Wednesday, December 22, 2010

Your Phones Are Transmitting Very Personal Data Out There

Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off.



WSJ's Julia Angwin explains to Simon Constable how smartphone apps collect and broadcast data about your habits. Many don't have privacy policies and there isn't much you can do about it.

These phones don't keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found.

An examination of 101 popular smartphone "apps"—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders.

The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them.

Among the apps tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.'s Android operating system. Because of the test's size, it's not known if the pattern holds among the hundreds of thousands of apps available.

Apps sharing the most information included TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique ID number to eight ad companies and the phone's zip code, along with the user's age and gender, to two of them.

Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss—players try to throw paper wads into a trash can—each sent the phone's ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies.
"In the world of mobile, there is no anonymity," says Michael Becker of the Mobile Marketing Association, an industry trade group. A cellphone is "always with us. It's always on."

iPhone maker Apple Inc. says it reviews each app before offering it to users. Both Apple and Google say they protect users by requiring apps to obtain permission before revealing certain kinds of information, such as location.

"We have created strong privacy protections for our customers, especially regarding location-based data," says Apple spokesman Tom Neumayr. "Privacy and trust are vitally important."
The Journal found that these rules can be skirted. One iPhone app, Pumpkin Maker (a pumpkin-carving game), transmits location to an ad network without asking permission. Apple declines to comment on whether the app violated its rules.

Smartphone users are all but powerless to limit the tracking. With few exceptions, app users can't "opt out" of phone tracking, as is possible, in limited form, on regular computers. On computers it is also possible to block or delete "cookies," which are tiny tracking files. These techniques generally don't work on cellphone apps.
The makers of TextPlus 4, Pandora and Grindr say the data they pass on to outside firms isn't linked to an individual's name. Personal details such as age and gender are volunteered by users, they say. The maker of Pumpkin Maker says he didn't know Apple required apps to seek user approval before transmitting location. The maker of Paper Toss didn't respond to requests for comment.

Many apps don't offer even a basic form of consumer protection: written privacy policies. Forty-five of the 101 apps didn't provide privacy policies on their websites or inside the apps at the time of testing. Neither Apple nor Google requires app privacy policies.

To expose the information being shared by smartphone apps, the Journal designed a system to intercept and record the data they transmit, then decoded the data stream. The research covered 50 iPhone apps and 50 on phones using Google's Android operating system. (Methodology available here.)

The Journal also tested its own iPhone app; it didn't send information to outsiders. The Journal doesn't have an Android phone app.

Among all apps tested, the most widely shared detail was the unique ID number assigned to every phone. It is effectively a "supercookie," says Vishal Gurbuxani, co-founder of Mobclix Inc., an exchange for mobile advertisers.

On iPhones, this number is the "UDID," or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can't be blocked or deleted.

"The great thing about mobile is you can't clear a UDID like you can a cookie," says Meghan O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. "That's how we track everything."

Ms. O'Holleran says Traffic Marketplace, a unit of Epic Media Group, monitors smartphone users whenever it can. "We watch what apps you download, how frequently you use them, how much time you spend on them, how deep into the app you go," she says. She says the data is aggregated and not linked to an individual.
The main companies setting ground rules for app data-gathering have big stakes in the ad business. The two most popular platforms for new U.S. smartphones are Apple's iPhone and Google's Android. Google and Apple also run the two biggest services, by revenue, for putting ads on mobile phones.

Apple and Google ad networks let advertisers target groups of users. Both companies say they don't track individuals based on the way they use apps.

Apple limits what can be installed on an iPhone by requiring iPhone apps to be offered exclusively through its App Store. Apple reviews those apps for function, offensiveness and other criteria.

Apple says iPhone apps "cannot transmit data about a user without obtaining the user's prior permission and providing the user with access to information about how and where the data will be used." Many apps tested by the Journal appeared to violate that rule, by sending a user's location to ad networks, without informing users. Apple declines to discuss how it interprets or enforces the policy.

Phones running Google's Android operating system are made by companies including Motorola Inc. and Samsung Electronics Co. Google doesn't review the apps, which can be downloaded from many vendors. Google says app makers "bear the responsibility for how they handle user information."

Google requires Android apps to notify users, before they download the app, of the data sources the app intends to access. Possible sources include the phone's camera, memory, contact list, and more than 100 others. If users don't like what a particular app wants to access, they can choose not to install the app, Google says.

"Our focus is making sure that users have control over what apps they install, and notice of what information the app accesses," a Google spokesman says.

