понедельник, 23 мая 2011 г.

Developers pleased with Apple's Lodsys response

The in-app purchase icon.

The in-app purchase icon.

(Credit:Apple)

Apple todayfinally responded to Lodsys, the group that's been targeting iOS developers for licensing fees on their use of in-app purchase (IAP). While Lodsys has not yet issued its own response, many developers are now breathing a sigh of relief based on Apple's stance, which states that developers are fully protected against any extra fees by the company's patent licensing terms.

"DEAR STEVE I WANT TO KISS YOU HUGS CHOCK,"tweetedCraig Hockenberry, the principal and senior software engineer at The Iconfactory, the makers of the popular Twitterific app. Hockenberry had posteda public letterto Apple CEO Steve Jobs shortly before the company began sending its letters to affected developers, wherein Hockenberry called Lodsys"greedy predators", and said that the group threatened the entire platform.

"What these predators don't realize is that for every developer who's earning millions, there are many thousands who are earning much less,"Hockenberry wrote."This backbone of the iOS ecosystem is doing well with work we love, but that is very much at risk with increased legal costs."

Hockenberry latertweeted,"I should e-mail Steve Jobs more often."

James Thomson, the maker of the PCalc app, who was one of the first to get hit with a notice from Lodsys,saidsimply that"our long international nightmare is over."In aninterviewwith Macworld, Thomson described the last ten days as"some of the most stressful"in his professional career.

Lodsys first began sending notices to developers earlier this month, alerting them to the fact that their applications were infringing on a patent the group held by using IAP. The company gave developers 21 days to respond, before threatening legal action. The group offered up a licensing deal for developers to pay 0.575 percent of U.S. revenue from their applications, in return for being able to use IAP within their apps. Apple did not weigh in on the issue until its letter this morning, where the company said it, along with its app makers are"undisputedly licensed"to use IAP.

Emanuele Vulcano, the maker of iOS app Mover never received one of these letters from Lodsys, but nonetheless removed IAP from the free version of the app out of fear of being targeted, and described Lodsys' actions as having a"chilling effect."Vulcano this morningannouncedthat he was bringing IAP back to the app immediately as a result of Apple's letter.

Daniel Jalkut, the founder ofMac-centric Red Sweater Software rounded out the other developer reactions,saying"I've never seen iOS developers so excited about the walled garden."

Julie Samuels, a staff attorney for the Electronic Frontier Foundation who last week wrote a post saying that Apple needed tostep up and defend developers, said Apple's response was"the right thing."

"We were really happy to see Apple take a public stand and defend the folks who come up with the apps that make us all love our iPhones. It's the right thing - both morally and from a business perspective,"Samuels wrote an e-mail to CNET."It took a little longer than we'd have liked--so many developers were really left in the lurch last week with the proverbial Sword of Damocles over their head, but better late than never. Now the developers can get back to what they do best: develop new apps."

Morgan Reed, executive director of theAssociation for Competitive Technologysaid the group, which represents around 3,000 technology firms, was similarly happy with Apple's response.

"The developer community is pleased that Apple has taken steps to reassure app makers regarding Lodsys's licensing demands,"Reed said in a statement."Lodsys in-app purchasing technology is already licensed by Apple. Developers share that company's understanding that in-app purchasing applications written for its iOS platform are covered under this license. Lodsys has created uncertainty in the apps marketplace and we hope that it will take the appropriate step to withdraw its unwarranted licensing demands."

It remains to be seen when or how Lodsys will react to Apple's letter. In it, Apple's senior vice president and general counsel, Bruce Sewell requested that the company immediately withdraw notices sent to developers requesting that they strike up licensing deals, calling such assertions"false."So far Lodsys CEO Mark Small, and any of the company's other representatives have declined to speak with press on the matter, relaying information toits bloginstead.


Source

воскресенье, 22 мая 2011 г.

How the iPad changes PC design, part 2

In case anybody had any doubts about the impact of theiPadon the PC, Intel laid those doubts to rest this week at its investor meeting.

Echoing trends touched onin an April 23 post, the company that makes the silicon core of most of the world's PCs said this week, in effect, that laptops will become a lot more liketablets, i.e., more like the iPad.

And why will this happen? The slide below--shown at the chipmaker's investor meeting--makes this clear.

Laptops will become extremely thin and be instant-on and with instant connectivity, Intel said this week. Sounds a lot like a tablet with a keyboard.

Laptops will become extremely thin and be instant-on and with instant connectivity, Intel said this week. Sounds a lot like a tablet with a keyboard.

(Credit:Intel)

This time, thin is really thin:At the meeting at Intel's headquarters in Santa Clara, Calif., executives were talking about a standard 0.7-inch thickness (about 18 millimeters, see slide above) for laptops, not to mention dropping hints about future 8 millimeter thick tablets and smartphones.

And thin is really in:In a discussion I had offline with a high-ranking Intel executive at the meeting, the new"extreme ultrathin"strategy was described in an interesting way. To paraphrase, the original CULV thing didn't fly, he said. (For those not familiar with Intel jargon, that means consumer ultra low voltage. Intel's attempt, a couple of years ago, to push ultrathin laptops into the mainstream.)

He went on to describe how CULV marketing dollars were cut because, among other reasons, the performance wasn't there. But this time, it's different, he said. There will be a big marketing campaign and plenty of power-efficient--but still very fast, mind you--silicon to populate those 0.7-inch-thin (and thinner) laptops that turn on and connect instantly.

How important is all of this to Intel?"This is a once in a decade kind of change,"said Dadi Perlmutter, an executive VP at Intel, when referring to this overall push into power-efficient, always-on, always-connected computing.

And in case investors needed more convincing, at one of the informal events, Intel was showing off about a dozen tablets, a few already on the market but most due to ship in the coming months.

And, at the same event, a few feet away, Intel was showing the ultrathin (0.64 inches) Samsung Series 9 13.3-inch model and demonstrating how future Intel technology will allow the PC to instantly pop out of hibernation mode--which currently is anything but instant, often taking about 20 or 30 seconds (or more). In other words, what is known currently as standby mode will become, in effect, instant-on hibernation. All in an effort to extend battery life while providing instant responsiveness and instant connectivity.

Which brings us back to the tablet...I mean...iPad. If PC vendors actually execute on Intel's vision, that could blunt the appeal of the iPad for some consumers. And even trump the iPad, dare I say, for some consumers.

Imagine in-the-not-too-distant-future, a 2-pound, 0.6-inch thick laptop packing next-generation Intel Ivy Bridge processors with integrated 4G and a 256GB solid-state drive for about $1,000. And this design could be operating system agnostic:Windows 7(or Windows 8), Google Chrome OS, or a future MacBook Air running Apple's OS.


Source

суббота, 21 мая 2011 г.

Keep your Angry Birds, we'll take something a bit more classy

A rendering of the inner workings of one of the rare pistols cum music boxes cum robots.

(Credit:Christie's video; screenshot by Edward Moyer/CNET)

Birds and weapons? Sounds like a certain smartphone-game-turned-cultural-touchstone, right? Well, don't worry; we know you've heard enough aboutthatparticular phenomenon to last a few lifetimes.

No, this little blog item is about something far less widespread than a populariPhoneapp. In fact, the"gadgets"in question here--if one dare call them that--are truly rare. So rare that they're expected to draw $2.5 million to $5 million dollars at a Hong Kong auction later this month.

And though they were created in the early 19th century, and are anything but digital, the technical chops required to make them still manage to impress.

We're talking about a matching pair of gold, jewel-encrusted"pistols"--manufactured as playthings for courtesans in the Chinese royal court by a Swiss studio known for its ingenious automatons.

Theonlysuch matching pair known to exist. There are four other pistols like this, all singletons, and all tucked away in museums.

One of the bejeweled handguns. Our little whistling and winged friend can be seen perched at the end of the double barrel.

(Credit:Christie's video; screenshot by Edward Moyer/CNET)

The glittering handguns don't fire bullets, rather, they fire birdsong. One winds them up with a little key (like one would a watch of the same era), pulls the trigger, and out of the barrel pops a tiny mechanical bird. Complete with real feathers and moving wings, beak, and tail, the charming little fellow sings his heart out for a full 20 seconds, never repeating himself and all the while flitting and dancing about with avian joy and excitement.

There are no batteries in the pistols or birds; the movements and melodies are generated entirely by several hundred diminutive springs, gears, levers, screws, and other such mechanical tidbits--along with a huge helping, of course, of mechanical wizardry.

Give me birdsong over a bullet any day. You can see here the bird's real feathers (and its sweet little expression).

(Credit:Christie's video; screenshot by Edward Moyer/CNET)

You can watch the glittering gizmos in action (and hear the birds' Mozartian music) ina video produced by Christie's, the auction house that'shandling their sale.

We're sure you'll agree it's all a bit more genteel than Duke Nukem.

