but it adds bulk and weight to a sleek device. Nano coatings render the parts themselves impervious to water damage, so the protection comes without added bulk.

Liquipel’s process will not make the device waterproof, but will make it water-resistant enough to survive short accidental dunkings and ordinary splashes.

You ship Liquipel your phone, which is then put into a vacuum chamber and treated with the coating in vapor form. The process takes about 30 minutes. If you can go to its facility in Santa Ana, Calif., the company will treat your phone while you wait.

The cost varies, starting at $90 to give a mobile phone a basic treatment. It goes up to $130 for a tablet with an added protective film covering and an expedited four-hour turnaround.

The cost is not outlandish compared with the price of a waterproof case, which typically run $40 to $130. It’s almost certainly less expensive than replacing your smartphone.

It’s not an outlandish cost compared to the price of a waterproof case, which typically run $40 to $130. It’s almost certainly less expensive than replacing your smart phone.

Read More..

State of the Art: Sony’s RX1 Camera: Compact, Full-Framed and Expensive, Too





When you’re shopping for a camera, you have a million specs and features to consider. Size, weight, battery life, megapixels, zoom power. ... Can you guess which aspect consumers consider most important?




The color of the body. (“Ooh, I like the shiny red one!”)


The camera buyer for a national electronics chain told me that. We both slapped our foreheads.


Please. If you’re buying a camera, shouldn’t picture quality be the most important detail?


If so, what you should care most about is the flat, rectangular light sensor inside the “film.” In general, the bigger the sensor, the happier you’ll be with the results and the more you’ll pay.


At the low end, snapshot cameras with tiny sensors (0.4 inches diagonal) cost $150 but give you blurry, grainy low-light shots. At the high end, those professional, big, black S.L.R. cameras cost $2,000 to $6,000 but come with full-frame sensors. That is, these sensors are as big as an old piece of 35-millimeter film (1.7 inches). They deliver unparalleled low-light quality, richness of color, detail and soft-focused backgrounds.


(You can buy cameras with even bigger sensors — medium-format cameras that cost $20,000 and military cameras that cost millions — but let’s say you live in the real world.)


All of this explains why Sony’s 2013 camera/camcorder lineup is so startling. The company has put full-frame sensors into three new cameras, at prices and body sizes that nobody has ever attained.


For example, there’s the A99, which Sony says is the world’s smallest and lightest full-frame S.L.R. It’s meant to compete with professional cameras like the Canon 5D Mark III ($3,200) and Nikon D800 ($3,000) — for $2,800. (These prices are for the bodies only.)


The A99 is sort of homely, but it has a long list of distinguishing features: fast, continuous focusing, even while filming or shooting something running at you; two memory-card slots; built-in GPS function that stamps every photo with your location; 1080p, 60-frames-a-second high-definition video; microphone and headphone jacks; and an electronic viewfinder whose video shows you the results of your adjustments in real time.


Sony says the A99 is also the only full-frame camera with a screen that flips out and tilts.


Then there’s the VG900, Sony’s first full-frame camcorder. It costs $3,300 — about $10,000 less than any other full-frame camcorder, Sony says. And its sensor is about 45 times as big as a standard camcorder’s sensor.


Now, a huge sensor may not seem to make sense in a camcorder. One frame of hi-def video has only about two megapixels of resolution; what’s the point of stuffing a 24-megapixel sensor into the camcorder?


Answer: It’s about picture quality. A big sensor gives you amazing low-light video, gorgeous blurry backgrounds, greater dynamic range and better color.


Thousands of filmmakers use full-frame S.L.R. still cameras to shoot video, because of the superior quality and because they can use different lenses for different video effects. S.L.R-based camcorders like Sony’s VG900 offer the same features in a camcorder shape. They’re much more comfortable to hold, and their buttons are better placed for video operation.


The VG900 accepts Sony’s E-mount camera lenses, of which there are 13; they don’t quite exploit the full area of that jumbo sensor. But the camera comes with an adapter for the older, more plentiful A-mount lenses. Alas, those lenses don’t autofocus with that adapter.


The most astonishing new full-frame Sony, though, is the RX1. It’s the world’s first compact full-frame camera.