Neither Apple nor Google requires apps to ask permission to access some forms of the device ID, or to send it to outsiders. When smartphone users let an app see their location, apps generally don't disclose if they will pass the location to ad companies.

Lack of standard practices means different companies treat the same information differently. For example, Apple says that, internally, it treats the iPhone's UDID as "personally identifiable information." That's because, Apple says, it can be combined with other personal details about people—such as names or email addresses—that Apple has via the App Store or its iTunes music services. By contrast, Google and most app makers don't consider device IDs to be identifying information.

Illustration by Ray Bartkus for The Wall Street Journal
 
A growing industry is assembling this data into profiles of cellphone users. Mobclix, the ad exchange, matches more than 25 ad networks with some 15,000 apps seeking advertisers. The Palo Alto, Calif., company collects phone IDs, encodes them (to obscure the number), and assigns them to interest categories based on what apps people download and how much time they spend using an app, among other factors.
By tracking a phone's location, Mobclix also makes a "best guess" of where a person lives, says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with spending and demographic data from Nielsen Co.

In roughly a quarter-second, Mobclix can place a user in one of 150 "segments" it offers to advertisers, from "green enthusiasts" to "soccer moms." For example, "die hard gamers" are 15-to-25-year-old males with more than 20 apps on their phones who use an app for more than 20 minutes at a time.

Mobclix says its system is powerful, but that its categories are broad enough to not identify individuals. "It's about how you track people better," Mr. Gurbuxani says.

Some app makers have made changes in response to the findings. At least four app makers posted privacy policies after being contacted by the Journal, including Rovio Mobile Ltd., the Finnish company behind the popular game Angry Birds (in which birds battle egg-snatching pigs). A spokesman says Rovio had been working on the policy, and the Journal inquiry made it a good time to unveil it.

Free and paid versions of Angry Birds were tested on an iPhone. The apps sent the phone's UDID and location to the Chillingo unit of Electronic Arts Inc., which markets the games. Chillingo says it doesn't use the information for advertising and doesn't share it with outsiders.

Apps have been around for years, but burst into prominence when Apple opened its App Store in July 2008. Today, the App Store boasts more than 300,000 programs.

Other phone makers, including BlackBerry maker Research in Motion Ltd. and Nokia Corp., quickly built their own app stores. Google's Android Market, which opened later in 2008, has more than 100,000 apps. Market researcher Gartner Inc. estimates that world-wide app sales this year will total $6.7 billion.

Many developers offer apps for free, hoping to profit by selling ads inside the app. Noah Elkin of market researcher eMarketer says some people "are willing to tolerate advertising in apps to get something for free." Of the 101 apps tested, the paid apps generally sent less data to outsiders.

Ad sales on phones account for less than 5% of the $23 billion in annual Internet advertising. But spending on mobile ads is growing faster than the market overall.

Central to this growth: the ad networks whose business is connecting advertisers with apps. Many ad networks offer software "kits" that automatically insert ads into an app. The kits also track where users spend time inside the app.

Some developers feel pressure to release more data about people. Max Binshtok, creator of the DailyHoroscope Android app, says ad-network executives encouraged him to transmit users' locations.
Mr. Binshtok says he declined because of privacy concerns. But ads targeted by location bring in two to five times as much money as untargeted ads, Mr. Binshtok says. "We are losing a lot of revenue."

Other apps transmitted more data. The Android app for social-network site MySpace sent age and gender, along with a device ID, to Millennial Media, a big ad network.

In its software-kit instructions, Millennial Media lists 11 types of information about people that developers may transmit to "help Millennial provide more relevant ads." They include age, gender, income, ethnicity, sexual orientation and political views. In a re-test with a more complete profile, MySpace also sent a user's income, ethnicity and parental status.

A spokesman says MySpace discloses in its privacy policy that it will share details from user profiles to help advertisers provide "more relevant ads." My Space is a unit of News Corp., which publishes the Journal. Millennial did not respond to requests for comment on its software kit.

App makers transmitting data say it is anonymous to the outside firms that receive it. "There is no real-life I.D. here," says Joel Simkhai, CEO of Nearby Buddy Finder LLC, the maker of the Grindr app for gay men. "Because we are not tying [the information] to a name, I don't see an area of concern."

Scott Lahman, CEO of TextPlus 4 developer Gogii Inc., says his company "is dedicated to the privacy of our users. We do not share personally identifiable information or message content." A Pandora spokeswoman says, "We use listener data in accordance with our privacy policy," which discusses the app's data use, to deliver relevant advertising. When a user registers for the first time, the app asks for email address, gender, birth year and ZIP code.

