Is the dot com dead?

Will private top level domains kill the search engine?

The web is about to change with a range of new domains due to appear. But does it mean the web will get easier to surf, dot com addresses will disappear and Google quietly fade away?

It’s expected ICANN, the International Committee of Assigned Network Names is set to approve custom global Top Level Domain names – known as gLTDs – which will allow big organisations to buy their own domain names.

This idea was first announced in 2008 and was expected to be in place by the end of 2009 but the Internet bureaucracy is not known for quickly making decisions.

Once this policy is in place organisations can register their own domain and not bother with a .com or other suffix.

For example Microsoft could ditch the microsoft.com domain and move the .microsoft address with websites named support.microsoft and shop.microsoft

The cost of one of these global Top Level Domains will be $178,000 with $25,000 annual fees, given the cost it’s only going to be the largest organisations who can afford them.

Even then, we’ll see many businesses simply not bother. Given the current proposal includes strong provisions against cybersquatting, there’s no need for trademark holders to rush, it’s quite feasible that many will sit out the hype and wait for the prices to drop.

Where these domains will work well are for internal networks and secure applications where system administrators can lock out unauthorised devices from their domains.

Excluding search engine robots will provide a certain level of security along with some opportunities for corporate mischief like we’re currently seeing between Google and Facebook.

The potential for misbehaviour by owners of these domains will be a barrier for small business adoption. Few businesses or groups are going to trust their online properties to a .facebook, .ibm or .apple address when they can own a domain with the current registrars.

An application being cited is using the .music domain and selling space to performers. That’s nice but it locks them into the same risks they currently have with Facebook and MySpace that at the first sign of controversy their account will be shut down for allegedly breaching some obscure term of service.

A major problem for ICANN is going to be place names, how do you decide between Birmingham, England or Birmingham, Alabama when the .birmingham name comes into play?

Better still the argument between the city of Victoria, British Columbia and the state of Victoria, Australia becomes problematic.

Even more delightful is who owns a place name? Should Australia wrest the rights to .sydney off Nova Scotia, the dysfunctional state of Aussie politics almost guarantees an unseemly brawl between the Federal, state and local governments over the name.

The corporate sector has similar problems with similar trading names being used in different jurisdictions, Woolworths in Australia and the UK is one that immediately comes to mind.

While it’s clear many of the domain registrars think these new names are going to be a nice little cash cow, it’s not difficult to see they may have misunderstood just how complex and fraught some of the registrations will turn out to be.

Most of the registrations though will be straight forward and far from killing search engines, the further fragmentation of the net into even more domains is going to make services like Google and Yahoo! even more powerful as web surfers will find it harder to guess or remember websites.

On balance it’s unlikely the new top level domains are going to put the search engines out of business or see the dot com addresses we’ve grown used to disappear.

What we are seeing though is the evolution of the web, search engines will adapt and the addresses we use will develop as the technology changes.

It is quite possible that eventually we’ll have our own personal top level domains should we want them when the price drops to the levels we’ve become used to with dot com addresses.

This won’t happen overnight and it’s a long way off if ICANN and their members keep prices high. The famed dot com is going nowhere yet.

Similar posts:

  • No Related Posts

The learning curve

We’re still on training wheels when it comes to using social media

When new technologies appear it’s interesting how people experiment and adapt to them, we’re seeing this right now as businesses grapple with social media tools like Facebook, LinkedIn and Twitter and discover where the benefits lie.

The second edition of the Social Media Benchmarking Study, a joint release by Sydney online consultants Community Engine and the research company Nielson, illustrated how things have changed over the last two years.

One of the clear conclusions from the study is how businesses are developing the ways to determine benefits of their social media activity with near halving of the number of organisations citing lack of measurable return on investment as a reason for not engaging online.

A barrier that is increasing is the perception that businesses don’t have the time or resources required for which is probably business owners and managers realising that maintaining a Facebook Page, Twitter account or blog isn’t easy.

Time is the scarcest asset for any business that gets more precious with smaller organisation. Even large corporates and government departments struggle with finding the resources necessary to run effective online presences.

One of the tragedies of social media is how it’s been identified as a marketing tool and in this survey with over half the respondents stated they are going primarily use the tools as a marketing channel rather than in customer support, recruitment, research or product development.

This is probably why the perception that social media is a time sink comes from. As purely marketing tools social media is time consuming and difficult. A challenge made greater by the fact we’re all still figuring out how to effectively connect with customers in what is a hostile place to more traditional broadcast based marketing methods.