{ViaThe Wall Street Journal}


Source

четверг, 19 мая 2011 г.

Lenovo: USB 3.0 mainstream in 2012

The 13.3-inch ultrathin ThinkPad X1 includes a USB 3.0 port. Many, if not most, laptops are expected to follow suit this year and next.

The 13.3-inch ultrathin ThinkPad X1 includes a USB 3.0 port. Many, if not most, laptops are expected to follow suit this year and next.

(Credit:Lenovo)

Lenovo's top product manager for the popular ThinkPad line says USB 3.0 will go mainstream in 2012, while Intel sees the new Thunderbolt interface gravitating to some high-end nonmainstream laptop models.

This week, Lenovo began selling itsThinkPad X1, a 0.85-inch thick (thickest point), 3.8-pound design based on Intel's"Sandy Bridge"Core i5 and i7 processors.

Beyond the obvious attractions of a svelte, high-powered laptop, the X1 also sports an increasingly popular USB port based on the"SuperSpeed"3.0 specification. USB is one of the most widely used connection technologies in the world, found on everything from PCs totabletsto printers to smartphones. Peak speeds for USB 3.0 are about 10 times that of USB 2.0, the current standard.

"In 2012 USB 3.0 will be a mainstream technology,"Jason Parrish, worldwide product manager for Lenovo ThinkPad, said in a phone interview earlier this week."And we see 2011 as the transition year for USB 3.0 as it starts to come into more and more products,"he added. Other companies seem to agree.Dell's upcoming XPS 15zwill include two USB 3.0 ports.

Intel, for its part, has saidits support chips--called chipsets--will include USB 3.0 in 2012.

And what aboutThunderbolt, Intel's new interface, now featured on Apple's MacBooks and iMacs?"It's definitely an interesting technology. It's clever to use the same connector asMini Displayport,"Parrish said.

He continued."There's certainly not a desire to add more ports to a notebook, because it takes up space...We're talking to our customers...And assessing if Thunderbolt is the technology"they need.

Beyond today's MacBooks and iMacs, Intel sees Thunderbolt beginning life in the high-end consumer space--not in mainstream systems."The ecosystem is nascent,"said an Intel representative.

One market segment, for example, that may see Thunderbolt ports is ultrathin laptops, whose minimalist designs accommodate only a few connectors, the Intel representative said, echoing Parrish's comment above. Particularly, superthin designs that have thicknesses averaging about 0.7 inches.


Source

среда, 18 мая 2011 г.

Apple signs EMI, cloud-music deals nearly done

Apple is closing in on obtaining the necessary agreements with the top four record companies that will enable the company to launch a fully licensed cloud-music service, according to sources with knowledge of the talks.

Warner Music Group already had a deal in place with Apple, music insiders told CNET last month, and now music industry sources have said that Apple has a similar agreement with EMI Music, the smallest of the four record labels.

Sony Music Group and Universal Music Group are said to be close to completing their deals and they could be wrapped up as early as next week, the sources said. The source said it is highly likely the signed contracts will be in Apple's hip pocket next month at the company's Worldwide Developers Conference but whether the company will announce them there is unknown.

Apple will finish behind Amazon and Google in the race to the cloud but the company that gave the world theiPodand iTunes has the freedom to offer an array of features that rivals are prevented from rolling out because of the licensing restrictions, the sources said.

More to come


Source

вторник, 17 мая 2011 г.

McDonald's hires 7,000 touch-screen cashiers

McDonald's touchscreen kiosk

McDonald's shows off a touch-screen kiosk installed in France in 2009.

(Credit:McDonald's Europe)

"Welcome toMcDonald's. My name is HAL 9000. May I take your order?"

McDonalds recently went on a hiring binge in the U.S.,adding 62,000 employeesto its roster. The hiring picture doesn't look quite so rosy for Europe, where the fast food chain is drafting 7,000 touch-screen kiosks to handle cashiering duties.

The move is designed to boost efficiency and make ordering more convenient for customers. In an interview with theFinancial Times, McDonald's Europe President Steve Easterbrook notes that the new system will also open up a goldmine of data. McDonald's could potentially track every BigMac, McNugget, and large shake you order. A calorie account tally at the end of the year could be a real shocker.

The touch screens will only accept debit or credit cards, adding to the slow death knell of cash and coins. This all goes along with an overall revamp of McDonald's restaurants worldwide aimed at projecting amodern imageas opposed to the old-fashioned golden arches with a slightly creepy (to my taste anyway) clown guy hanging around the french fries.

This puts McDonald's one step closer to opening up its firstAlphavillelocation. At least our new computer overlords will be nice enough to serve us a Filet-o-Fish. Maybe they'll even throw in aniPadwith the Happy Meal one of these days.


Source

понедельник, 16 мая 2011 г.

Google App Engine goes for Go language

Gordon, Google's Go gopher mascot

Gordon, Google's Go gopher mascot

(Credit:Google)

Go, Google's experimental programming language, is coming to the company's App Engine cloud-computing service--and a bit closer to reality in the process.

Google hopes touse Go to tackle modern programming challengessuch as getting useful work out of chips with multiple processor cores. Getting new languages to catch on is difficult, though--it took Sun Microsystems years with Java, and its Fortress never really caught on widely.

But incorporating Go into App Engine could help make it more relevant, or at least easier to test out, by reducing the hassles involved in trying it. App Engine is a service for running software on Google's infrastructure--a higher-level foundation than the nuts and bolts Amazon Web Services provides, but a lower level than full-fledged applications such as Google Docs.

The company announced the Go move last week at theGoogle I/O showand released anew Go software development kit (SDK)to let programmers try it out. So far, though, the SDK is as far as the average person can get, because Google hasn't publicly released the service.

"You don't even need to have Go installed beforehand because the SDK is fully self-contained. Just download the SDK, unzip it, and start coding,"said Go team members David Symonds, Nigel Tao, and Andrew Gerrand on theGo blog."We will soon enable deployment of Go apps into the App Engine hosting infrastructure...Once full deployment is enabled, it'll be easy to push your app to Google's cloud."

App Engine started with the ability to run software written in Python, a popular language within Google. Second came Java, which is widely used to run server software. Go, while not the fixture of mainstream computing the first two languages are, has attracted avery active programming community. The language is an open-source software project.

Go on App Engine can handle the full go language and, when programs run, they can tap into most of the standard suite of libraries of pre-built tools that come with Go. In addition, Go is adapted for several App Engine features designed to let applications run at large scale, such as theDatastore interfacefor storing information in a database.

However, some elements of Go are missing for now--including one part of the Go sales pitch, the ability to spread jobs more easily across multiple threads that run in parallel.

"Although goroutines and channels are present, when a Go app runs on App Engine only one thread is run in a given instance,"the Go team members said."That is, all goroutines run in a single operating system thread, so there is no CPU parallelism available for a given client request. We expect this restriction will be lifted at some point."

Even in its preliminary form, Go should appeal to some coders, said

"It's...an interesting new option for App Engine because Go apps will be compiled to native code, making Go a good choice for more CPU-intensive tasks,"said Google's Scott Knaster in aGoogle Code blog post."Plus, the garbage collection and concurrency features of the language, combined with excellent libraries, make it a great fit for Web apps."


Source

воскресенье, 15 мая 2011 г.

Hiccups dog PlayStation Network restoration

PlayStation Network breach

Sony may have more work to do to jumpstart service to itsPlayStationNetwork.

The entertainment and electronics giant announced yesterday that its entire portfolio of online games, game forums, and Web sites wouldgo back online today. However, after service resumed today, users started complaining on Twitter today that the service wasn't active long before it was unavailable again.

"Playstation Network was back up for about 10 minutes before going down again for maintenance,"Tom Cranfieldtweeted."Nice work Sony!"

"Playstation Network is Back down looks like the servers have crashed,"Lee Fraserof Manchester, England, said in a Twitter post.

Sony's PlayStationEU twitter feed asked users to be patient.

"Please bear with us as we continue working on #PSN restoration. We are experiencing extremely heavy traffic,"thefeedsaid.

The service had been offline for nearly four weeks afterseveral of Sony's servers were attackedbetween April 17 and April 19, leading to the exposure of the personal data of more than 100 million customers who signed up for PlayStation Network, Qriocity, and Sony Online. The networks--used for downloading and playing games, movies, and music--were mysteriously unavailable for nearly a week before Sony revealed the intrusion. The company has said repeatedly that there is no evidence thatcredit card information was stolen.

Sony said its network services would be unavailable while it beefed up its security and announced earlier this week that it planned to restore them"in the next few days."The company has still has not identified the perpetrator behind the second-largest security breach in U.S. history, but it hinted it believes the hacker activist group Anonymous may have been behind the breach.

{Via Huffington Post}


Source

среда, 11 мая 2011 г.

Chromebook tries to remake the small laptop

Google has taken a big step in trying to redefine the small laptop, making it purely Web-centric, untethered to the Windows past.