Google was the biggest data recipient in the tests. Its AdMob, AdSense, Analytics and DoubleClick units collectively heard from 38 of the 101 apps. Google, whose ad units operate on both iPhones and Android phones, says it doesn't mix data received by these units.

Google's main mobile-ad network is AdMob, which it bought this year for $750 million. AdMob lets advertisers target phone users by location, type of device and "demographic data," including gender or age group.

A Google spokesman says AdMob targets ads based on what it knows about the types of people who use an app, phone location, and profile information a user has submitted to the app. "No profile of the user, their device, where they've been or what apps they've downloaded, is created or stored," he says.
Apple operates its iAd network only on the iPhone. Eighteen of the 51 iPhone apps sent information to Apple.

Apple targets ads to phone users based largely on what it knows about them through its App Store and iTunes music service. The targeting criteria can include the types of songs, videos and apps a person downloads, according to an Apple ad presentation reviewed by the Journal. The presentation named 103 targeting categories, including: karaoke, Christian/gospel music, anime, business news, health apps, games and horror movies.

People familiar with iAd say Apple doesn't track what users do inside apps and offers advertisers broad categories of people, not specific individuals.

Apple has signaled that it has ideas for targeting people more closely. In a patent application filed this past May, Apple outlined a system for placing and pricing ads based on a person's "web history or search history" and "the contents of a media library." For example, home-improvement advertisers might pay more to reach a person who downloaded do-it-yourself TV shows, the document says.

The patent application also lists another possible way to target people with ads: the contents of a friend's media library.

How would Apple learn who a cellphone user's friends are, and what kinds of media they prefer? The patent says Apple could tap "known connections on one or more social-networking websites" or "publicly available information or private databases describing purchasing decisions, brand preferences," and other data. In September, Apple introduced a social-networking service within iTunes, called Ping, that lets users share music preferences with friends. Apple declined to comment.

Tech companies file patents on blue-sky concepts all the time, and it isn't clear whether Apple will follow through on these ideas. If it did, it would be an evolution for Chief Executive Steve Jobs, who has spoken out against intrusive tracking. At a tech conference in June, he complained about apps "that want to take a lot of your personal data and suck it up."

—Tom McGinty and Jennifer Valentino-DeVries contributed to this report. Write to Scott Thurm at scott.thurm@wsj.com and Yukari Iwatani Kane at yukari.iwatani@wsj.com

Monday, December 6, 2010

Why is (Wired) Broadband So Expensive In Malaysia?

One way to measure the effectiveness of our broadband (BB) connection in Malaysia is throughput and effective speed. There's also a question of reliability and how fast our ISP responds to downtime. But let's assume that TM Net and Malaysian ISP's for the most part are excelling in customer service and achieving 100% up-time and let's look at the effectiveness of our BB viz a viz the average throughput (Mega bits per second) achieved by users.

Speedtest .Net ranks countries BB connections on their website, and in their Upload Speed category:

#01 South Korea 35.85Mbps
#18 Singapore 14.05Mbps
#49 Vietnam 6.89Mbps
#57 Thailand 5.39Mbps
#96 Malaysia 2.61Mbps

Ok so the bad news is we're only the 96th fastest BB connection in the world.

On the Cheapest BB Connection In The World, here's what I found [US$/Mbps/mth]:

10 Netherlands $3.66 @ an average speed of 20.70Mbps
11 Sweden $3.93 @ 22.69
12 UK $3.93 @9.60
13 Denmark $3.96 @15.79
14 Germany $4.18 @15.97
15 Russia $4.20 @10.44
16 Switzerland $4.43 @16.35
17 Finland $4.90 @13.86
18 Belgium $5.16 @12.85
19 Austria $5.45 @9.00
20 USA $6.12 @9.98
21 Canada $6.58 @9.24

Malaysia's not listed. I did some research and came up with a comparison of the Cheapest Broadband (Wired) Connections in South East Asia:
  • Singapore $0.95 (Starhub 100Mbps UL)
  • Malaysia $3.95 (Unifi 20Mbps UL)
  • Thailand $9.00 (3BB and TOT 4Mbps UL)

So comparatively, I guess we're doing averagely well in terms of cost. But are current BB costs in Malaysia reasonable? A typical Malaysian TM Net / Streamyx user pays about:
  • US$12.70/Mbps/mth (Streamyx 4Mbps) or
  • US$20.97/Mbps/mth (Streamyx 1Mbps) - which is the more usual package subscribed, really.