Given social media is being used primarily as a marketing tool by business, it’s no surprise that the survey found larger corporations are the biggest users as they have the marketing budgets to allocate.

An interesting aspect with big business’ social media investment is how much it’s focused on Facebook. On one level this is understandable as a Facebook “like” is easy to set up and becomes a very simple measurement to follow, although the challenge still lies in converting a low friction click on a Like button into a useful customer or advocate.

What is surprising with corporate Australia’s adoption of Facebook is the apparent lack of understanding of the platform’s terms and conditions and the business risks involved. Again this is probably part of the collective learning curve.

Possibly because of those risks, public sector use is static. We can expect this given as social media is being pushed as a marketing tool which isn’t a priority many government agencies, are you going to skip registering your car because the motor registry doesn’t have a “like” button on their web page?

This liberation from being obsessed with marketing and sales is probably why the public sector is using social media a more creatively as collaborative and research tools where many of these services do an extremely good job.

Many businesses, particularly smaller organizations, believe social media doesn’t fit their objectives. A terrific quote from an SME accountant is “I run a business, not a chat show”.

That attitude’s fine as social media – like pretty well everything else in the business world – is a tool to be used the best way you see fit, just because some businesses don’t need a hammer but that doesn’t mean hammers aren’t useful.

Although when that tool is fairly new, as social media is, it’s probably best to have a play with it and see where if can help your business.

The Social Media Benchmarking Study is a useful survey that shows where businesses are using these tools and how effective they are finding them. It’s going to be interesting to see the field evolves as we all get to understand social media as both consumers and business owners.

Similar posts:

  • No Related Posts

The Mac malware threat

Is there a wave of viruses waiting to attack Apple Mac computers

For years we’ve heard warnings of a deluge of Mac based viruses coming as the Apple systems gained popularity. Does the Mac Defender program that’s infecting OS X systems represent a new risk for Apple computer users or is just another trick targeting unsuspecting computer users.

Recently Daring Fireball’s John Gruber called those predicting an immanent deluge of Apple Malware out in his “Wolf” post, pointing out seven years of warnings of an impending wave of Mac based security attacks which never eventuated.

Mac Defender, a Trojan Horse which pretends to keep Apple systems secure, is catching unwary Mac users. To many who’ve cried “WOLF!”, this is the first horseman of an Apple apocalypse.

Are we really about to see a wave of Mac based malware similar to that which plagued Windows users over the last 15 years? The truth is more complex than just Apple and Microsoft fanboys trading insults.

Can an Apple Mac catch viruses?

The short answer is “yes”. Every computer system has some weakness that can can be used by rogue software. Apple Macs, Linux computers and even corporate mainframes have software flaws that can catch out the unprepared user.

Given there are always flaws in software code, it’s important that a computer operating system has some protection against installing unwanted programs. Apple, and other systems, avoided the problems of the Windows world by putting more barriers in the way of rogue applications finding their way on to machines.

The “big target theory”

Windows’ susceptibility to viruses is often put down to it being the biggest target. Because over 90% of the world’s computers were running on Microsoft Windows, the theory goes, it was the obvious target while Apple, Linux and smartphone applications are too small to be worthwhile for the dedicated hacker.

This “big target” theory is bunk – predators, vandals and criminals go for the weakest victims and Windows was by far the easiest target.

If we think of the different software systems as being homes on a street, most of the houses were small with well maintained fences and secure locks on their doors.  They weren’t immune from being broken into, though to do so involved a degree of skill and cunning.

The biggest home on the block, the House of Microsoft, chose to have a pretty poor fence and few locks. It didn’t help that the occupants, more often than not, would gladly let anyone in and were mildly suprised when the odd uninvited visitor made off with the silverware or graffitied the garage door.

Windows computers were the easiest target on the block and this was why they were targeted. The fact they were by far the most popular systems was an added bonus for malware writers.

“Security by obscurity” is not the reason Macs attract fewer malware attacks.

Why did viruses attack Windows?

To understand why Windows is more prone to viruses we have to go back to 1998 when Microsoft were preparing for the next generation of systems to replace the aging Windows 95, 98 and ME platforms.

Microsoft based their new operating system – Windows XP – on their existing Windows NT system which had a strong security focus that allowed users to run in restricted profiles, preventing them altering key system files, this was perfect in a world where users were connecting to the World Wide Web and exposing themselves to multiple new security risks.