Now, you’re forgiven if you just spewed your coffee. “Compact” and “full-frame” have never gone together before. Everyone knows why: a big sensor requires a big lens, meaning a big camera. You can’t change the laws of physics, no matter how much photographers would love it.


E-mail: pogue @nytimes.com



Read More..

Bits Blog: Tech Predictions for 2013: It's All About Mobile

If there is one theme that will be the topic of digital business this year, it is mobile.

ComScore, which tracks Web and mobile usage, published a report about what happened in 2012, and what to expect in 2013.

It shows that the effects of a movement toward mobile are everywhere, from shopping to media to search. According to the report, “2013 could spell a very rocky economic transition,” and businesses will have to scramble to stay ahead of consumers’ changing behavior.

Here are a few interesting tidbits from the 48-page report.

The mobile transition is happening astonishingly quickly. Last year, smartphone penetration crossed 50 percent for the first time, led by Android phones. People spend 63 percent of their time online on desktop computers and 37 percent on mobile devices, including smartphones and tablets, according to comScore.

Just as they compete on computers, Facebook and Google are dominant and at each other’s throats on phones.

Google’s map app for the iPhone, which had been the most used mobile app, lost its No. 1 spot to Facebook after Apple kicked Google’s maps off the iPhone in October. Now, Facebook reaches 76 percent of the smartphone market and accounts for 23 percent of total time spent using apps each month. The next five most used apps are Google’s, which account for 10 percent of time on apps.

As mobile continues to take share from desktop, some industries have been particularly affected, and they are seeing significant declines in desktop use of their products as a result. They are newspapers, search engines, maps, weather, comparison shopping, directories and instant messenger services.

The most visited Web sites are not so surprising: Google, Yahoo, Microsoft, Facebook and Amazon. Facebook continues to take up most of our time online.

But there were a few surprises from younger, smaller Web companies. Tumblr was No. 8 on the list of sites, ordered by time spent on them. And several Web sites were breakout hits last year, as measured by growth and visitor numbers: Spotify (music), Dropbox (online storage), Etsy (shopping), BuzzFeed (news), JustFab (shopping), SoundCloud (music) and BusinessInsider (news).

Search, one of the biggest and most reliable Web industries, is at a crossroads, comScore said. Even though the search market continues to be extraordinarily profitable, there is a desire for it to evolve and offer new services to users.

Here is some evidence: Searches on traditional search engines, dominated by Google, declined 3 percent last year, and the number of searches per searcher declined 7 percent. Yet searches on specialty sites, known as vertical search engines, like Amazon.com or Whitepages.com, climbed 8 percent.

Social search, based on what users’ friends like, has put Facebook and Google on a “collision course,” comScore said, particularly in searches for local businesses like restaurants.

In social networking, the visual Web, as comScore calls it, has transformed the landscape. Pinterest, Tumblr and Instagram, all of which emphasize images, each gained more than 10 million visitors last year.

Last year was also pivotal for online video, comScore said, as viewers increasingly seek the ability to watch video when and where they want. Watching TV shows online helped last year break viewing records, especially during the Olympics.

In the United States, 75 million people a day watch online video and stream 40 billion videos a month, and viewing is driven by YouTube.

There has also been a turning point for video ads. They cost more than typical ads, and have always lagged behind viewership. But in 2012, 23 percent of videos were accompanied by an ad, up from 14 percent the year before. More TV ad dollars are coming to online video, comScore concluded.

Though e-commerce spending grew 13 percent last year, it was a disappointing holiday season online, largely because of economic pressures. Purchasing on mobile phones is beginning to make a dent in e-commerce, comScore said, with mobile shopping accounting for 11 percent of e-commerce in the fourth quarter of 2012, up from 3 percent in the period two years earlier.

Read More..

Disruptions: Disruptions: 3-D Printing Is on the Fast Track

Will the future be printed in 3-D?

At first glance, looking at past predictions about the future of technology, prognosticators got a whole lot wrong. The Web is a garbage dump of inaccurate guesses about the year 2000, 2010 and beyond. Flying cars, robotic maids and jet packs still are nowhere near a reality.

Yet the prediction that 3-D printers will become a part of our daily lives is happening much sooner than anyone anticipated. These printers can produce objects, even rather intricate ones, by printing thin layer after layer of plastic, metal, ceramics or other materials. And the products they make can be highly customized.