Chromebooks are, in effect,tabletswith keyboards, as Hugo Barra, director Android Product Management at Google, said today at Google's I/O developers conference, streamedhere. That's a key point of departure from the traditional small Windows laptops, aka, Netbooks.

"Attributes that make phones and tablets great...we're bringing this to notebooks,"he said.

Those attributes include Cloud-based apps, extreme portability, built-in 3G connectivity, instant-on, and all-day battery life--all hallmarks of tablets likeApple's iPadand Motorola's Xoom.

Acer's Chromebook starts at $349 and 2.95 pounds. It runs Google's Chrome OS on top of an Intel dual-core N570 Atom processor.

Acer's Chromebook starts at $349 and 2.95 pounds. It runs Google's Chrome OS on top of an Intel dual-core N570 Atom processor.

(Credit:Acer)

The Netbook, on the other hand, has been, since its debut in 2007, essentially a conventional Windows laptop, just smaller. Google's focus on instant-on, instant Web connection is a seemingly trivial feature but a key difference between traditional laptops and so-called post-PC devices, like the smartphone and tablet.

"Every Chromebook is instant turn on. Every time you boot up, you're up and running within eight seconds,"Barra said.

In this respect, Google may succeedwhere Qualcomm's"smartbook"failed. That laptop actually aspired to many of the same things but never became a viable commercial product.

But the Chromebook's novelty can potentially be a weakness. Particularly for businesses and educators still tied to Windows. Google is trying to address that with Web-based management features."Seamless updates directly from Google keep the operating system and software fresh, eliminating the need to manually patch systems,"Googlestates on its Chromebook page."And since only minimal data is stored on the device, you don't need to do tedious backups or migrate data when changing hardware,"according to Google.

Google is also employing security features such as secure tabbed browsing (called"sandboxing"), user data encryption, and verified boot.

Both Acer and Samsung will release Chromebooks June 15running the Chrome OS on top of Intel's latest dual-coreAtom N570 processor. And the N570 is a step up from the single-core Atom that powered theprototype CR-48Chromebook, distributed to journalists, among others, in December.

Chromebook features:

  • Pricing starts at $349 (Acer)
  • Web-centric Chrome OS, automatically updated, maintained by Google
  • About 3 pounds or less
  • Dual-core Atom 1.66GHz N570 processor
  • 16GB solid-state drive (mSATA)
  • HDMI port
  • 11-inch and 12-inch class displays
  • All-day battery life (Samsung and Acer specify about 8 hours)
  • Instant-on
  • Instant Web connectivity
  • 3G connectivity, pay as you go
  • Cloud-based apps, but key applications local like Gmail and Google Docs

Amazon is already listing Chromebookshere.


Source

вторник, 10 мая 2011 г.

Report: Apple to stick with Intel for MacBooks

A technical Web site posted an article yesterday asserting that Apple will not replace Intel processors with an alternative design anytime in the next two to three years.

This follows a reporton a chip rumor site last weekthat claimed Apple is"dumping"Intel and switching to chips based on the ARM design, the same silicon used in theiPhoneandiPad. That report said the transition would happen in that time frame.

While acknowledging Apple's history of transitions to new chip architectures and the ostensible motivations for moving to ARM,Real World Technologies'David Kanter argues that it won't happen for a long time (beyond three years), if at all.

Some salient points from the article:

  • Performance:Chips based on the ARM design, such as Apple's A series processors, won't be able to deliver the necessary performance to keep pace with Intel's x86 chips, according to Kanter. And, despite ARM's vaunted power efficiency, that may not be a big advantage as ARM chips get faster."There is no reason to believe that these efficiency advantages will scale for high-performance designs,"the article said.

  • Thunderbolt:The high-speed connection technology thatApple uses on its MacBook Prosand iMacs is based on Intel intellectual property: IP that the chipmaker is unlikely to license to ARM, Kanter said."Moreover, it seems unlikely that Apple would have consented to such an arrangement if they were planning to abandon x86 in the near future,"according to Kanter.

  • Expertise:Echoing commentsfrom Ashok Kumar, an analyst at Rodman and Renshaw, Kanter said that Apple is not a chip designer by nature and does not have the expertise to develop the very-high-performance chips required for MacBooks. Though past acquisitions of chip firms PA Semi and Intrinsity did give it"some chip expertise,"there isn't a lot of evidence that"their teams are prepared for a much larger and more complex project."

  • Gratuitous complexity:By adopting ARM chips for its MacBooks, Apple would consequently"split"its computer lineup: ARM for laptops and x86 for desktops, according to Kanter. That would result in unnecessary overhead for both Apple and consumers."That would increase their validation and support costs to deal with different hardware and software,"Kanter said.

  • Down the road, maybe:In the long term, anything can happen."Over 5-10 years, though, many of the technical and business hurdles may change,"he wrote. If an alternative chip design with clear advantages appeared, Apple would bolt to the new design with little hesitation--not unlike 2006, when Apple announced it was switching from IBM's and Motorola's PowerPC processors to Intel's because of the latter's undisputed power and performance advantages. ARM could find itself in the same position of power at some point."The ARM ecosystem is moving forward at a rapid pace, and Apple is watching carefully,"Kanter wrote.


Source

понедельник, 9 мая 2011 г.

Developers gather Tuesday in SF for Google I/O (live blog)

Google's annual developer conference Google I/O kicks off Tuesday at San Francisco's Moscone Convention Center.

(Credit:CNET/James Martin)

SAN FRANCISCO--Google's annual developer conference kicks off here Tuesday morning at the Moscone Center. And CNET will be covering the news live.

Thousands of developers will gather for two days--Tuesday and Wednesday--atGoogle I/Oto learn more about Google's technologies including Android, Google Chrome, Google APIs, Google Web Toolkit and App Engine, among others.

Google is always tight-lipped before the conference about the keynote speakers and news that it will announce. And this year is no exception. Android Atlas blogger Scott Websterposted his predictions for possible newsat Google I/O a couple of weeks ago. While we don't know for certain what will be announced at the developer conference, we do know it will be newsworthy.

CNET is sending a team of reporters and reviewers to Google I/O to cover the news. So join us Tuesday morning for the opening keynote address that starts at 9 a.m. Pacific as we use the Cover It Live tool to live-blog the event. The link below will take you to the live blog. You can also sign up for a reminder below.


Source

воскресенье, 8 мая 2011 г.

Google goes all gooey for Mother's Day

These days, Google is working very hard to find its inner self. You know, that inner core that might be human.

First, the companycreates warm, touching filmsfor Chrome.

And now, to celebrate Mother's Day (that's today, in case you forgot, you insensitive, ungrateful child) Google has found a gooey inner core.

(Credit:Screenshot: Chris Matyszczyk/CNET)

First, the companyhas produced a doodlein which the logo drifts into a lavendery lilac and the 'l' of Google becomes a lovely deep purple flower.

However, not content with spreading this love, Googlies have extended their arms and their hearts toward their own mothers--the women who, for years, tolerated their children's love for Meccano, Lego, and braggadocio.

(Credit:Screenshot: Chris Matyszczyk/CNET)

This page,Google.com/moms, lays bare the faces of those who bore the world's future engineers. In their pictures, most of the moms are smiling, though one or two look like they were caught on a day when their offspring was being a little much--perhaps stating the obvious once too often.

The page begins with the words:"No search could find better moms than these."And then there's a strainingly gooey poem that might have come straight from a Hallmark card, but is credited to the great hotelier, Howard Johnson. (Oh, perhaps it's not that Howard Johnson.)

You see, Googlies have feelings too. Yes, even social ones.


Source

суббота, 7 мая 2011 г.

Visualizing how Twitter spread news of bin Laden's death

infographic

Keith Urbahn (@Keithurbahn), the former chief of staff to Donald Rumsfeld, got the attention of New York Times reporter Brian Stelter (@brianstelter).

(Credit:SocialFlow)

Thousands of wordshave been written this week about how Twitter had the first reports that the United States had found and killed Osama bin Laden, but a start-up called SocialFlow has published a fascinating visual look at how the news originated and spread on Twitter.

At the center ofthe bin Laden Twitter stormthat erupted Sunday night is Keith Urbahn (@Keithurbahn), the former chief of staff to Donald Rumsfeld who tweeted at 10:25 EST,"So I'm told by a reputable person they have killed Osama Bin Laden. Hot damn."

Despite being relatively unknown outside of political circles and having just over 1,000 followers, Ubahn's credibility led to 80 retweets within one minute, including one from New York Times reporter Brian Stelter, reports SocialFlow. The company analyzed 14.8 million tweets and bitly links to understand the impact of a single tweet, starting from when news of the unplanned presidential address broke at 9:46 p.m. EST to when Obama finally gave his speech at 11:30 p.m. EST.