So let's look at the numbers, i.e. how much people are paying for 1 Mbps of BB connection...?

In North America, they pay an average of  $6.30/9.6Mbps or 66-cents per Mbps. And in most parts of Europe (taking an average of the 10th to 18th fastest BB connections), they pay $4.41/6.1Mbps or 27-cents per Mbps.

Wait a minute! In the world's more affluent countries - where labour is very expensive - they're paying almost 50 times less what we're paying for in Malaysia. And achieving such high BB speeds.

So the question that begs to be asked is why is Broadband / Streamyx so expensive in Malaysia?

Thursday, December 2, 2010

Everything You Do Online Or Via Your Mobile Phones Etc Are Being Logged By Behavioural Targeting

Don't like anyone finding out what mobile phone you use, what you do with your mobile phone, or what websites you go to or what you buy online?

Online advertisers are now using the cookies in your Internet browser (IE, Firefox, Chrome, Opera, etc.) and soon all your mobile devices like your mobile phone, smartphone, Black Berry, etc. to study everything you do online. Protect your privacy by opting-out of what some people call "Behavioural Targeting" as soon as possible!

Go to http://www.networkadvertising.org/managing/opt_out.asp and http://www.aboutads.info immediately!!

This month, Chip Malaysia (http://www.chip.com.my/mag/) exposes this breach of our right to privacy in an illuminating article "You Are Being Watched". Today's Asian Wall Street Journal (http://online.wsj.com/article/SB40001424052748704679204575646704100959546.html) extensively cover this topic (read below):

New online tracking frontier: 'fingerprinting' phones, PCs

Collecting digital identifiers is emerging as latest tool for companies who sell the information to advertisers
   
By JULIA ANGWIN And JENNIFER VALENTINO-DEVRIES

Irvine, Calif.

David Norris wants to collect the digital equivalent of fingerprints from every computer, cellphone and TV set-top box in the world.

He's off to a good start. So far, Mr. Norris's start-up company, BlueCava Inc., has identified 200 million devices. By the end of next year, BlueCava says it expects to have cataloged one billion of the world's estimated 10 billion devices.

Advertisers no longer want to just buy ads. They want to buy access to specific people. So, Mr. Norris is building a "credit bureau for devices" in which every computer or cellphone will have a "reputation" based on its user's online behavior, shopping habits and demographics. He plans to sell this information to advertisers willing to pay top dollar for granular data about people's interests and activities.

Device fingerprinting is a powerful emerging tool in this trade. It's "the next generation of online advertising," Mr. Norris says.

It might seem that one computer is pretty much like any other. Far from it: Each has a different clock setting, different fonts, different software and many other characteristics that make it unique.  Every time a typical computer goes online, it broadcasts hundreds of such details as a calling card to other computers it communicates with. Tracking companies can use this data to uniquely identify computers, cellphones and other devices, and then build profiles of the people who use them.

Until recently, fingerprinting was used mainly to prevent illegal copying of computer software or to thwart credit-card fraud. BlueCava's own fingerprinting technology traces its unlikely roots to an inventor who, in the early 1990s, wanted to protect the software he used to program music keyboards for the Australian pop band INXS.

Tracking companies are now embracing fingerprinting partly because it is much tougher to block than other common tools used to monitor people online, such as browser "cookies," tiny text files on a computer that can be deleted.

As controversy grows over intrusive online tracking, regulators are looking to rein it in. This week, the U.S. Federal Trade Commission is expected to release a privacy report calling for a "do-not-track" tool for Web browsers.

Ad companies are constantly looking for new techniques to heighten their surveillance of Internet users.

Deep packet inspection, a potentially intrusive method for peering closely into the digital traffic that moves between people's computers and the broader Internet, is being tested in the U.S. and Brazil as a future means to deliver targeted advertising.

Akamai Technologies Inc., an Internet-infrastructure giant that says it delivers 15% to 30% of all Web traffic, is marketing a technique to track people's online movements in more detail than traditional tools easily can.

It's tough even for sophisticated Web surfers to tell if their gear is being fingerprinted. Even if people modify their machines—adding or deleting fonts, or updating software—fingerprinters often can still recognize them. There's not yet a way for people to delete fingerprints that have been collected. In short, fingerprinting is largely invisible, tough to fend off and semi-permanent.

Device fingerprinting is legal. U.S. Rep. Bobby Rush (D.,Ill.), proposed legislation in July that would require companies that use persistent identifiers, such as device fingerprints, to let people opt out of being tracked online.

