Glassholes, snapt**ts, #blabbergasms, selfies and PRISM: The Reg's review of 2013

12 months in 26 characters

HP ProLiant Gen8: Integrated lifecycle automation

Big Brother's watching

P is for PRISM: Ever feel like you’re being watched? You should be, because you are if former WikiLeaks deep throat Edward Snowden is to be believed. Snowden, formerly a contracted CIA technician, outed himself in June and was granted asylum in Russia. In coming out, he released documents to The Guardian, Washington Post and others. The docs, among other things, pointed to the existence of mass US data slurping programme called PRISM that started life in September 2007.

He claimed PRISM was operated with the help of all the major service providers and technology companies, and with the NSA tapping into the central servers of nine leading US telcos in order to extract audio and video, photographs, emails, documents and connection logs to "track foreign targets". Some companies had received financial reimbursement for helping, while others had declined. The revelation blind-sided companies who either denied they were working with the NSA or said they were only granting access to data using proper legal channels.


The NSA - nothing more unobtrusive or sinister than a big black HQ building

Squinting after being thrust into the spotlight, the normally invisible NSA was moved to try and downplay its activities, publishing a report it claimed proved it was watching a mere 1.6 per cent of the traffic on the internet. But it got worse as it turned out it wasn't just 'net minions in the US getting snooped but foreign citizens and their leaders were being observed too.

Further leaked documents claimed the NSA and GCHQ tapped Yahoo! and Google data center interconnects. Embarrassed and hurting, the tech companies tried to regain the initiative with Apple, Google, Facebook, Microsoft and others writing a letter to the NSA and US President Obama calling for greater transparency in their requests for data.

But the spies were always a step ahead: in November, Microsoft was scrambling to encrypt the interlinks between its data centres after further leaked documents said the company’s Hotmail, Windows Live Messenger and Passport services had been scanned using especially developed software.

In December, it was NSA spooks who were going native in World of Warcraft and Second Life to conduct surveillance on millions of gamers across the globe and using "harmless" Google cookies to spot targets.

This after the web hit meltdown when it was claimed the NSA and GCHQ had "circumvented or cracked much of the encryption or digital scrambling” used to protect data like emails and internet chats. This was abbreviated to say the spooks had cracked web encryption.

It’s unknown what more will come courtesy of Snowden next year, but one thing is clear: the internet is not the Wild West it was in the 1990s. As its uses have grown and matured, so has the sophistication of those who monitor society. The spooks that once tapped analogue phone lines and radio signals from “the enemy” have updated their game and gone web scale.

Q is for Quiver: normally it doesn’t take prisoners and stands firm against the world while its investors generally trail meekly behind. Not so in 2013 as both Oracle and its investors shook in the face of uncertainty. Oracle missed Wall Street expectations for three successive quarters in a row, with sales of new software licences slowing to zero growth down and sales of Larry Ellison’s prestige server business dropping 14 per cent during one particularly juicy quarter.

By the end of 2013 was getting market down by analysts concerned by growing competitive pressure from the cloud while investors fell CEO Larry Ellison wasn't worth his remuneration and in a symbolic vote rejected annual package of nearly $80m.

Larry Ellison

Leave my package alone

Radical steps were needed and Oracle started partnering with the freshman kids he generally picks on and roughs up during his frat-boy earnings calls with Wall Street - NetSuite, Salesforce and Microsoft on cloud.

NetSuite would integrate Oracle’s HCM and ERP cloud services to target mid-sized companies; Salesforce was to standardise on Oracle’s Linux and Exadata systems; and Oracle was to integrate Salesforce with its HCM and Financial Cloud, with Oracle implementing Oracle’s Fusion HCM and Financial cloud apps internally under a nine-year agreement. Oracle’s middleware and database would run on Microsoft’s rival virtualization stack on Windows Server and Azure with full support from Oracle.

Oracle hired loads of salespeople to shift cloudy versions of its software. By December, Oracle announced a quarter that beat Wall Street projections, but it was a hollow victory: new software sales flat, hardware sales down and a business overwhelmingly married to existing customers buying upgrades and support for existing versions of their Oracle kit.

R is for Rightsizing: Apple has been seemingly unstoppable with the iPhone and then iPad earning billions and forcing others big and small to follow its lead. Since the passing of Steve Jobs, though, we’ve been waiting for the “next big thing.” Aggressive competition from Android and a lack of a “next-big thing” seemed to rob Apple of its mojo, and 2013 took the wind from Apple’s sails. In April 2012 Wall St reckoned Apple shares would hit $1,000 within the year, thanks to better than expected iPhone sales. But by April this year the company’s stock price had fallen to a low point of $400 and people were starting to talk in terms of writing Apple off. The best hope was a smartwatch (See A is for Accessorise). From the market leader in smartphones and tablets, Apple had been kicked into a solid second position by Android with even Microsoft’s Windows Phone growing faster than iOS on phones.

Price competition was a killer on smartphones and Apple finally responded with the iPhone 5S and 5C while it hit back against Android with two new iPads – the Air and Mini with Retina display. It’s unclear whether these will stop the rot but Apple did manage to signed a deal with China Telecom that will pump iPhones into the world’s largest carrier market. By December Apple was growing once more - on $570, a year high.

Reducing security risks from open source software

Next page: Value for money

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story


Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.