Last week, President Obama cited this nascent technology during his State of the Union address — as if everyone already knew what the technology was.

He expressed hope that it was a way to rejuvenate American manufacturing. “A once-shuttered warehouse is now a state-of-the art lab where new workers are mastering the 3-D printing that has the potential to revolutionize the way we make almost everything,” Mr. Obama said. He has pushed new technologies before, like solar and wind power, as remedies for our nation’s problems, and those attempts have only revived the debate about the limitations of government industrial policy.

But this one shows more promise. The question is, can the United States get a foothold in manufacturing one 3-D printer at a time?

Hod Lipson, an associate professor and the director of the Creative Machines Lab at Cornell, said “3-D printing is worming its way into almost every industry, from entertainment, to food, to bio- and medical-applications.”

It won’t necessarily directly create manufacturing jobs, except perhaps for the printers themselves. Dr. Lipson, the co-author of “Fabricated: The New World of 3D Printing,” said that the technology “is not going to simply replace existing manufacturing anytime soon.” But he said he believed that it would give rise to new businesses. “The bigger opportunity in the U.S. is that it opens and creates new business models that are based on this idea of customization.”

In addition to the lab that the president mentioned, a federally financed manufacturing innovation institute in Youngstown, Ohio, schools are embracing the technology. The University of Virginia has been working to introduce 3-D printers into some programs from kindergarten through 12th grade in Charlottesville to prepare students for a new future in manufacturing.

“We have 3-D printers in classrooms, and in one example, we’re teaching kids how to design and print catapults that they then analyze for efficiency,” said Glen L. Bull, professor and co-director of the Center for Technology and Teacher Education. “We believe that every school in America could have a 3-D printer in the classroom in the next few years.”

The education system may want to speed things up. The time between predictions for 3-D printers and the reality of what they can accomplish is compressing rapidly.

For example, in 2010, researchers at the University of Southern California said that another decade would pass before we could build a home using a 3-D printer. Yet last week, Softkill Design, a London architecture collective, announced that it planned to make the first such home — which it will assemble in a single day — later this year. The home isn’t that pretty, and will look more like a calcified spider web than a cozy house, but it will show it can be done. The price of 3-D printers has also dropped sharply over the last two years, with machines that once cost $20,000, now at $1,000 or less. That’s partly because Chinese companies are driving down prices. Yes, China sees the opportunity in these things, even though the technology may undermine some of its manufacturing advantages.

“When it costs you the same amount of manufacturing effort to make advanced robotic parts as it does to manufacture a paperweight, that really changes things in a profound way,” Dr. Lipson said.

This leaves us with one more question about the future: When will these 3-D printers be able to make us flying cars, robotic maids and jet packs?

E-mail: bilton@nytimes.com

Read More..

Bits Blog: Facebook Says Hackers Breached Its Computers

Facebook admitted that it was breached by sophisticated hackers in recent weeks, two weeks after Twitter made a similar admission. Both Facebook and Twitter were breached through a well-publicized vulnerability in Oracle’s Java software.

In a blog post late Friday afternoon, Facebook said it was attacked when a handful of its employees visited a compromised site for mobile developers. Simply by visiting the site, their computers were infected with malware. The company said that as soon as it discovered the malware, it cleaned up the infected machines and tipped off law enforcement.

“We have found no evidence that Facebook user data was compromised,” Facebook said.

On Feb. 1, Twitter said hackers had breached its systems and potentially accessed the data of 250,000 Twitter users. The company suggested at that time that it was one of several companies and organizations to be have been similarly attacked.

Facebook has known about its own breach for at least a month, according to people close to the investigation, but it was unclear why the company waited this long to announce it. Fred Wolens, a Facebook spokesman, declined to comment.

Like Twitter, Facebook said it believed that it was one of several organizations that were targeted by the same group of attackers.

“Facebook was not alone in this attack,” the company said in its blog post. “It is clear that others were attacked and infiltrated recently as well.”

The attacks add to the mounting evidence that hackers were able to use the security hole in Oracle’s Java software to steal information from a broad range of companies. Java, a widely used programming language, is installed on more than three billion devices. It has long been hounded by security problems.