Fingerprinting companies are racing to meet the $23 billion U.S. online-ad industry's appetite for detailed consumer behavior. Previously, the companies focused on using device fingerprints to prevent software theft or to identify computers making fraudulent transactions, in hopes of preventing future attempts.

Mr. Norris's firm, BlueCava, this year spun off from anti-piracy company Uniloc USA Inc. to start offering services to advertisers and others. One of the leading e-commerce fraud-prevention firms, 41st Parameter Inc., has begun testing its device-fingerprinting techniques with several online-ad companies. Another anti-fraud company, iovation Inc. of Portland, Ore., says it is exploring the use of device profiles to help websites customize their content.

BlueCava says the information it collects about devices can't be traced back to individuals and that it will offer people a way to opt out of being tracked.

Still, Mr. Norris says it's tough to figure out how to alert people their devices are being fingerprinted. "We don't have all the answers, but we're just going to try to be really clear" about how the data is used, he says.

Neither BlueCava nor 41st Parameter explicitly notified the people whose devices have been fingerprinted so far. Both companies say the data-gathering is disclosed in the privacy policies of the companies they work with. BlueCava says it doesn't collect personal information such as people's names. Its privacy policy says it gathers "just boring stuff that most people couldn't care less about."

Ori Eisen, founder of 41st Parameter, says using fingerprinting to track devices is "fair game" because websites automatically get the data anyway.

Some advertisers are enthusiastic about fingerprinting. Steel House Inc., a Los Angeles-based ad company, has been testing 41st Parameter's technology for three months on websites of its clients, which include Cooking.com Inc. and Toms Shoes Inc. (Clients weren't notified of the test, and fingerprints weren't used to display ads.)

In its examination of 70 million website visits, 41st Parameter found it could generate a fingerprint about 89% of the time. By comparison, Steel House was able to use cookies for tracking on only about 78% of visits, because some people blocked or deleted cookies.

"It's almost like a revolution," says Mark Douglas, founder and CEO of Steel House. "Our intent is that it can completely replace the use of cookies."

Steel House offers people a way to opt out of its current cookie-based ads and says it would do the same if it adopts fingerprints. "I definitely don't want to be in the sights of the privacy people," Mr. Douglas says.

Computers need to broadcast details about their configuration in order to interact smoothly with websites and with other computers. For example, computers announce which specific Web browsers they use, along with their screen resolution, to help websites display correctly.

There are hundreds of parameters. "We call them the 'toys on the table,'" says Mr. Norris of BlueCava. "Everyone has the same toys on the table. It's how you rearrange them or look at them that is the secret sauce" used to fingerprint a specific computer.

BlueCava's secret sauce hails from Sydney, Australia, in the early 1990s. Back then, inventor Ric Richardson was helping musicians including the band INXS to use new software for playing their electronic keyboards.

"They'd say what sound they wanted, and I'd do it," says Mr. Richardson, who today works out of a van parked near an Australia beach.

Mr. Richardson was frustrated when he tried to sell the music software, because there was no way to let people test it before buying. So he designed a "demonstration" version of the software that would let people test it, but not copy it.

His idea: Configure his software to work only after it was linked to a unique computer. So, he developed a way to catalog each computer's individual properties. He found many subtle variations, among even outwardly similar machines.

"It was amazing how different they were," he says. "There are literally hundreds of things you can measure."

In 1992, he borrowed $40,000 from his parents, filed a patent application for a "system for software registration" and founded a company, Uniloc Corp.

This year, Uniloc started trying to broaden its business away from software-piracy prevention. It recruited Mr. Norris, then running a company that provided photos for advertisers, to seek new uses for its technology. "What I saw was this different way of looking at things on the Web," Mr. Norris says.

Mr. Norris became CEO and spun off BlueCava to market device fingerprinting both to fraud-prevention and online-ad firms.  Eventually, he hopes Blue Cava can fingerprint everything from automobiles to the electrical grid. In October, Texas billionaire Mark Cuban led a group of investors who put $5 million into BlueCava.

BlueCava embeds its technology in websites, downloadable games and cellphone apps. One of its first customers was Palo Alto, Calif.-based IMVU Inc., which operates an online game where 55 million registered players can build virtual identities and chat in 3-D. It wanted to combat fraudsters who were setting up multiple accounts to buy virtual clothing and trinkets with stolen credit-card numbers. Kevin Dasch, a vice president at IMVU, says BlueCava's technology "has led to a significant decline in our fraud rates."