Related links
Twitter delivers news of bin Laden's death first
News agencies don't race Twitter on bin Laden
Bin Laden, Twitter, and the frenzy of noise
Sohaib Athar on Twitter fame after bin Laden raid (Q&A)
Bin Laden's death and the Web response (roundup)

Less than one minute after seeing Urbahn's tweet, Stelter (@brianstelter) tweeted:"Chief of staff for former defense sec. Rumsfeld, @keithurbahn, tweets:"I'm told by a reputable person they have killed Osama Bin Laden."Hundreds of Stelter's 50k followers retweeted him or replied to him. After two minutes, more than 300 people had retweeted Urbahn's tweet. The rest is history.

SocialFlow concludes:"Keith Urbahn wasn't the first to speculate on bin Laden's death, but he was the one who gained the most trust from the network. And with that, the perfect situation unfolded, where timing, the right social-professional networked audience, along with a critically relevant piece of information led to an explosion of public affirmation of his trustworthiness."

The full report on SocialFlow's siteis a great read for anyone fascinated by the rise of Twitter's influence and power, plus the visuals the company put together to illustrate the phenomenon are worth a look.


Source

четверг, 5 мая 2011 г.

Sony details ID-theft monitoring for PSN, Qriocity customers

Sony today released specific details regarding the identity-theft monitoring promised to its customers whose personal information was exposed in a cyberattack against the company's servers.

Sony has made a deal with identity-protection firm Debix to offer a service called AllClear ID Plus for free to U.S. customers registered withPlayStationNetwork or Qriocity prior to the attack two weeks ago, Sony spokesman Patrick Seyboldwrote in a blog posttoday.

Customers will be able to enroll in the program through an activation e-mail they'll receive"over the next few days."Registration will be open till June 18.

Sony says this offer applies only to U.S. customers, but it is working on similar offers for PSN and Qriocity account holders in other countries. Sony did not mention whether a similar offer would be made to Sony Online customers whose information was also exposed.

Sony says it doesn't know who orchestrated what it's callinga"highly sophisticated, planned"attackthat exposed the records of more than 100 million of its customers two weeks ago. The company is still working to retool its servers and bring PlayStation Network and Qriocity back online. Sony said today it is in the"final stages of internal testing"before restoring service.

Sony said over the weekend that it planned other waysof compensating customers, though no further information was included in today's update.

On the weekend, Sony said that in addition to ID-theft monitoring, it would offer some free downloads and 30 days of free PlayStation Plus premium service to Sony customers affected by the breach. Qriocity Music Unlimited subscribers will also get free service for 30 days.


Source

среда, 4 мая 2011 г.

Facebook, Google eye Skype deal

Facebook and Google are reportedly pondering either an acquisition of Skype or a joint venture and strategically the two buyers couldn't be more different.

Reuters reports thatFacebook and Google are pondering some sort of deal with Skype, which delayed an IPO. Talks are very early so it's unclear what will happen if anything.

But let's zoom out a bit. If you have been following Skype's corporate strategy of late, it's clear the company is making a lot of nice business-to-business moves. Skype has a channel, key partnerships and an entry to small businesses as well as large ones.

Read moreatFacebook, Google eye Skype deal: Consumer vs. corporate tug of war.


Source

вторник, 3 мая 2011 г.

Using game mechanics to solve healthcare problems

Plenty of teens can tell you about the therapeutic benefits of video games. Healthcare companies are increasingly looking at the value of games too.

That's because games offer incentives that healthcare providers can harness to alter patient habits."Health behavior change is hard,"Alex Tan, a senior interaction designer at frog design, said at the Innovation Learning Network conference for healthcare providers in Seattle hosted by the design consultancy."It's frustrating. There's extra work."

Healthcare providers can use the tools of game design to innovate in prevention and treatment. That's important because patient behavior often gets in the way of their recovery. Physical therapy after surgery can be grueling, leading many patients to forgo or delay it. Busy schedules can often get in the way of taking medication or checking important gauges of health such as blood-glucose levels.

Re-mission cancer-fighting video game

Tan works with healthcare providers on building game mechanics into products. When faced with competition, timers and progression measurements, all the tools of game design, patients perform better."Games get people engaged,"Tan said."They will play for hours and hours."

Take Expresso Fitness exercise bicycles. The indoor training cycles come with a video game that users navigate by pedaling. They get points by chasing and catching dragons, for example, or picking up coins. Cyclists spin faster and longer."You're very focused on the game and not on your pedaling,"Tan said.

Some games simply educate patients about treatments, which helps them follow proper protocols. HopeLab created Re-mission, a first-person shooter game, where a pilot named Roxxi travels through the bodies of cancer patients destroying cancer cells, battling bacterial infections, and managing treatments. It's not Call Of Duty, to be sure. But studies have shown that cancer patients who played the game at least one hour per week maintained higher levels of chemo in their blood and took their antibiotics more consistently.

"This isn't just blue sky thinking,"said Teaque Lenahan, frog's director of business development."There really are a lot of opportunities."


Source

понедельник, 2 мая 2011 г.

News agencies don't race Twitter on bin Laden

Screen shot from CNN.com. Journalism experts say that Twitter can be a valuable at distributing information but can't replace solid news gathering from trusted sources.

(Credit:Screen shot by Greg Sandoval/CNET)

Wolf Blitzer and other CNN reporters were digging into whetherOsama bin Ladenwas dead at least an hour before the news appeared at Twitter, an executive from the cable-news network said.

Why should you care? If you value getting the facts straight, you should. Twitter is once again being credited for outracing traditional news sources on a major story. The first published report that bin Laden was dead apparently came in the form of a Twitter post fromKeith Urbahn, a former aide to Donald Rumsfeld, the former U.S. defense secretary.

As with other stories where Twitter appeared to get the scoop on a big story, pundits are once again questioning whether Twitter is a legitimate news source or a threat to traditional news agencies. Does it pressure journalists to speed up the reporting process, which could lead to more errors in stories?

The truth is somewhere in the middle. Twitter users and professional news gatherers seem to have formed a mutually beneficial relationship in disseminating news. Twitter enables eyewitnesses or participants of important events to alert the public as well as reporters. We saw that when Chesley"Sully"Sullengberger ditched his commercial aircraft in New York's Hudson River in 2009. The first photos and reports came from Twitter users. Later on, news agencies helped provide important details and fill in the blanks.

But participants in news stories who turn themselves into citizen journalists don't occur on most stories. It's unlikely that any of the participants in the early morning attack on the compound in Pakistan where bin Laden was hiding posted to Twitter. One witness who was staying in the area near the attackheard explosionsfrom the raid and helicopters flying over but his posts only made sense after professional news organizations provided the meat of the story.

Even with the obvious value of Twitter, Americans still turn to the media sources that over time have earned their trust. CNN reported that between Sunday evening when news broke about bin Laden's death through 1 p.m. ET today CNN.com generated 88 million global page views, a 217-percent increase over the four-week average for the same time period.

An informal and highly unscientific poll by CNET showed that out of more than 4,700 people who responded, 30 percent of them learned of the attack on bin Laden from television. The next largest group heard about it through word of mouth and that was followed by Web news sites. Facebook and Twitter each informed 14 percent of respondents.

Old media's influence is perhaps best illustrated by Urbahn. He acknowledged on Monday that he obtained the information he posted to Twitter, not from any of his White House contacts, but from an unidentified news agency employee.

Of course, it's not true why a news outlet give up information to someone else and allow that person to scoop them on Twitter. We don't know for sure, but it's easy to see a situation where a reporter may have passed along the information to Urbahn without considering that he would distribute it to potentially millions on Twitter. What we do know is that reporting news stories first is becoming less of a concern in the age of rapid-fire and often erroneous news stories, said Kelly McBride, a news gathering expert for the Poynter Institute, a journalism think tank.

"Who gets it first is becoming less important,"McBride said,"because for the most part who is first isn't as important anymore as who is answering their audience's most important questions."

Related links
Bin Laden, Twitter, and the frenzy of noise
Bin Laden's death and the Web response (roundup)
Twitter delivers news of bin Laden's death first

To be sure, Twitter can boast that it was home to the first report of bin Laden's death but it was also used to circulate scores of false reports. Some Twitter followers reported that they were led to believe bin Laden was killed a week ago or that it was Libyan leader Muammar Gaddafi who had been killed.

If Twitter is quicker at delivering news, traditional news outlets want to provide higher quality information and more context than can be delivered in 140 characters, said Sam Feist, CNN's political director who was running the news operations there last night."Our mantra,"he said,"is that it's better to be right than first."

That said, CNN strives to gather facts and deliver them to viewers as rapidly as possible. Feist began scrambling reporters after the news agency received a tip at 9:40 p.m. ET that the president would address the nation. Feist said two top correspondents were at a Washington Capitals pro hockey game when he called and asked them to start working their sources.