A problem for Microsoft was many of their consumer and office products didn’t like being denied full access to the systems they were installed on. It was possible to run Microsoft Office and other applications without full Administrator permissions – and many big organisations did – but doing so involved the resources of a skilled, full time IT department which was beyond most Windows users.

So Microsoft made the decision to sell Windows XP to the general public with Administrator access enabled for ordinary users. It meant various programs would work properly but it also gave full access to all the internal parts of Windows. Microsoft decided there were would be no secure parts on a standard, out-of-the-box Windows XP computer.

Internet Explorer blues

To compound the security problem Microsoft had decided to continue the integration of the Windows web browser, Internet Explorer, into the core functions of Windows XP – something they’d started when they’d discovered the Internet shortly after releasing Windows 95 – a policy that had already created a malware nightmare with Windows 98 and ME.

Internet Explorer itself was prone to security problems because of a programming language built into it called Active X that allowed applications to run without the user knowing. This was convenient for users and websites but basically invited virus writers and hacker into a system through the web browser.

Put a deeply flawed Internet Explorer together with most users running their computers with full Administrator rights and conditions were perfect for the tidal wave of malware that swamped the Windows world in the period of 2001 to 2004.

Faced with massive problems Microsoft steadily improved security on their consumer products, the later versions of Windows XP were substantially better than the first version with the releases of Microsoft Vista and Windows 7 seeing great improvements that reduced the virus and malware threats.

Microsoft’s bad choices reverberate today though with Windows users lumbered with layers of security to protect them from rogue applications and frequent nasties that manage to sidestep the safeguards.

Social Engineering

As Windows computers became more secure, and criminal gangs more aware of the opportunities residing on people’s desktops, the threat moved on to “social engineering” tricks that involved either posing as a financial opportunity – phishing and the notorious 419 scams – or offering “free” software, pictures and music to unsuspecting users.

Often the free download hid a program called a Trojan horse that would sneak something ontoward onto a victim’s computer, this is what the Mac Defender program is.

Trojan horses and phishing attacks don’t rely on weaknesses in a computer’s software, they rely on fooling the user. So it doesn’t matter what computer system the victim happens to be running as long as they can be fooled into doing something.

Is there a wave of Mac malware looming?

While those who’ve called WOLF! on Mac viruses in the past might be celebrating what appears to be a breakout of malware targeting the Apple Mac, the conditions that caused the boom in Windows based malware don’t exist on the OS X operating system – or on mobile platforms like Android, Blackberry or the iPhone’s iOS for that matter – so a virus boom isn’t going to happen.

On the other hand, new social engineering tricks are evolving as savvy conmen come up with new and original ideas to fool us into giving away our bank details or installing rogue application on our Macs, smartphones and social media applications.

Fighting old battles

In many ways arguments about malware attacking operating systems is the old battle. The virus fight is largely over as vendors, particularly Microsoft, and users learn secure ways to use their computers.

Today’s security battles are being fought in the cloud and on social media platforms as scammers and users come to grips with the changed security and computing environment.

Most of what we do on computers today relies upon the Internet, that we use a Mac or a Windows machine doesn’t really matter that much as the serious threats are now lurking on our Facebook and cloud computer applications. We need to stay alert regardless of the computer, or smartphone we choose.

Similar posts:

  • No Related Posts

The listening business

What a crook can teach us about paying attention to customers

Some years back a crook computer repairer did the rounds of Sydney and regional NSW. For all his sins Joe, as we’ll call him, always stood out as an example of a business that effectively listened to the customer.

Joe would advertise in local papers and you could spot his ads by the line “all our technicians are qualified computer programmers”, which is a nonsense slogan like a landscape gardener claiming all her labourers are civil engineering graduates, but it was an effective catchphrase in a market that didn’t know better.

After a while the local community would start wise up to Joe and his “computer programmers” and when the complaints and fair trading investigations mounted, he’d change his business name, move to another suburb or town and the cycle would start again.

I was reminded of Joe at the City of Sydney’s discussion on the connected consumer at the latest Lets Talk Business seminar last week and wondered how he’d survive in today’s markets where people are quick to go online and criticize.

Dealing with criticism has always been big businesses’ Achilles heel; bureaucracies have a tendency to protect themselves and when there’s managerial or team bonuses at stake there’s strong incentive to ignore the concerns of customers.