Later this year, BlueCava plans to launch its reputation exchange, which will include all the fingerprints it has collected so far.

Unlike most other fraud-prevention companies, BlueCava plans to merge its fraud data with its advertising data. Rivals say they don't mix the two types of data.

Greg Pierson, chief executive of iovation, says the company will never disclose specific information about people's Web-browsing behavior, "because it's unnecessary and it's dangerous. It's close to spying."

Mr. Norris says collecting that data is "standard practice" in the online-ad business.

Mr. Dasch of IMVU says he doesn't mind fingerprints of IMVU customers being added to the exchange, provided that they don't contain personally identifiable information such as user names, and that his company can use other exchange data in return.

The idea behind BlueCava's exchange is to let advertisers build profiles of the people using the devices it has identified. For instance, BlueCava will know that an IMVU fingerprint is from someone who likes virtual-reality games.

Other advertisers could then add information about that user. BlueCava also plans to link the profiles of various devices—cellphones, for instance—that also appear to be used by the same person.

Blue Cava also is seeking to use a controversial technique of matching online data about people with catalogs of offline information about them, such as property records, motor-vehicle registrations, income estimates and other details. It works like this: An individual logs into a website using a name or e-mail address.

The website shares those details with an offline-data company, which uses the email address or name to look up its files about the person. The data company then strips out the user's name and passes BlueCava information from offline databases. BlueCava then adds those personal details to its profile of that device.

As a result, BlueCava expects to have extremely detailed profiles of devices that could be more useful to marketers. In its privacy policy, BlueCava says it plans to hang onto device data "for the foreseeable future."

Advertisers are starting to test BlueCava's system. Mobext, the U.S. cellphone-advertising unit of the French firm Havas SA, is evaluating BlueCava's technology as a way to target users on mobile devices. "It's a better level of tracking," says Rob Griffin, senior vice president at Havas Digital.

Phuc Truong, managing director of Mobext, explains that tracking on cellphones is difficult because cookies don't always work on them. By comparison, he says, BlueCava's technology can work on all phones.

"I think cookies are a joke," Mr. Norris says. "The system is archaic and was invented by accident. We've outgrown it, and it's time for the next thing."

By the end of 2011, BlueCava expects to have cataloged one billion of the world's estimated 10 billion devices. The company says the information it collects about devices can't be traced back to individuals and that it will offer people a way to opt out of being tracked. Still, it's tough to figure out how to alert people. 'We don't have all the answers, but we're just going to try to be really clear' about how the data is used.

David Norris, BlueCava CEO

Monday, November 29, 2010

Dog-Poop Laws In Malaysia

In North America and Europe, many states and major cities enact laws to ensure that pet waste, specifically dog-poop laws, are enforced to ensure a clean and healthy community. In Virginia and New Jersey, no animal is allowed to defecate in any part of public property without the owner of the animal immediately and sufficiently cleaning up the waste. In New York City, it's Health Code Section 161.03 decrees that a pet owner must not allow his animal to defecate on a sidewalk, floor, wall, stairway or roof of any public or private place used by public.

Just the other day, I was outside my house watering my plants and I noticed a very good-natured and conscientious couple walking their dog with a dog spade and plastic bag. I think they are model Malaysians citizens. But at least once a month, I notice big piles of dog poop right outside my front gate. In Malaysia, pet owners can be fined RM100, but all over the world this is a worse offense with some states in the USA enforcing fines up to US$500 (roughly RM1,600) and in some EU countries EU500 (RM2,090). Do we Malaysians value health and cleanliness so much less?

Below is an excerpt of the Laws Of Malaysia. Act 647 is also called the "Animals Act 1963" (hereinafter called "Malaysia's Animals Act" or "MAA"). This is also available online at http://www.dvs.gov.my/c/document_library/get_file?uuid=7de78707-1308-48e9-982f-d64208d1d486&groupId=10124.

Malaysia's Animals Act - Removal Of Articles From Infected Premises

35 (2): "Any person who fails without reasonable excuse to comply with any order made under this section [Removal of Articles From Infected Premises] shall be liable to a fine of one hundred ringgit [RM100]."

Malaysia's Animals Act - Licensing

38 (1): "No person shall own, keep, harbour or maintain any dog that is over three months old unless such dog is licensed."

38 (2): "Dogs shall be licensed only in the manner prescribed before 31 January each year... and such licence shall remain in force until 31 December of the year in respect of which such licensing was effected."

38 (3): "Dogs may be licensed at any Post Office in the State in which they are normally kept or at such other places as may be prescribed."