It wasn't long before CNN knew that bin Laden was the focus of the president's speech and reporter received little help from Twitter."We saw Twitter feeds that went off in all kinds of directions,"Feist said. He only made the decision to go with the story that bin Laden was dead after reporters, including John King, chief national correspondent, had confirmed the story from numerous high-level sources.

"We knew this broadcast would be seen around the world by friends and enemies of the United States,"Feist said."We knew that potentially millions of people would be watching the program last night. Where you have to be positively correct, we check and double check our information. This was a very important story and we needed to be absolutely sure."

McBride said in many editors are learning that in a world where news can be posted to Twitter in seconds, it's not realistic to expect reporters to win the race for scoops every time.

When they've tried in the past to do that big reporting mistakes are made, she said.

"After these errors, everybody renews their commitment to veracity,"McBride said."This does help news agencies create a threshold for when it's good to publish and when it is not."


Source

воскресенье, 1 мая 2011 г.

Repairs ground Endeavour at least a week

KENNEDY SPACE CENTER, Fla.--Engineers have traced an electrical problem blamed for grounding the shuttle Endeavour Friday to a power distribution box in the ship's engine compartment, officials said today. Replacing the box will delay launch until at least May 8--Mother's Day--and possibly later.

"I'm here to disappoint everybody by saying I'm not going to tell you what the new launch date is because I have no idea,"Mike Moses, chairman of NASA's Mission Management Team, told reporters after engineers decided on a course of action."We have a lot to evaluate, both the work to do, the R&R (removal and replacement), the retest that has to be done, how we work all that schedule in.

A technician works in the shuttle Endeavour's cramped engine compartment where a suspect power distribution box is located. Work to replace the box will delay another attempt to launch Endeavour to at least May 8 and possibly longer.

(Credit:NASA)

"But we can tell you pretty much it's not going to be any earlier than the 8th. That doesn't mean we're going to go launch on the 8th, that just means we know right now the 8th is our next available opening,"he said.

Launch Director Mike Leinbach said engineers plan to remove the suspect aft load control assembly--ALCA-2--box from Endeavour's cramped engine compartment tomorrow, install a replacement Tuesday and get into a complex re-test procedure Tuesday night or early Wednesday.

To make a launch at 12:09:17 p.m. EDT on May 8, NASA would have to start a fresh three-day countdown around 10:30 a.m. Thursday. Whether the team can complete the ALCA-2 swap-out and re-test in time remains to be seen.

But if Endeavour does not make May 8, launch likely would move to May 10. A launch on May 9 could result in the shuttle undocking from the International Space Station on May 23, the same day a Russian Soyuz crew ferry craft is scheduled to depart. There are no known conflicts for subsequent launch opportunities.

In the meantime,"the team is upbeat,"Leinbach said."A little disappointed, of course, that we couldn't launch. But responding to problems is one of the things we do best around here and the team always likes a good challenge. I'm sure we're going to be really glad when Endeavour's finally on orbit but right now, the team is upbeat and ready to execute the plan that we've laid out."

The aft load control assembly electrical switching box is located on the right side of the shuttle's engine compartment.

(Credit:NASA)

Endeavour commander Mark Kelly and his crewmates--pilot Gregory H. Johnson, Michael Fincke, Gregory Chamitoff, Andrew Feustel, and European Space Agency astronaut Roberto Vittori--flew back to Houston early Sunday aboard a shuttle training aircraft to participate in additional ascent simulations later this week.

"Things happen fast,"Johnson said in a Twitter update."We are now all aboard an STA for return to Houston. Be back in a few days. More to follow."

Endeavour was grounded Friday during the final hours of the countdown because of telemetry indicating multiple fuel line heaters used by one of the shuttle's three hydraulic power units were not activating normally. The heaters are needed to keep the lines from freezing and possibly rupturing in flight.

The shuttle is equipped with three auxiliary power units, providing the hydraulic muscle to move the ship's engine nozzles, wing elevons, rudder, tail fin speed brake, body flap, landing gear brakes and nose wheel steering system. The shuttle can safely fly with a single APU, but flight rules require full redundancy for a countdown to proceed.

Likewise, each of the shuttle's three APUs is equipped with redundant heater"strings"and only one channel is required for normal operation. But again, the flight rules require redundancy to protect against a subsequent failure that could knock the system out of action.

Early Saturday, engineers ruled out a problem with the fuse panel in the shuttle's cockpit that routes power to the APU circuitry. That left two possible culprits: one or more faulty heater control thermostats or the aft load controller assembly the heater circuitry runs through.

To find out if a faulty thermostat was to blame, engineers working in Endeavour's cramped engine compartment Saturday afternoon sprayed compressed air on APU No. 1's B-channel heater thermostats to lower their temperature enough to find out whether they would cycle on or not. They did not, but that could have been the result of a wiring problem or a bad connector. Additional tests were carried out overnight and no such problems were found.

Engineers met early Sunday and recommended replacing the ALCA-2 box.

"The box will come out tomorrow and we'll send it down to our malfunction lab for a detailed inspection,"Leinbach said."The new box goes in on Tuesday...And then after that, we get into the re-test Tuesday night, Wednesday, that kind of timeframe. It's going to be a full two days of re-test."

The shuttle's electrical system features three main circuits, or buses, for redundancy. As a result, three aft load control assemblies are present in the engine compartment.

Each 50-pound box includes dozens of power switches that route electricity to components in nine major systems, including the auxiliary power units, the environmental control and life support system, solid-fuel booster electronics, the shuttle's main engines, its orbital maneuvering system rockets and flight control systems.

The box is located just forward of a right-side engine compartment access door and Leinbach said the replacement operation was not particularly difficult. An ALCA was changed out during a 1995 shuttle launch campaign and engineers will use the same procedures for Endeavour.

The issue for NASA is the time needed to complete testing to make sure the myriad subsystems downstream of the box are receiving power as required.

"Anytime you break connection to a box like this, you essentially invalidate all the testing we did up to that point,"Leinbach said."You could take the tack of saying all you're doing is replacing the box and everything downstream of that box should be fine. Well, that's true, But our requirements, the way we do business is whenever we break a connection we go back and retest it.

"That's just the prudent thing to do and the way our requirements are set. So we have to retest every one of those nine systems. The details within those systems, you could probably write a thesis on how many individual tests there are within those nine systems. And that's why it takes so long."

Assuming NASA sticks with a May 8 launch, Endeavour would dock with the International Space Station around 9 a.m. on May 10 and the mission's primary payload, a $2 billion particle physics detector, would be attached to the lab complex the next day.

The mission's four spacewalks would be carried out May 12, 14, 16 and 18, before undocking around 2 a.m. on May 20. If that schedule holds up, landing back at the Kennedy Space Center would be expected around 6:30 a.m. on May 22.

But NASA managers plan to extend Endeavour's mission by two days, if possible, to give the shuttle crew time to help their space station counterparts with needed internal maintenance. In that case, undocking would slip to May 22 and landing would be expected before dawn on May 24.


Source

суббота, 30 апреля 2011 г.

'Clippy' alive? Siting raises questions, fears

If Clippy isn't buried here, who--orwhat--is?

(Credit:Screenshot of Microsoft promo video by Edward Moyer/CNET Center for Investigative Reporting)

In a mysterious turn of events worthy of Elvis Presley,"Clippy,"everyone's least favorite talking paper clip cum animated software assistant, appears to be the star of a new Microsoft initiative--despite the fact that he's supposedly been dead since 2004.

GeekWire's Todd Bishopspied the fastenerin what he reports is--gasp!--Microsoft's new training tool for Office, a game called Ribbon Hero 2. Clippy even appears to get top billing--the game's official name, Bishop reports, is Ribbon Hero 2: Clippy's Second Chance (a title that's sure to send shivers down the spine of many an Office user).

It's not the first time the aroma of conspiracy has wafted around the cloying length of wire. A month after Clippy'ssupposed 2001 oustingfrom Microsoft's flagship software suite (and his supposed move to jobs as a cab driver and a UPS deliveryman), a duo of crack CNET investigative journalistsrevealedthat the fastener had somehow made his way into Office XP.

Just last year, a promotional video for Office 2010 showed whatappeared to be Clippy's grave site, replete with a deceased date of 2004.

It's not clear why Microsoft would stage the paper clip's death, but it's equally unclear how said clip would manage to return from the grave. As evidence of Clippy's continued existence, Bishop points to the video below, supposedly the work of Microsoft, and tothis blog itemby one"Doug Thomas,"supposedly an employee of the software giant. We offer them for your own examination and speculation, while we investigate the issue further.

Another question that arises is: If Clippy is in fact alive, who--orwhat--was buried in his place? Most unclear of all, however, may be the question: Why on Earth would Microsoft let Clippy--let alone anundeadClippy--helm a training video for Office?

Perhaps our readers can help clear things up by offering their theories in the comments section below.


Source

пятница, 29 апреля 2011 г.

Anonymous to target Iran with DoS attack

Anonymous says its next target is Iran.