A good example of this Vodafone where the chief executive, Nigel Dews, has been open in admitting the company failed to listen to their customers as their network failed to meet the demands placed upon it.

While the network itself was buckling under the strain, the company spent millions on sponsorship and advertising effectively trying to drown the criticism under a wave of tightly controlled good news stories, promotions and competitions.

It didn’t work, just as Facebook’s PR agency Burson-Marsteller failed dismally in planting an anti-Google story, which saw the two organisations not only busted but also descend into an unseemly argument with their client while frantically deleting Facebook posts.

All of these actions – deleting social media comments, ignoring customer complaints and attempting to distract critics with pictures of pretty girls and racing cars – smack of the old way of doing business in an era where tightly controlled mass media was the only channel complaints could be heard. Those times ended with the arrival of the Internet.

At the Lets Talk Business event one of the panellists, Jody Fox of Sydney’s Shoes of Prey described how her business is engaging with customers online and discussing any concerns openly on the Facebook page, not deleting them.

This is the new reality of business, if you don’t listen and engage with upset clients or ­– even worse – try to control their comments on your sites, you’ll only get them angrier and they’ll go elsewhere to tell their stories.

Another striking difference between the new and old business was Jody’s point was that shoes of Prey treats customer service as a marketing expense, not a separate cost centre. In most large organisations helping paying customers is treated as an unnecessary expense that should be outsourced and minimised as much as possible.

This sort of works when you have a licensed oligopoly like telecoms or banks but fails dismally in competitive industries. Without purchasers there are no shareholder returns and eventually no executive bonuses.

Ignoring customers worked nicely in the era of mass media when it was difficult for upset clients to be heard above an expensive marketing campaign; Vodafone, Burson-Marsteller and even governments are finding it doesn’t work today.

Joe the computer technician would have understood this, if he’s still doing dodgy IT support then he’ll be watching the Facebook pages, Twitter feeds and blogs for bad news.

Somehow though I suspect he’s no longer in computer repairs though, my guess he’s making a lot more money in social media or search engine optimisation these days.

Similar posts:

  • No Related Posts

Too old to surf?

Do older customers use the web?

“For those of us aged over forty, we don’t use the web. And neither do our customers!”

An audience member threw this statement to the panel at last night’s Let’s Talk Business seminar discussing The New Consumer. One of the panel members, Adam Ferrier of Naked Communications, replied flatly; “you’re wrong”.

That business owner assumed her own likes, priorities and experience are shared by her customers. This isn’t always true, what we think is true about our clients and markets often proves not to be the case.

Just because you don’t have time to surf the web, use social media or play online games doesn’t mean your clients aren’t using these tools.

Assuming that the internet is for young folk means your business focus is on older people who don’t use the net – which is probably the fastest declining segment in our society as seniors move online.

The US based Pew Internet Survey’s Generations Online in 2010 Report reported older user were rapidly increasing their net use while in Australia the 2010 Sensis ebusiness report came to the same findings saying;

“The groups most likely to report below average usage were those aged 65 and above and retirees. For those Australians 65 years and above only 66 per cent reported accessing the internet in the past 12 months. However, usage in this age group has increased by six percentage points over the past year.” – p. 17 Sensis e-business report.

Six percentage points to 66% represents 10% growth in the over 65 age group. At that rate we’ll see the seniors reaching the 97 to 98% levels of Internet usage sometime in 2013 and the 50-64 year age group will be there next year.

Restricting your business to an 8%  slice of the market  – which will soon be 3% – is up to you, it may well be that is where your customers are. But it’s a big risk and one you wouldn’t want to make on some blind assumptions.

Many of us may be too old to surf the point at North Narrabeen, but we’re all using the web and older users are the fastest growing group. Rather than assuming your customers aren’t going online, it’s time to ask them what they are doing with their computers.

Similar posts:

  • No Related Posts

Skilling for the future

We can’t rely on governments to deliver the skills our businesses need

Tonight we see the first budget of the Gillard government and one of its stated priorities to get the long term unemployed, disabled and single parents back into the workforce.

This is welcome in a society where we are facing skills shortages, the effects of an aging population and a developing global race for talent that is steadily making the old model of importing immigrants to cover workforce gaps no longer viable.

For those who’ve been out of the workforce for a long period the biggest challenge is acquiring the skills they need for the modern economy, to work in most industries today means using technologies that weren’t around five or ten years ago.