Last month, after a security researcher exposed a serious vulnerability in the software, the Department of Homeland Security issued a rare alert that warned users to disable Java on their computers. The vulnerability was particularly disconcerting because it let attackers download a malicious program onto its victims’ machines without any prompting. Users did not even have to click on a malicious link for their computers to be infected. The program simply downloaded itself.

After Oracle initially patched the security hole in January, the Department of Homeland Security said that the fix was not sufficient and recommended that, unless “absolutely necessary”, users should disable it on their computers completely. Oracle did not issue another fix until Feb. 1.

Social networks are a prime target for hackers, who look to use people’s personal data and social connections in what are known as “spearphishing” attacks. In this type of attack, a target is sent an e-mail, ostensibly from a connection, containing a malicious link or attachment. Once the link is clicked or attachment opened, attackers take control of a user’s computer. If the infected computer is inside a company’s system, the attackers are able to gain a foothold. In many cases, they then extract passwords and gain access to sensitive data.

Facebook said in its blog post that the updated patch addressed the vulnerability that allowed hackers to access its employees’ computers.

Hackers have been attacking organizations inside the United States at an alarming rate. The number of attacks reported by government agencies last year topped 48,500 — a ninefold jump from the 5,500 attacks reported in 2006, according to the Government Accountability Office.

In the last month alone, The New York Times, The Wall Street Journal and The Washington Post all confirmed that they were targets of sophisticated hackers. But security experts say that these attacks are just the tip of the iceberg.

A common saying among security experts is that there are now only two types of American companies: Those that have been hacked and those that don’t know they’ve been hacked.

Read More..

Bits Blog: Facebook Says Hackers Breached Its Computers

Facebook admitted that it was breached by sophisticated hackers in recent weeks, two weeks after Twitter made a similar admission. Both Facebook and Twitter were breached through a well-publicized vulnerability in Oracle’s Java software.

In a blog post late Friday afternoon, Facebook said it was attacked when a handful of its employees visited a compromised site for mobile developers. Simply by visiting the site, their computers were infected with malware. The company said that as soon as it discovered the malware, it cleaned up the infected machines and tipped off law enforcement.

“We have found no evidence that Facebook user data was compromised,” Facebook said.

On Feb. 1, Twitter said hackers had breached its systems and potentially accessed the data of 250,000 Twitter users. The company suggested at that time that it was one of several companies and organizations to be have been similarly attacked.

Facebook has known about its own breach for at least a month, according to people close to the investigation, but it was unclear why the company waited this long to announce it. Fred Wolens, a Facebook spokesman, declined to comment.

Like Twitter, Facebook said it believed that it was one of several organizations that were targeted by the same group of attackers.

“Facebook was not alone in this attack,” the company said in its blog post. “It is clear that others were attacked and infiltrated recently as well.”

The attacks add to the mounting evidence that hackers were able to use the security hole in Oracle’s Java software to steal information from a broad range of companies. Java, a widely used programming language, is installed on more than three billion devices. It has long been hounded by security problems.

Last month, after a security researcher exposed a serious vulnerability in the software, the Department of Homeland Security issued a rare alert that warned users to disable Java on their computers. The vulnerability was particularly disconcerting because it let attackers download a malicious program onto its victims’ machines without any prompting. Users did not even have to click on a malicious link for their computers to be infected. The program simply downloaded itself.

After Oracle initially patched the security hole in January, the Department of Homeland Security said that the fix was not sufficient and recommended that, unless “absolutely necessary”, users should disable it on their computers completely. Oracle did not issue another fix until Feb. 1.

Social networks are a prime target for hackers, who look to use people’s personal data and social connections in what are known as “spearphishing” attacks. In this type of attack, a target is sent an e-mail, ostensibly from a connection, containing a malicious link or attachment. Once the link is clicked or attachment opened, attackers take control of a user’s computer. If the infected computer is inside a company’s system, the attackers are able to gain a foothold. In many cases, they then extract passwords and gain access to sensitive data.

Facebook said in its blog post that the updated patch addressed the vulnerability that allowed hackers to access its employees’ computers.

Hackers have been attacking organizations inside the United States at an alarming rate. The number of attacks reported by government agencies last year topped 48,500 — a ninefold jump from the 5,500 attacks reported in 2006, according to the Government Accountability Office.