38 (5): "On receipt of the prescribed fee the licensing authority shall supply the owner of the dog with a serially numbered metal badge."

38 (6): "The owner of every licensed dog shall provide a collar to which the badge issued in accordance with subsection (5) shall be securely fastened in such a manner as to be clearly visible when worn, and such collar and badge shall be continually worn by such licensed dog when out-of-doors, and any dog found out-of-doors and not wearing such collar and badge may be destroyed."

38 (7) (a): "The proper authority may authorize in writing persons to destroy dogs in accordance with subsection (6) and such persons may enter upon and into any place, not being a dwelling house, for the purpose of enforcing that subsection: Provided that such person shall, if so required, produce and
show his written authority to the owner, occupier or person for the time being in charge of such place."

38 (7) (b): "In this subsection the ‘proper authority’ means a State Director, Mayor of a City Council or City Hall, President of a District Council or Local Authority, General Manager of a Town Board or the Chief Police Officer of a State."

38 (8) (a) Any person who owns, keeps, harbours or maintains any dog contrary to subsection (1) shall be liable to a fine of one hundred ringgit [RM100]."

38 (8) (b): "Any person who fails without reasonable excuse to comply with subsection (6) shall be liable to a fine of fifty ringgit [RM50]."

38 (10): "This section [38] shall not apply to any dog— (a) within any State or any part of it for so long as an Anti-rabies Vaccination Order made under section 42 is in force within such State or any part of it; or (b) which is liable to be or has been registered or licensed in accordance with any other written law."

Malaysia's Animals Act - Detention Of Any Dog That Has Bitten A Person

41 (1): "A veterinary authority or a police officer not below the rank of Inspector may order the owner or person in charge of any dog that has or is reasonably believed to have bitten any person to produce the dog to him for examination, and he may detain the dog at such place and for such time as he may deem advisable. If the owner or person in charge of such dog fails to comply with such order, the veterinary authority or police officer may immediately take possession of the dog and remove it to an animal quarantine station."

41 (2): "Any person who fails without lawful excuse to comply with any order made under this section shall be liable to a fine of one
hundred ringgit."

Malaysia's Animals Act - Supplemental - Obstructing Officers In The Execution Of Their Duties

70: "Any person who without lawful excuse obstructs or impedes or assists in obstructing or impeding any veterinary authority, police officer or officer of customs in the exercise of his duty under this Act or any rule or order made under it shall be liable to a fine of five hundred ringgit [RM500] or to imprisonment for a term of six months or to both."

Malaysia's Animals Act - Supplemental - Altering Licences

71: "Any person who without lawful authority alters any licence or permit issued under this Act or knowingly makes use of any licence or permit so altered shall be liable to a fine of five hundred ringgit [RM500] or to imprisonment for a term of six months or to both."

Malaysia's Animals Act - Supplemental - General Penalty

72: "Any person guilty of an offence against this Act shall, where no other penalty is specified, be liable to a fine of two thousand ringgit [RM2000]."

Malaysia's Animals Act - Supplemental - Penalty On Second Conviction

73: "Any person convicted of any offence against this Act who is within a period of twelve (12) months from the date of such conviction convicted of a second or subsequent like offence against this Act shall where no penalty of imprisonment is provided for such offence be liable to imprisonment for two (2) months in addition to or in lieu of any fine."

The Proper Way To Shampoo Your Hair

As a kid, I use to hate to shower. Much less get my hair wet! But as an adult, after some really good experiences to the hair saloon, hearing some hair / shampoo experts talk on the radio, and trying this at home, it's a whole new ball game! And fun!

1. Use Warm Water. This opens your hair cuticles and pores.

2. Completely Wet Your Hair. Never let shampoo touch dry hair. Soak and rinse your hair thoroughly before applying shampoo. This helps to remove residue and prepares your hair and scalp for an even distribution of shampoo.

3. Squeeze about a 20-sen amount in your hand. Apply pathes of shampoo to different parts of your head like the nape of your neck, above your ears, etc.

4. Massage the shampoo uniformly onto your scalp. This is more important that applying too much shampoo into a few spots of hair or getting the tips of your hairs clogged with too much shampoo, causing them to tangle or split.

5. Do not use too much force or aggression to apply in circular motions. Remember how professionals use a little bit of nail to gently massage your scalp?

6. Take your time, enjoy the shower. Get the blood flowing on your scalp.

7. Thoroughly Rinse Your Hair. Leaving shampoo or residue in your scalp will block the hair cuticles or pores and might cause blockages or loss of hair.