Anonymous says its next target is Iran.

The hacker group Anonymous has its next denial-of-service (DoS) target in sight: Iran, CNET has learned.

Members of the loosely organized group are planning"Operation Iran,"an attack designed to shut down Iranian Web sites beginning Sunday, according to their latestonline proclamation. May 1 is International Worker's Day.

"The people of Iran have the admiration of Anonymous, and the entire world,"the statement says."We can see that Iran still suffers at the hands of those in power. Your former government has seized control, and tries to silence you. People of Iran--your rights belong to you."

The operation seemed to already have begun late today with Web page defacements ostensibly targeted at Iranian hackers. Anonymous left messages on several Web sites that had allegedly been previously attacked by the Iranian Cyber Army, includingthe siteof a Canadian information systems firm and the site of aUkrainian dancing group, according to an observer on an Anonymous Internet Relay Chat channel that members use to coordinate their operations.

Anonymous is known for its renegade cyberattacks in defense of perceived underdogs or to support freedom of expression or other anti-establishment causes. In defense of whistle-blowing site WikiLeaks, the group targeted PayPal, Visa, MasterCard, and other companieslate last yearthat had stopped enabling WikiLeaks to receive contributions.

Earlier this month, Anonymoustargeted Sonyin protest of the company's treatment ofSony PlayStationhacker George Hotz. Hotz and Sony have since settled the lawsuit Sony filed, and Anonymous has denied any involvement in arecent serious breachthat exposed information of millions of Sony PlayStation Network customers.

Other Anonymous targets have been:Broadcast Music Inc., the Church of Scientology; the governments of Egypt, Iran, and Sweden; the Westboro Baptist Church; conservative activist billionaires Charles and David Koch andtheir companies; as well as security firm HBGary Federal, which had reportedly been working with the FBI to identify the leaders of Anonymous.


Source

четверг, 28 апреля 2011 г.

Google sued over Android data location collection

Two Michigan women are suing Google over location data collected by Android devices, a week after Apple was named in a lawsuit citing privacy violations with theiPhonelogging similar data.

The $50 million lawsuit against Google seeks to stop Google from selling phones with software that can track a user's location, the Detroit Newsreported today.

The lawsuit was filed yesterday in U.S. District Court in Detroit on behalf of plaintiffs Julie Brown and Kayla Molaski, who are seeking class action status for the suit. Their lawyer, Steven Budaj, argues in the complaint that the tracking of Android owners' location"puts users at serious risk of privacy invasions, including stalking."

Google acknowledgedlast week that it collects location information--including GPS current location, timestamps, nearby Wi-Fi network addresses, and device IDs--from Android devices but said it was not traceable to a specific individual. Users can disable the GPS feature, but then they won't get as much function out of maps and other location-based services.

Google representatives did not immediately respond to an e-mail seeking comment on the lawsuit this afternoon.

Thelawsuit against Applefiled in Florida last week also seeks class action status and accuses Apple of violating privacy laws, as well as the Computer Fraud and Abuse Act by keeping a log of user locations without offering users a way to disable that.

The matterfirst came to lightlast week when two researchers said they had discovered that the iPhone collects and logs current and historical location information without user permission or warning, and stores it unencrypted on the device.

In addition to the lawsuits, the controversy has prompted lawmakers toseek an FTC probeof the issue and questions from attorneys general in Connecticut andIllinois.

After a week of silence, Apple finally spoke up about the matter,explaining in an FAQthat it was collecting the data to get more accurate location data for eventual use in a traffic database and blamed a software bug for storing an excess amount of it on the devices.


Source

среда, 27 апреля 2011 г.

Study: Google to take Apple's app crown by July

(Credit:Distimo)

Apple frequently touts the number of applications available to iOS users, which now sits north of 350,000. But that number could be in danger of coming in second place to rival Google in just a few months time.

In a new report by market research firmDistimofor the last month of activity on Apple's various App Stores, the BlackBerry App World, GetJar, Google's Android Market, Nokia's Ovi Store, Palm's App Catalog and Microsoft'sWindows Phone 7Marketplace, the group found Google and Microsoft's efforts to be growing the fastest.

"If all application stores maintain their current growth pace, approximately five months from now Google Android Market will be the largest store in terms of number of applications followed by the Apple App Store foriPhoneandiPad, Windows Phone 7 Marketplace, BlackBerry App World and Nokia Ovi Store,"the firm said in its findings."The Windows Phone 7 Marketplace will also be larger than the Nokia Ovi Store and BlackBerry App World prior to the Windows Phone 7 Marketplace being available for even a full year."

Distimo's research found that Google has already made headway on attacking Apple on the volume front, pushing past the App Store with 134,342 free applications versus the App Store for iPhone and iPod Touch's 121,845 free applications. The firm estimates that Google will be 40,000 applications short of evening out with Apple's overall volume by the end of June, and will catch up completely in July.

Distimo notes that any growth estimates are gauged on the past three months of activity across the ecosystem, which"could easily accelerate or slow down."

Not included in that calculation are sales and app volume counted from Amazon'srecently-launched Appstore, which is not to be confused with Apple's"App Store"(ason-going litigation points out). Amazon launched it'scurrentlyAndroid-only mobile application store near the end of last month, which would make it too late to included in this round of tracking. Amazon's store contains many of the same apps available on the Android Market, though could end up building up a library of exclusives over time.

Along with the volume tracking, Distimo's report released a year's findings about Apple's App Store for the iPad, which it says reached 75,755 applications at the end of March. 30 percent of those applications are free, the firm said, with the average price for paid apps hitting $5.36.

Interestingly enough, that $5.36 number is up from the early days of the store, when the average was $4.34 per paid application. Distimo says the trend is unusual, since other application stores tend to have a lowering average price as app volumes get higher."This is likely because the games category (which has generally had a high in-app purchase adoption rate) has lost some of its prominence to other categories,"the report said.

Based on Distimo's data, books reign as the supreme category on the iPad as of the end of March, with 16,712 book applications. Games come a close second at 13,861 applications. From there it drops off to education, followed by entertainment and lifestyle applications. Worth a mention here is aseparate studyfrom forecast firm Simba released earlier today, which found that nearly 40 percent of iPad owners haven't used the device for reading e-books. Most said they used their computer as a primary reading device.

Related:Android Market saw greatest surge in 2010


Source

вторник, 26 апреля 2011 г.

Seized Web sites won't end up like drug dealers' cars

When the government seizes a dope dealer'scar, it can then put the auto up for auction. But what happens when agents seize a Web domain?

ICE Director John Morton

(Credit:Greg Sandoval/CNET)

The U.S. Immigration and Customs Enforcement agency (ICE) said today that those sites seized for trafficking in counterfeit and pirated goods will now serve to help spread the government's message that"unfairly devalue America's contributions, compromise American jobs, and put consumers, families, and communities at risk."

The Obama administration and the U.S. Congress have declared war on online piracy and law enforcement agencies have seized over a 100 sites in the past year. Of that group, 65 domain names now direct visitors to a public service announcement.

For example, visitors to Dvdcollects.com, a domain seized in November 2009, will now be redirected to an announcement on ICE"s YouTube page. According to ICE, plenty of people are seeing these messages.

"There have been over 45 million hits to the seizure banner that notifies visitors that a federal court order has been issued for the domain,"ICE said in a press release.

ICE is one of the agencies that has been tasked with taking down sites accused of illegally distributing intellectual property. The agency said, however, that before it can start using the seized Web sites for its own purposes, it must give interested parties time to contest the forfeiture.

Interested parties can file a petition with a federal court, ICE said in its statement.

More to come


Source

понедельник, 25 апреля 2011 г.

Kibot the robot entertains kids, spies on them

Kibot

A child tries out Kibot the robot playmate during a launch event in Seoul.

(Credit:AFP Photo/Jung Yeon-Je)

Korean children, alreadyfast becoming a robot-friendly lot, have a new companion in Kibot, a monkey-faced bot that can read fairy tales, sing songs, take pictures, and make video calls via a display embedded in its tummy.

Wireless operator KT Telecom started delivering the multitasking monkey today for 485,000 won ($447), plus wireless packages that can be purchased in 12- or 14-month installments.

"It's really cute,"said my 9-year-old friend Stella, a co-worker's daughter who visited CNET's offices today."I would get one if it was in blue."(No luck; for now, it only comes in pink and gray).

Kibot (short for"kid's robot") isn't just for kids, however. Parents can also remotely control the 8-inch-tall wheeled robot via mobile phone and, using Wi-Fi, monitor their children (a feature that made Stella a tad apprehensive).

"If I was sleeping, it wouldn't be that comfortable if I knew someone was watching me,"she said."It would be freaky."

Big brother (or father) concerns aside, Stella thinks therobot playmate--which is aimed at kids younger than she is, 3 to 7--would be a hoot to have around.