In the last month alone, The New York Times, The Wall Street Journal and The Washington Post all confirmed that they were targets of sophisticated hackers. But security experts say that these attacks are just the tip of the iceberg.

A common saying among security experts is that there are now only two types of American companies: Those that have been hacked and those that don’t know they’ve been hacked.

Read More..

Bits Blog: Former BlackBerry C.E.O. Sold All Company Shares

Jim Balsillie, the former co-chief executive and co-chairman of BlackBerry, has sold all of his shares in the struggling company, a regulatory filing indicated on Thursday.

Mr. Balsillie’s arrival at what was then called Research in Motion in 1992 and his personal investment of $125,000 saved the company in its early days. But Mr. Balsillie’s latest investment move means that he will not gain if the new line of BlackBerry 10 phones revive the company’s fortunes.

A filing with the Securities and Exchange Commission, dated Thursday, showed that Mr. Balsillie held no shares in the company as of the end of December. Mr. Balsillie owned up to 33 percent of the company, now called BlackBerry, before it became publicly traded and he reported holding 5.1 percent of its shares in a previous filing.

When asked about Mr. Balsillie’s pullout, Kris Thompson, a longtime BlackBerry analyst at National Bank Financial, replied: “Who cares?” BlackBerry’s shares initially slipped 7.5 percent to $12.94 in Nasdaq trading Thursday, but had recovered later in the morning.

Following a protracted and severe decline in BlackBerry’s stock price and American market share, Mr. Balsillie stepped down as both co-chief executive and co-chairman along with Mike Lazaridis in January 2012. While Mr. Lazaridis remains on the BlackBerry board as the company’s vice chairman, Mr. Balsillie resigned as a director in March.

A separate securities filing issued on Thursday indicated that Mr. Lazaridis, who co-founded the company, still holds 5.7 percent of BlackBerry’s stock.

Mr. Balsillie could not immediately be reached for comment. Adam Emery, a spokesman for BlackBerry, said the company does not “comment on holdings of individual shareholders.”

Earlier this week Mr. Thompson, the analyst, issued a report that praised many of the features on the new BlackBerry 10 phones but concluded that they will not significantly rebuild the company’s market share. He cited an impending wave of new products from larger competitors and the general lack of desirable and high quality apps for BlackBerry 10.

While Mr. Lazaridis handled the technology side of the company, Mr. Balsillie, an accountant, is widely credited with putting BlackBerry on the stable financial footing that ultimately allowed it to develop the BlackBerry device. He also played a pivotal role in convincing skeptical wireless carriers to carry the company’s first wireless e-mail devices on their networks.

Both men, however, were widely criticized for not responding more effectively and swiftly to the arrival of Apple’s iPhone and phones using Google’s Android operating system. Those smartphones now overwhelmingly dominate a market that BlackBerry created and was once leading.

At various times, Mr. Balsillie and Mr. Lazaridis have sold substantial stakes in BlackBerry to fund educational institutions in Waterloo, Ontario, the company’s hometown.

Read More..

Bits Blog: Apple Chief Hints at Shareholder Rewards to Come

Investors want more cash from Apple.

Timothy D. Cook, Apple’s chief executive, wasn’t ready to give it to them on Tuesday. But recent history and Mr. Cook’s tendency to foreshadow events before they occur strongly suggest he will reward them soon.

Speaking for the second consecutive year in at a Goldman Sachs technology investor conference, Mr. Cook said Apple’s management team and board were discussing how to return more of the company’s enormous stockpile of cash to shareholders.

If those words sound familiar, it’s because Mr. Cook said almost the same thing a year ago at the Goldman Sachs conference. A month later, the company announced a plan to return more than $45 billion to shareholders over three years in the form of dividends and share repurchases.

That plan only served to slow the swelling of Apple’s cash hoard, not to reduce it. Last year around this time, Apple had nearly $100 billion in cash. Now it has around $137 billion.

“We do have some cash,” Mr. Cook said at the Goldman conference on Tuesday, in a moment of deliberate understatement that set off chuckles from his audience.

Some investors — like the hedge-fund manager David Einhorn — are cranky that Apple’s cash is sitting around earning so little interest.

