Feeds

2012 in tech: Apple up the Cook without a paddle, ARM, slab wars... and MORE

Navigate the year safely, without Google Maps

Combat fraud and increase customer satisfaction

Rise of the machines

Rogue software crashes US stock markets

In Terminator, the humans are responsible for unleashing Armageddon after outsourcing responsibility for defense to a computer system called Skynet.

On August 1, the NYSE experienced a minor, computer-induced Armageddon of its own, called a “mini flash crash”. It saw shares in major stocks from General Electric down to the minors got caught in wild swings thanks a rogue automated trading system that ram amuck for a period of 45 minutes.

When badly built software goes, er, bad

The problem was traced to a badly written trading algorithm from Knight Capital that cost its owner $440m in cash and 68 per cent in stock. The algorithm was buying shares at ask price and selling quickly at the bid price; only, the system should have been buying at bid price and selling at ask price – the latter often being a few cents more than the bid price. This meant the system was mostly making losses per trade while doing what such systems do well – trading very fast.

As one observer put it: "Do that 40 times a second, 2,400 times a minute, and you now have a system that’s very efficient at burning money".

The system is typical of the kind now widely used in a financial markets where quantative analysts and computer scientists find value in the margins and where they trade very quickly. Spookily, this was the second financial trading system disaster of the year blamed on tech, the first being Facebook’s IPO. Then, Nasdaq reckoned the software and the “computer systems” in its IPO offerings “were overwhelmed by order cancellations and updates during the “biggest IPO cross in the history of mankind.”

Google, Facebook, Microsoft boil the web-privacy frog

Sun Microsystems co-founder and chief executive Scott McNealy is famous for telling us we have no privacy on the web and to get over it.

2012 proved people aren’t “over it” and despite spaffing their photos up Facebook and volunteering their data to Google, they get angry when tech companies abuse what’s perceived to be a position of trust by trying to make commercial capital from that information.

2012 also proved tech companies will keep inventing ever more creative ways to capitalise on that data.

Larry Page

Google's CEO likes his privacy policy

Privacy advocates, data protection officials and top lawyers were outraged in January and March as Google introduced new privacy policy that would let it combine users’ data across different sites. The new policy combined 60 existing polices and let users’ personal data be used across all Google’s sites – Gmail, YouTube and so on. Google pressed on, despite the barrage claiming a change would “confuse” users.

Somewhat quietly, in August, Microsoft tweaked its terms and conditions giving it license to share data of sites such as Hotmail with third parties.

Facebook also introduced a new policy on how it uses its billion-users’ data, allowing it to share details with Instagram, the hipster photo-sharing site it bought in October for $715m. As with Google, the idea is to build a better profile of users and enable better-targeted ads.

At the same time, Facebook changed a system that would let users vote up or down changes to the social network; this system registered 87 per cent opposition to the new data-sharing policy in a vote a Facebook PR rep called "unrepresentative percentage of our user community."

Instagram itself provoked an outcry in December when it granted itself the power to use photos uploaded by users in ads; facing a potential walk out by users being told how to remove their pics from the service, Instagram modified the terms, reverting back to its old terms. However, Instagram retained the right to make future changes and to use people's photos as part of advertising.

Open sourcers were compromised, too: Ubuntu’s maker Canonical introduced a search feature with Ubuntu 12.10 that married user’s searches of their hard drive with results from etailer and cloud giant Amazon.

Ubuntu daddy Mark Shuttleworth defended the feature, saying it didn’t compromise privacy - but the outrage was instantaneous and furious, coming from users, open source activists and from privacy advocates with the Electronic Frontier Foundation branding the Amazon integration "a major privacy problem". Canonical, which had only been making a small amount of money from the service, rushed out a button that let users kill the feature, but Amazon search remains on by default.

Browser makers were also sucked in. Microsoft thought it had taken the moral high ground by making Do Not Track the default setting in Internet Explorer 10, the default browser for Windows 8.

Mozilla was the first browser maker to put DNT in place, in Firefox, but it decided Microsoft had erred by making DNT a default option and by not giving users the choice to pick it to let websites know where they’ve been online. It’s a libertarian-brand of argument, and one which open-sourcers and web giants assimilated, helping wreck Microsoft’s stance. Apache web server co-author Roy Fielding off his own back updated code for the world’s most popular web server so that websites would not work with IE 10’s DNT system, while Yahoo! - Microsoft’s Bing ads and search partner - said it wouldn’t recognise DNT in IE 10.

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.