She was especially excited by the video chat function, which lets kids make calls via the 1.3-megapixel front-facing camera simply by touching an RFID card bearing the picture of a familiar face (Mom, Dad, Grandma, Grandpa, and so on) to the device.

Kibot, which runs on a rechargeable battery and is manufactured by iRiver, has plenty of other tricks up its sensor-enabled sleeves, too.

It responds to gestures, like pats, by turning and pleasantly saying,"It feels good."When it encounters an obstacle, it can change direction to avoid it. It can take pictures and record and play back customized voices. It even serves as a language tutor for Korean and English. About the only things it doesn't do, seemingly, are scratch its head and swing from branch to branch.

Kibot

Kibot has a 3.5-inch display in its tummy.

(Credit:KT Telecom)

TheKibot home page (in Korean)offers about 300 children's songs, fairy tales, and animations. Upon purchasing Kibot, buyers automatically get 55 pieces of content; they can then select and download 10 additional pieces of media free of charge each month.

Robots and kids are not a new combination, of course. Telepresence robots havehelped sick children attend school, and bots havebabysatand been used toteach autistic childrensocial skills andassist youngsterswith motor deficits.

While KT Telecom is touting Kibot as an entertainment and communications hub and not a therapeutic device, it's also promoting it as a socialization tool.

"Before going to bed, my child puts Kibot by his bedside, and looks at it, and then falls asleep,"said a mother of a 4-year-old boy."Actually, he used not to fall asleep without me beside him. Nowadays, strangely enough, he sleeps alone well."


Source

воскресенье, 24 апреля 2011 г.

Russian police free kidnapped Kaspersky son

The kidnapped son of Kaspersky Lab's founder has been freed and five suspects are in custody in connection with the abduction, according to a Russian media report today.

Russian law enforcement officials freed Ivan Kaspersky, the 20-year-old son of Chief Executive Eugene Kaspersky, through a special operation with company security forces, according to theInterfax news agency.

"He has been freed without ransom,"a spokeswoman for the Moscow-based antivirus company told the news agency.

The younger Kaspersky, a fourth-year student of mathematics and cybernetics at Moscow State University, was kidnapped Tuesday morning on his way to work at InfoWatch, a company owned by his mother, Natalya Kaspersky, according to the English version ofPravda.ru. Someone claiming to be his abductor later reportedly phoned the father and demanded $4.3 million.

No further information about the suspects was available, and Kaspersky representatives did not immediately respond to a request for comment.


Source

пятница, 22 апреля 2011 г.

Google denies 'traceably' tracking Android devices

Google acknowledged today that it collects location information from Android devices, but downplayed concerns about privacy by saying the information is not"traceable to a specific user."

That claim, it turns out, depends on the definition of"traceable."

According to detailed records provided to CNET by a security researcher, Android phones regularly connect to Google.com and disgorge a miniature data dump that includes time down to the millisecond, current and recent GPS coordinates, nearby Wi-Fi network addresses, and two 16-letter strings representing a device ID that's unique to each phone.

Apple, whichcame under fire this weekafter reports that approximate location data is stored in perpetuity on iPhones, also collects it through the Internet. It acknowledged (PDF) to Congress last year that"cell tower and Wi-Fi access point information"is"intermittently"collected and"transmitted to Apple"every 12 hours, but has refused to elaborate. (See CNET'sFAQon the topic.)

Location tracking compared(Credit:Declan McCullagh/CNET)

Assembling a database of locationscan raise privacy concerns. While Android's device ID isn't a name or phone number, it uniquely identifies each phone and is linked to its whereabouts, which means that Google might be able to trace the location of an Android phone over months or even years. Less is known about what data Apple collects, including whether a unique device ID is transmitted.

A Google spokeswoman said she would not immediately be able to respond to a list of questions posed by CNET this afternoon. The company's statement says:"We provide users with notice and control over the collection, sharing and use of location in order to provide a better mobile experience on Android devices. Any location data that is sent back to Google location servers is anonymized and is not tied or traceable to a specific user."

"It's not tied to a user,"saysSamy Kamkar, who provided the Android connection logs to CNET."But it is a unique identifier to that phone that never changes unless you do a factory reset."

An Android setup screen references these ongoing location updates, saying that choosing to enable location services allows Google to"collect anonymous location data,"even when"no applications are running."But that disclosure does not acknowledge that a unique device ID is transmitted. (Seea screen snapshot.)

It's difficult to know how significant the privacy risks are. That depends in large part on whether Google anonymizes the location information and device ID that it collects from Android devices -- and, especially, how long data are kept.

Marc Rotenberg, executive director of theElectronic Privacy Information Center, is skeptical of Google's claim that the data are not"traceable"to a specific person."If you can link a person's address with their activity,"he says,"bingo! It's personal data."

Excerpts from Android connection-logging done by Samy Kamkar. CNET has redacted his device ID and Wi-Fi MAC address.

Excerpts from Android connection-logging done by Samy Kamkar. CNET has redacted his device ID and Wi-Fi MAC address. Click for a larger image.

Requesting cell phone location information from wireless carriers hasbecome a staple of criminal investigations, often without search warrants being sought. It's not clear how often legal requests for these records have been sent to Google and Apple, and whether the companies have required a judge's signature on a search warrant, the most privacy-protective approach, or settled for less.

The Android device ID can be tied to a person without a minimum of number-crunching, said Kamkar, a onetime hacker with a colorful past. Google can determine that"this is probably their home address because they're there at 3am every single day,"he said. And"this is probably their work address because they're there between 9am and 5pm every day."

Even though police are tapping into the locations of mobile phones thousands of times a year by contacting AT&T, Verizon, and other carriers, the legal ground rules remain unclear, and federal privacy laws written a generation agoare ambiguous at best. The Obama Justice Department has claimed that no warrant is required for historical location information. (CNETwas the firstto report on warrantless cell tracking in 2005.)

"I think it's important that people know what's happening"inside their phones, Kamkar said.

Like iOS devices, Android phones do collect location information in a local file. But they seem to erase it relatively quickly instead of saving it forever. Swedish programer Magnus Erikssonhas highlighteda portion of the Android source code suggesting a maximum of 50 cell tower locations are retained, which a source close to Google indicates is correct.

Here are the questions, still unanswered, that CNET posed to Google this afternoon:

I've been looking into this a bit more. It appears that Android phones send an HTTP POST data packet to Google, specifically this URL: http://www.google.com/loc/m/api

Included in the POST packet are a series of strings, including:

- carrier name

- time packet was sent down to the millisecond

- MAC address, name, signal strength of the WiFi network in use

- MAC address, name, signal strength for other visible WiFi networks

- lat/long GPS coordinates of the phone

- other lat/long pairs and times associated with them (showing motion)

- Two 16-byte strings that are uniquely tied to that Android device

The last field is the important one. It doesn't include a name or phone number, but it is traceable to a specific user. If I'm at a certain home address every evening, and at a certain work address every day from 9am-5pm, it's pretty clear who I am. :)

So my questions are:

- Why doesn't Google randomize those two 16-byte strings (let's call them the device ID) on an hourly or daily basis?

- Given a street address or pair of GPS coordinates, is Google able to produce the complete location logs associated with that device ID, if legally required to do so?

- Given a device ID, is Google able to produce the complete location logs associated with it, if legally required to do so?

- Given a MAC address of an access point, is Google able to produce the device IDs and location data associated with it, if legally required to do so?

- How long are these location logs and device ID logs kept?

- If they are partially anonymized after a certain time, how is that done, and can those records be restored from a backup if Google is legally required to do so?

- How many law enforcement requests or forms of compulsory process have you received for access to any portion of this database?

- Why have you assembled this location and device ID database? My current theory is that it shows traffic on Google Maps where street data would be otherwise unavailable (a very useful feature, but one that doesn't appear to require keeping fixed device IDs).

- How are the device ID strings calculated?

- Did Alma Whitten approve this form of device ID logging? If not, what internal process did you use to vet any possible privacy concerns?

- If Google knows that a Gmail user is connecting from a home network IP address every evening, it would be trivial to link that with an Android phone's device ID that also connects via that IP address. Does Google do that?

- Does Android store only a maximum of 50 cell records and 200 WiFi records?

Disclosure: McCullagh is married to a Google employee not involved in this issue


Source

четверг, 21 апреля 2011 г.

Software firm says e-mails stolen in server breach

Ashampoo, a German maker of Windows utilities and security software, warned this week that customer names and e-mail addresses were stolen and could be used in targeted malware attacks.

"Hackers gained access to one of our servers. We discovered the break-in and interrupted it instantly,"Ashampoo Chief Executive Rolf Hilchner wrote ina messageon the company Web site earlier this week.

Billing information, including credit card and bank account numbers, was not affected, he said, adding that German law enforcement is investigating but"unfortunately, the traces of the well-concealed hackers currently disperse abroad."