Mr. Cook said Apple had looked at making some big acquisitions but never seriously enough to follow through on the deals. With its cash, Apple could afford one Amazon or two Facebooks and still have billions in spare change.

Instead, Apple buys smaller companies, mostly for their talent or intellectual property, Mr. Cook said. He said Apple has averaged about one acquisition every other month for the last three years.

How to send more cash to shareholders is the tricky part. Much of Apple’s cash is generated overseas and can’t be paid out to shareholders without being subject to repatriation taxes. In a recent research note, Toni Sacconaghi, an analyst at Bernstein Research, said  Apple could not meaningfully increase its return of cash to shareholders without paying the taxes or issuing debt.

While the latter option sounds nonsensical for a company with as much cash in the bank as Apple, a number of cash-rich technology companies, including Microsoft and Cisco, have issued debt, taking advantage of low interest rates. Mr. Sacconaghi suggested that the most attractive option for Apple shareholders would be for the company to borrow money, perhaps in the range of $50 billion to $100 billion, and use it to buy back stock or increase the dividend. He said increasing the return of cash was critical for Apple to attract a new class of dividend-hungry value investors as the company’s growth slows. Apple’s shares have declined about 33 percent since their high in September.

Mr. Cook called a lawsuit filed against the company by Mr. Einhorn, president of Greenlight Capital, a “silly sideshow.”

Mr. Einhorn has claimed that a change Apple is proposing to make to its corporate charter would limit the option of returning more cash to shareholders through the issuing of preferred stock. Apple has said that even with the charter change, it could issue preferred stock with shareholder approval.

Mr. Cook danced around the rumors that Apple would create an inexpensive iPhone for emerging markets, where income levels and a lack of subsidies by wireless carriers have put the company’s smartphone out of reach for many consumers. But he noted Apple’s history of coming up with creative new products, like the iPod shuffle and the iPad Mini, that appeal to budget-minded shoppers.

“The only thing we’ll never do is make a crappy product,” he said. “That’s the only religion we have.”

Read More..

Tech Companies and Immigrant Advocates Press for Broad Changes in Law





SAN FRANCISCO — What do computer programmers and illegal immigrants have to do with each other?




When it comes to the sweeping overhaul of the nation’s immigration laws that Congress is considering this year, the answer is everything.


Silicon Valley executives, who have long pressed the government to provide more visas for foreign-born math and science brains, are joining forces with an array of immigration groups seeking comprehensive changes in the law. And as momentum builds in Washington for a broad revamping, the tech industry has more hope than ever that it will finally achieve its goal: the expanded access to visas that it says is critical to its own continued growth and that of the economy as a whole.


Signs of the industry’s stepped-up engagement on the issue are visible everywhere. Prominent executives met with President Obama last week. Start-up founders who rarely abandon their computers have flown across the country to meet with lawmakers.


This Tuesday, the Technology CEO Council, an advocacy organization representing companies like Dell, Intel and Motorola, had meetings on Capitol Hill. On Wednesday, Steve Case, a founder of AOL, is scheduled to testify at the first Senate hearing this year on immigration legislation, alongside the head of the deportation agents’ union and the leader of a Latino civil rights group.


“The odds of high-skilled passing without comprehensive is close to zero, and the odds of comprehensive passing without high-skilled passing is close to zero,” said Robert D. Atkinson, president of the Information Technology and Innovation Foundation, a nonpartisan research group based in Washington.


The push comes as a clutch of powerful Senate Republicans and Democrats have reached a long-elusive agreement on some basic principles of a “comprehensive” revamping of immigration law. Separately, a bipartisan bill introduced in the Senate in late January focuses directly on the visa issue.


The industry’s argument for more so-called high-skilled visas has already persuaded the president.


“Real reform means fixing the legal immigration system to cut waiting periods, reduce bureaucracy, and attract the highly-skilled entrepreneurs and engineers that will help create jobs and grow our economy,” Mr. Obama said in Tuesday’s State of the Union speech.


In a speech in Las Vegas in January in which he introduced his own blueprint for overhauling immigration law, Mr. Obama embraced the idea that granting more visas was essential to maintaining innovation and job growth. He talked about foreigners studying at American universities, figuring out how to turn their ideas into businesses.