Like many ideas that come out of Canberra, the scale of this task seems to be underestimated by the public servants, politicians and the media reporting their plans. Training those currently excluded from the workforce is going to take more than a visit to Centrelink.

To give these folk marketable skills is going to require rebuilding our adult education and TAFE systems that have been systemically allowed to run down by governments over the last thirty years. That in itself is a major task that neither the states nor Canberra seem to have the appetite to address.

One of the big challenges with bringing disadvantaged groups back into education is transport, the colleges and teachers are often a long way from the students who usually face a convoluted and time consuming public transport journey to get the colleges and schools.

This is where technology comes in with access to the internet and online learning tools. Developed sensibly, broadband access can create relevant community learning centres along with individual in-home training.

We should be careful though treating technology as the only solution, one of the essentials for using computers and the Internet effectively is literacy and that’s a big challenge for many of these groups and something that is going to take a lot of investment in well trained and motivated teachers.

Those education investments, along with the spending we’re committing to the National Broadband Network, need to be co-ordinated and this seems to be where the Federal and state governments really drop the ball with poorly thought out, short term schemes.

For businesses, those last thirty years of government neglecting adult education have seen us neglect training as well. We’ve thrown much of the training burden onto reluctant governments or increasingly asked workers themselves to pay for training out of their pocket then moaning when new staff don’t have the skills we need.

That indulgence is running out as we begin to face the inevitable consequences of failing to train young workers coupled with the demographic certainty of an aging workforce.

We can hope our governments can deliver on their promises but we shouldn’t wait on them, even they get it right this is a project that will take years to bear fruit, we need to be starting right now with our own businesses and staff.

Training all workers, managers and business owners is a great opportunity to build new industries and use the web to give people the skills that will make them valuable members of their community.

Our days of complacently expecting workers to have the skills we need from the day we hire them are over, if they ever existed. We have the tools to fix the problems ourselves and we need to start now.

Similar posts:

  • No Related Posts

ABC 702 Weekends: The spies in our pockets

Should we worry about our electronic devices tracking us?

You don’t have to be an FBI suspect to have your car tracked, recently the GPS manufacturer Tom-Tom admitted it sold users’ traffic data to Dutch police which was used to set speed traps and security researchers discovered Apple’s iPhone is storing location information that is used by Apple for research purposes.

On the 15 May 2011 702 Sydney program, Philip Clarke and Paul Wallbank discussed are our phones, GPS and other electronic devices tracking us and some of the things we should be aware of when using mobile phone and other GPS enabled technology.

We had a full board of callers and promised we’d get back to some of the following;

Images not showing in Internet Explorer

Kim called about her computer not showing images in Internet Explorer running on Windows Vista. This could be simply a matter of ticking the Show Pictures check box in the Advanced tab of the Internet Explorer Options settings. We explain how to do this, and how to handle further similar problems, on our IT Queries website.

Free Backup options

One of the most irritating things to lose when a computer crashes or you replace it are your email and contacts. Arthur asked about backing up this important data in Windows Hotmail Live on his Windows 7 computer.

Unlike some of the earlier versions, Windows 7 comes with its own backup program which Microsoft shows you how to use it on their website. Make sure you choose to backup your profile as this will save all your email, contacts and favorites along with your computer settings.

Once you’ve created the backup, we’d suggest using an online service like Dropbox or Box.net to keep a secure copy of these files.

Fixing a slow computer

Kristina asked about speeding up her computer that’s running slowly, particularly when Outlook 2003 is open. The first step is to backup your Outlook data which is saved in a PST file, just in case something goes wrong.

Next you should uninstall any programs and add ins that might be interfering with Outlook then run the Mailbox Clean Up Tool to get rid of anything you don’t need.

Having cleaned up Outlook, it’s time to run the Outlook Inbox repair tool which will fix any inconsistencies in the PST data store.

Once you’ve cleaned up Outlook, it’s time to do a general clean up of the computer that will flush out anything unnecessary on your system. Follow this with a drive check by running chkdsk which will clean up minor problems with the way your computer has saved data.

With all of these clean ups done you should have a much fast computer, if you don’t it may be time to call a computer technician.

Next 702 Sydney Weekend segment

We’ll have the date of the next 702 Weekends up on our events page in the next few days. The next Nighlife spot will be on June 16 where we’ll be discussing how to secure your data against incompetent organisations.

If you’d like to get advanced notice of radio programs and other events, subscribe to our newsletter at the right of this screen.

Similar posts:

  • No Related Posts