Attackers often send e-mails with malware-laden attachments to e-mail addresses found in the databases they breach, pretending to be a confirmation of an order from the company, Hilchner said.

The company did not disclose how many customers were affected.

People should be cautious about opening unsolicited or unexpected e-mails, even from companies they know, and keep antivirus software up to date, he said.

The news comes two weeks after dozens of big companies in the United States, including Citibank, Chase, Capital One, Walgreens, Target, Best Buy, and Verizon, warned customers about the potential for targeted phishing attacks in the wake of adata breachat e-mail marketing service provider Epsilon.


Source

среда, 20 апреля 2011 г.

Your iPhone's watching you. Should you care? (FAQ)

A peek at location data stored on an iPhone.

A peek at location data stored on an iPhone.

(Credit:Josh Lowensohn/CNET)

Researchers announced today that they found what look like secret files on theiPhonethattrack user locationand store it on the device, without the permission of the device owner. It's unclear what the data is used for and why Apple has been collecting it in iOS products that carry a 3G antenna for nearly a year now.

Alasdair Allan, senior research fellow in astronomy at the University of Exeter, and writer Pete Warden, who discovered the log file and created a tool that lets users see a visualization of that data, say there's no evidence of that information being sent to Apple or anybody else. Even so, the pair note that the data is unencrypted, giving anyone with access to your phone or computer where backups may be stored a way to grab the data and extrapolate a person's whereabouts and routines.

To help users understand more about the data that's being collected, what the risks are, and what they can do about it, CNET has put together this FAQ.

Who are the researchers and how did they find this?
Warden, who used to work at Apple (though not on the iPhone), and Allan had been collaborating on some location data visualization projects, including a visualization of radiation levels over time in Japan after the earthquake, when Allan discovered the file on an iPhone."After we dug further and visualized the extracted data, it became clear that there was a scary amount of detail on our movements,"they wrote in ablog post.

When did this start and what devices are tracking this data?
According to Allan and Warden, the tracking did not begin until iOS 4, which was released in late June 2010. This was the first version of iOS to drop support for devices like the original iPhone, with devices like the iPhone 3G and second-generationiPod Touchgetting a more limited feature set. Along with iPhones, 3G-enabled iPads are also keeping track of the data, though it's unclear if this is true for people who have 3G devices without active cellular subscriptions.

The tracking data itself was actually discovered last year.A toolby French programmer Paul Courbis, that's similar to the one released by Allan and Warden, is able to plot up to 10,000 of these data points from the database file to a Google Map. The issue was known in forensics circles but not widely, Allan and Warden said in a news conference this afternoon at the Where 2.0 conference in Santa Clara, Calif. An application they released that allows people to see what data is on individual devices makes the abstract tracking concept more real.

Did they contact Apple on their findings?
The researchers said they had contacted Apple's Product Security team, but hadn't heard back.

Where is this data being stored?
The database of location information is stored primarily on your phone, though due to the iOS device backup system in iTunes, these files can also end up on your computer. When iTunes saves these backups, which are set by default to be stored every time you sync an iOS device, the data file goes along with it.

(Credit:Josh Lowensohn/CNET)

What's curious is that this log can extend across multiple devices as long as those devices use the same restore point. Allan and Warden noted that the database used as part of the project spanned an iPhone 3GS and an iPhone 4, the latter of which had used a restore point.

The researchers have more technical details and the downloadable application to see a visualization of the data collected from your phone over timehere. The application does not work with iPhones on Verizon, the researchers said.

What's inside this data?
A database of cell tower coordinates and timestamps to indicate when your device was connecting with them. This includes what operator you're on and the country code. The research also found that Apple was tracking data about what Wi-Fi networks you were connecting to, which also included slightly less accurate location information, but continued to track that data by time. The researchers' visualization app shows large blue dots for frequent activity and smaller red or orange-colored dots for less frequent activity. However, it's unclear exactly what is triggering the logging, they said.

Is there an easier way to see that information than a giant database form?
Yes, Allan and Warden created an open-source software program that is able to go through the data from the database file and turn it into a visualization of what towers your device connected to based on the dates and times. The pair say the application intentionally cuts down on the accuracy of this data to keep the software from being used for bad things. You're also likely to see points in places you haven't been, since the tracking tools within the iPhone make use of nearby cell towers to triangulate location."As a data geek I was excited to have this data set, but I don't want anyone else to have this data,"Allan said.

What is the harm with this data being collected and stored on the device?
"By passively logging your location without your permission, Apple {has} made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements,"the researchers wrote in theirFAQ.

While acknowledging that there is no need to panic, the researchers noted that if someone gets hold of the device, they can access the unencrypted data."Your cell operator has this information,"they said in the news conference. Anyone who wants it has"to get a court order to get that from a provider. But now, all you have to do is lose your phone in a bar."

Apps on the device cannot access the data, because it is"sandboxed,"the researchers said. However, it could be accessed by software on the computer that holds the backup, they said.

How do I protect this data from being seen by others?
The data file itself is completely unencrypted, meaning anyone who gets hold of it can access the data freely. On the iTunes side, there's an option to encrypt your backups, which will keep someone who gets access to a backup file while rummaging through your hard drive from being able to dig through it and pull out the database file.

To enable that feature, click on the device icon when it's plugged into iTunes, then check the"Encrypt iPhone Backup"item in the"Options"area. As for your iPhone, oriPadwith 3G, your best bet is to keep someone else from getting it in the first place, and then using Apple's free"Find My iPhone"app to do a remote wipe if it's lost or stolen.

Turning on the backup encryption feature within iTunes can keep those who get access to the file from digging through it to pull out location information.

Turning on the backup encryption feature within iTunes can keep those who get access to the file from digging through it to pull out location information.

(Credit:Josh Lowensohn/CNET)

How do I turn this tracking off?
Right now there's no way to turn the tracking off, since it's a baked into the operating system. Turning off GPS will make the device less functional for location-based services such as mapping.

Can Apple do this?
According to the iTunesterms and conditions, yes. The company pretty clearly spells out its right to"collect, use, and share"location data any time it pleases. From the document:

Location-Based Services
Apple and our partners and licensees may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device. This location data is collected anonymously in a form that does not personally identify you and is used by Apple and our partners and licensees to provide and improve location-based products and services. For example, we may share geographic location with application providers when you opt in to their location services.

Some location-based services offered by Apple, such as the MobileMe"Find My iPhone"feature, require your personal information for the feature to work.

The location notifier, which lets users know if an application is using your location.

The location notifier in iOS, which lets users know if an application is using your location.

(Credit:Josh Lowensohn/CNET)

That said, the company made a big kerfuffle about making third-party application providers--as well as the built-in Google Maps application--alert users when location was being used by including an arrow in the status bar that is required to appear whenever the phone is sending or receiving location data. This feature came as part of iOS 4, which is when the company began the tracking process.

Apple CEO Steve Jobs also made it apointduringan interviewat the D8 conference last year that privacy was a topic of utmost importance to the company."Before any app can get location data, they can't just put up a panel asking if it can use location, they callourpanel and it asks you if it's OK,"Jobs said."That's one of the reasons we have the curated App Store. A lot of the people in the Valley think we're old-fashioned about this. But we take it seriously."

Why is Apple doing this?
Apple has not responded to requests for comment. Allan and Warden suggest the company has been using this tracking technology as a precursor to extended location-based services it plans to add as a part of a future version of iOS.

Backing that claim up is an Apple patent applicationthat surfacedback in February, which showed that Apple was considering a service called"Places."Based on the filing, the service would offer Apple device owners a way to locate one another using GPS. While there are third-party applications like Loopt, Foursquare, and Beluga that let people do this, such a feature would presumably be a built-in part of the phone, and rely on geodata logging for any past history features.

"There are legitimate use cases here, but the matter underscores the need for vendors to be clear about what data they collect and what they are doing with it,"said Kevin Mahaffey, chief technology officer of mobile security provider Lookout in a call with CNET.

Is Apple the only one doing this?
Android does not appear to do this, sources familiar with the platform said. A Google spokeswoman said the company had no comment on the matter. A Microsoft representative told CNET that the company's Windows Phone platform does not store location history, and that the"Find My Phone"service only keeps the phone's most recent location.

CNET asked Research In Motion and Nokia whether their devices track behind-the-scenes location data, but has not yet heard back from them. These platforms let users track their own movements with GPS apps, though it's unclear whether there's tracking going on behind the scenes.

Coming back to the greater issue about location grabbing, Apple is not the first company to collect data without users knowing. Google got in hot water last year after admitting that it wascollecting datafrom non-password-protected Wi-Fi networks for three years as part of its Street View project. As the Street View car with the camera on top would drive around, collecting imagery, it was also sniffing out information about nearby open networks. Following the privacy probes that came as a result of the disclosure, Googlestopped the practiceback in October.

Any questions we didn't cover? Feel free to leave them in the comments, or shoot us an e-mail and we'll try to get them answered.


Source