In part, the new alliance between the tech industry and immigration groups was born out of the 2012 elections and the rising influence of Hispanic voters.


“The world has changed since the election,” said Peter J. Muller, director of government relations at Intel, pointing out that the defeat of many Republican candidates had led to a softening of the party’s position on broad changes to immigration law. “There is a focus on comprehensive. We’re thrilled by it.”


“At this point,” he added, “our best hope for immigration reform lies with comprehensive reform.”


Mr. Case, the AOL co-founder, who now runs an investment fund, echoed that sentiment after meeting with the president last Tuesday.


“I look forward to doing whatever I can to help pass comprehensive immigration reform in the months ahead,” he said, “and ensure it includes strong provisions regarding high-skilled immigration, so we are positioned to win the global battle for talent.”


That sort of sentiment delights immigrants’ rights advocates who have banged their heads against the wall for years to rally a majority of Congress around their agenda.


“The stars are aligning here,” said Ali Noorani, executive director of the National Immigration Forum. “You’ve got the politics of immigration reform changing. You’ve got tech leaders leaning in not just for high-skilled but for broader immigration reform.”


Senator Orrin G. Hatch, Republican of Utah, who is co-sponsoring the bill to increase the number of visas available for highly skilled immigrants, said the cooperation went both ways.


“All the talk about the STEM field — science, technology, engineering, mathematics — has awakened even those who aren’t all that interested in the high-tech world,” he said.


While the growing momentum has surprised many in Washington, comprehensive change is still not a sure thing, especially in the Republican-controlled House.


Mr. Hatch said he would push forward with his measure even if the broader efforts foundered. But his Democratic co-sponsor, Amy Klobuchar of Minnesota, said she would press for the bill to be part of the comprehensive package.


Last year, technology executives had a taste of what could happen with stand-alone legislation.


Julia Preston contributed reporting from New York.



This article has been revised to reflect the following correction:

Correction: February 13, 2013

An earlier version of this article misstated the current basic annual cap for H-1B visas. It is 65,000 a year, not 60,000.




Read More..

DealBook Column: Relationship Science Plans Database of Names and Connections

It sounds like a Rolodex for the 1 percent: two million deal makers, power brokers and business executives — not only their names, but in many cases the names of their spouses and children and associates, their political donations, their charity work and more — all at a banker’s fingertips.

Such is the promise of a new company called Relationship Science.

Never heard of it? Until recently, neither had I. But a few months ago, whispers began that this young company was assembling a vast trove of information about big names in corporate America. What really piqued my interest was that bankrolling this start-up were some Wall Street heavyweights, including Henry R. Kravis, Ronald O. Perelman, Kenneth G. Langone, Joseph R. Perella, Stanley F. Druckenmiller and Andrew Tisch.

It turns out that over the last two years, with a staff of more than 800 people, mostly in India, Relationship Science has been quietly building what it hopes will be the ultimate business Who’s Who. If it succeeds, it could radically change the way Wall Street does business.

That’s a big if, of course. There are plenty of other databases out there. And there’s always Google. Normally I wouldn’t write about a technology company, but I kept hearing chatter about it from people on Wall Street.

Then I got a glimpse of this new system. Forget six degrees of Kevin Bacon. This is six degrees of Henry Kravis.

Here’s how it works: Let’s say a banker wants to get in touch with Mr. Kravis, the private equity deal maker, but doesn’t know him personally. The banker can type Mr. Kravis’s name into a Relationship Science search bar, and the system will scan personal contacts for people the banker knows who also know Mr. Kravis, or perhaps secondary or tertiary connections.

The system shows how the searcher is connected — perhaps a friend, or a friend of a friend, is on a charitable board — and also grades the quality of those connections by identifying them as “strong,” “average” or “weak.” You will be surprised at the many ways the database finds connections.

The major innovation is that, unlike Facebook or LinkedIn, it doesn’t matter if people have signed up for the service. Many business leaders aren’t on Facebook or LinkedIn, but Relationship Science doesn’t rely on user-generated content. It just scrapes the Web.