8. At the end, switch to very cold water to close your hair cuticles and pores, plus create a nicer shine (of course this depends on your shampoo product!).

Thursday, November 18, 2010

Problems With Pos Malaysia Berhad

Today, I called up Pos Malaysia Berhad (PMB)'s Customer Service Centre, "PosLine", at 1-300-300-300 to filed a complaint with regard to bad operations at my house at Taman Residensi (TR). I was quoted a complaint report number PMB-A-20950 for bad operations and delivery of normal mail - including official government documents from TTPM - from 13/11/10 to 18/11/10. Today, I confronted the mail man who sat on his bike and put letters onto my house gate and not put securely inside my mailbox just less than 1m away.

While I understand that in the work of a postman in our hot weather is a tough one, it's very reasonable for us to expect PMB employees to spending an extra 5 seconds per house to ensure proper delivery and service in Kuala Lumpur. Unless of course PMB is not doing enough to train, remind, and commensurate postmen to do so.

I have heard that other residents at Kipark Sri Utara - at Taman Residensi and Laman Residen - have suffered similar problems in 2009 and 2010. I was assured that I will hear back from them within 3 business days. Personally judging from PMB's time stamps and delivery dates at my house takes between 2 working days (early 2010) to 5 working days (Nov 2010) to arrive from Klang Valley post offices. I'm just hoping s hope things will improve.

I also noticed some complaints on PMB online:
2010: http://www.complaintsboard.com/complaints/pos-malaysia-c337190.html
2009: http://thestar.com.my/metro/story.asp?file=/2009/9/16/central/20090915201058&sec=central
2008:http://www.p-ramlee.com/press/pos-malaysia.htm

Tuesday, November 2, 2010

TM / Streamyx Problems?!

A. If your Internet doesn't work, try re-setting your modem:

1. turn off your modem,

2. unplug the power and RJ11 (telephone cable),

3. unplug the RJ45 (thick LAN cable from your computer to the modem),

4. wait a few minutes (in the old days I was asked to wait 30 mins but nowadays I don't think so!)

5. plug in the RJ45,

6. plug the modem power / turn on modem and plug in the RJ11,

7. Go to your Start Menu... Settings... Control Panel... Network & Sharing Center*

8. Make sure your computer (left) is connected to the Dialer (middle) is connected to the Modem (right). The double lines should not have an "X". If there is an "X" after about 5 mins, you either have no connection or unstable connection.

9. If this still doesn't work, try to repeat the steps above but AFTER Point A(6), use a pin to poke the RESET button behind your Modem.

* for Windows Vista.

B. Send proof of your Internet zero connection or unstable connection to TM Net:

1. Open Firefox / Chrome / IE and go to http://speedtest.tm.net.my. This test - if you are connected to the Internet - is logged by TMNet everytime you test your speed.

2. Take a screen shot (press Ctrl+PrntScrn) and save it as a JPG etc (use Windows Paint, Photoshop etc) and save everything including the time stamp in the lower right hand corner of your computer screen.

3. Email both help@tm.net.my and help@tm.com.my as soon as possible. Include:
* Your username (without the @streamyx part) e.g. "upsetguy" (if your streamyx email is upsetguy@streamyx.com)
* Your full name as per IC,
* Your mobile number,
* Your Service No (usually 03 followed by your 8 digit TM fixedline / phone number referenced on your TM bill),
* Your full address where you're having this problem,
* A short description of your problem e.g. "From about 2-6/11/10 Zero connection, 6/11/10 4:01am Speedtest 0.6Mbps UL then unstable, 7-11/11/10 Zero connection."
* Any attachments including these snapshots from Part B(2) as proof.

4. If you do not have Internet, make sure you have between 20-40 mins (in my experience between Q1 and Q4 2010), call 1-300-889-515, provide the details in Part B(3) and provide a brief description of your trouble-shooting attempts as per Part A(1-9). Make sure that you get a report number specific to your Service No and Address and ask if:
* they will contact you,
* who you can talk to followup this problem in the future.

The best thing to come out of this is that you will learn about specific settings in your Windows version, learn about IP (if it's set to auto or forced) and DNS, and you can trouble-shoot for yourself in the future. A note about trouble-shooting: always take notes preferably not stored online / email account so it's easy for you to refer if your Internet's down in the future.

Good luck!

P/S: I will be blogging on my two (2) successful attempts at getting a rebate for Streamyx down between Q1 and Q4 this year soon. Stay tuned...