Relationship Science is the brainchild of Neal Goldman, a co-founder of CapitalIQ, a financial database service that is used by many Wall Street firms. Mr. Goldman sold CapitalIQ, which has 4,200 clients worldwide, to McGraw-Hill in 2004 for more than $200 million. That may explain why he was able to easily round up about $60 million in funds for Relationship Science from many boldface names in finance. He raised the first $6 million in three days.

“I knew there had to be a better way,” Mr. Goldman said about the way people search out others. Most people use Google to learn about people and ask friends and colleagues if they or someone they know can provide an introduction.

Relationship Science essentially does this automatically. It will even show you every connection you have to a specific company or organization.

“We live in a service economy,” Mr. Goldman said. “Building relationships is the most important part for selling and growing.”

Kenneth Langone, a financier and co-founder in Home Depot, said that when he saw a demonstration of the system he nearly fell off his chair. He used an unprintable four-letter word.

“My life is all about networking,” said Mr. Langone, who was so enthusiastic he became an investor and recently joined the board of Relationship Science. “How many times do I say, ‘How do I get to this guy?’ It is scary how much it helps.”

Mr. Goldman’s version of networking isn’t for everyone. His company charges $3,000 a year for a person to have access to the site. (That might sound expensive, but by Wall Street standards, it’s not.)

Price aside, the possibility that this system could lead to a deal or to a new wealth management client means it just might pay for itself.

“If you get one extra deal, the price is irrelevant,” Mr. Goldman said.

Apparently, his sales pitch is working. Already, some big financial firms have signed up for the service, which is still in a test phase. Investment bankers, wealth managers, private equity and venture capital investors have been trying to arrange meetings to see it, egged on, no doubt, by many of Mr. Goldman’s well-heeled investors. Even some development offices of charities have taken an interest.

The system I had a peek at was still a bit buggy. In some cases, it was missing information; in other cases the information was outdated. In still other instances, the program missed connections. For example, it didn’t seem to notice that Lloyd C. Blankfein, the chief executive of Goldman Sachs, should obviously know a certain senior partner at Goldman.

But the promise is there, if the initial kinks are worked out. I discovered I had paths I never knew existed to certain people or companies. (Mr. Goldman should market his product to reporters, too.)

One of the most vexing and perhaps unusual choices Mr. Goldman seems to have made with Relationship Science is to omit what would be truly valuable information: phone numbers and e-mail addresses.

Mr. Goldman explained the decision. “This isn’t about spamming people.” He said supplying phone numbers wouldn’t offer any value because people don’t like being cold-called, which he said was the antithesis of the purpose of his database.

Ultimately, he said, as valuable as the technology can be in discovering the path to a relationship, an artful introduction is what really counts.

“We bring the science,” he said. “You bring the art.”


This post has been revised to reflect the following correction:

Correction: February 12, 2013

An earlier version of this column misspelled the surname of one of the backers of Relationship Science. He is Ron O. Perelman, not Pearlman.

A version of this article appeared in print on 02/12/2013, on page B1 of the NewYork edition with the headline: A Database Of Names, And How They Connect.
Read More..

DealBook: British Regulators to Investigate Accounting at Autonomy

LONDON – British accounting regulators said on Monday that they would investigate the financial reporting at the British software maker Autonomy before its $11.1 billion acquisition by Hewlett-Packard in 2011.

The announcement comes after accusations from H.P. that Autonomy inflated its sales and carried out improper accounting practices that misled the American technology giant ahead of the multibillion-dollar takeover.

In November, H.P. took a charge of $8.8 billion after it wrote down the acquisition of Autonomy. The figure included around $5 billion related to what H.P. called accounting and disclosure abuses at Autonomy.

Investigations by American authorities, including the Justice Department, are under way. The Financial Reporting Council, the British accounting watchdog, said on Wednesday that it would also examine Autonomy’s financial accounts from the beginning of 2009 to the middle of 2011.

The investigation may take around a year to reach disciplinary proceedings if wrongdoing is discovered, according to a spokeswoman for the council.

Mike Lynch, the founder of Autonomy who has denied the charges of accounting misconduct leveled by H.P., said he welcomed the investigation by British regulators.

“We are fully confident in the financial reporting of the company and look forward to the opportunity to demonstrate this to the F.R.C.,” he said in a statement on behalf of the former management team of Autonomy.

Read More..