Sunday, January 15, 2012

1 in 7 humans will be on Facebook by August


1 in 7 humans will be on Facebook by August

NEED TO KNOW
  • Study says growth to come from internatonal users
  • Social networking site debuts new 'Listen With' button
One billion served.
This isn’t about McDonalds: That's the number of members Facebook is projected to reach in August, a new study says.
Since its 2004 launch, the social networking site has rolled out numerous changes, including a Timeline feature in December and a brand new “Listen With” buttonThursday, and its usage continues to climb. Currently the site has more than 800,000,000 members, according to reports.
new study by web marketing and analytics site iCrossing, says the site will add its one billionth member this fall.
While the site remains popular in the United States, iCrossing attributes the growth to overseas accounts. “Facebook’s growth has slowed or stopped in many of its early adopting countries such as the U.S. and the U.K. However, developing countries such as India and Brazil have shown strong growth,” iCrossing said in blog post about the survey.
1 billion: Some perspective
There are around seven billion people on the Earth, so that means by August, one in seven humans will be on Facebook.
If Facebook were a country, it would be the third most populous nation in the world, trailing only China and India.
$1 billion = Facebook's estimated revenue last year (Techcrunch has it even higher, at $1.6B)
One billion seconds add up to about 32 years. Going back in time, we’d end up in 1980 -- about four years before Facebook founder Mark Zuckerberg was even born.

View Original Article

Wednesday, January 11, 2012

Kodak attempting to avoid looming bankruptcy

Kodak
Faced with the possibility of filing Chapter 11 in the coming weeks, 131-year-old Kodak is looking to sell of a handful of patents to keep the company afloat for a longer period of time.
As reported by the Wall Street Journal earlier today, Eastman Kodak may have to file for Chapter 11 bankruptcy protection if company officials aren’t successful in selling off 1,100 patents over the next few weeks. While the company would continue to operate during the bankruptcy procedure, Kodak would be forced to sell the patents during a court-supervised bankruptcy auction and wouldn’t get the full value for the patents. The company has also been discussing a billion dollar loan from banks to help continue operations after the bankruptcy process begins. The company employs approximately 19,000 employees and currently has hefty financial obligations in regards to Kodak retirees. 
kodak-shareThough much of the 20th century, Kodak dominated the market for photographic film as much as 90 percent share in the United States during the late seventies. However, Kodak’s market share dissolved over the 1980s as foreign competitors undercut the cost of film. The company continued to lose customers as people converted to digital cameras and smartphones over the following two decades. Company officials eventually moved away from film to produce digital cameras, but the margins weren’t as lucrative as film. The company also branched out into video cameras, digital photo frames in addition to consumer and commercial printing solutions.
On the news of the possible Chapter 11 bankruptcy, shares of Eastman Kodak dropped by 28 percent. Concern for the company peaked during September 2011 when Kodak withdrew $160 million on a credit line. After the stock suffered due to that move, Kodak hired attorneys to advise company officials on methods of restructuring finances. Assuming that the company completes bankruptcy proceedings, Kodak will shed the financial obligation of pension and health-care costs for retirees which run approximately hundreds of millions of dollars per year. Kodak hasn’t been approached for takeover by any competing camera or printer manufacturer due to the exorbitant retiree costs as well a general lack of profitability over the past few years. 
Kodak will be exhibiting at CES next week to show off the latest Kodak models of digital cameras, printers and other photo related technology.

View the original article here

Tuesday, January 10, 2012

Samsung says no to Galaxy S/Galaxy Tab Ice Cream Sandwich upgrade

Samsung Logo Door Offices
Samsung has decided not to pursue adapting Android 4.0 Ice Cream Sandwich for the Galaxy S or Galaxy Tab, saying they're optimized for the previous version of the software, 2.3 Gingerbread.
Brace yourselves, Galaxy S owners, as we’ve got some bad news. Samsung has decided it can’t integrate its own software with the latest version of Android, meaning your phone will remain a Gingerbread device.
This news comes after the company announced its ICS upgrade schedule before Christmas, where the Galaxy S and the Galaxy Tab 7-inch tablet were notable in their absence. However, Samsung was forced into “re-evaluating” the Galaxy S and the Galaxy Tab’s compatibility after an outcry from owners.
Since then, there has been talk of what Samsung called a “value pack” being released. This would include several of Ice Cream Sandwich’s features in order to refresh the devices, but not the entire operating system that was proving difficult to integrate with TouchWiz.
While this could have been better than nothing, this too seems to have fallen through, at least according to a Samsung spokesperson chatting to The Next Web. They’ve said the decision has been made not to update the devices due to limited “hardware specifications,” and that they’re “fully optimized for the Gingerbread experience” already.
As has already been pointed out, there’s nothing wrong with the Galaxy Nexus S’s “hardware specifications,” a device very similar to the 4.0 compatible Nexus S, just without the TouchWiz UI.
So, a frustrating end to a tale that deep down, we never really expected to play out any other way. Owners who want the latest version of Android must either root their phone and find a custom ROM, or upgrade to newer hardware when their contract allows
View the original article here

In Ctrl+C, Ctrl+V we trust: File sharing made an official Swedish religion

kopimism
File sharing becomes a religion in Sweden with the official recognition of the Church of Kopimism. Ctrl+C, Ctrl+V we trusteth.
And lo’ they shared the files, and ’twas good. Anti-piracy efforts may soon be labeled as religious persecution as the Swedish government has apparently recognized file sharing as an official religion.
Meet Philosophy student Isak Gerson, who is the mind behind the Church of Kopimism. Gerson founded the Missionary Church of Kopimism in 2010, and filed a request with authorities to officially accept his belief system in order for Kopimism to avoid persecution.
It took three request over the past year to finally convince the Administrative Services Agency to recognize the church. According to Torrent Freak, after the first two attempts, the Church was asked to formalize its way of prayer in order to be recognized.kopimism symbol
Kopimism roughly translates to ‘copy me’. The tenets are simple: Control-C and Control-V are sacred symbols. Kopimists believe that the copying and sharing of information is ethically right, and knowledge should not be hoarded. Information’s value increases as it is shared. Remixing content is a sacred kind of copying the Church terms ‘Remix Spirit’.
The religion has a priest class called the Oparnas, who exemplify Kopimist virtues and assist others to follow the Kopimist path. Those that wish to become part of the Kopimist faith must undergo a rite of disclosing their personal data to the organization, profess faith in information and copying and download the logo from the site.
Currently, the Church has around 3,000 official members, tripling from 1,000 in the last half of the year. Though the Swedish state has recognized Kopimism, copyright infringement is still not legally permitted. Isak Gerson said in an interview, “there’s still a legal stigma around copying for many. A lot of people still worry about going to jail when copying and remixing. I hope in the name of Kopimi that this will change.”
View the original article here

PayPal strikes again, and this time an antique violin pays the ultimate price


The bewilderingly aggressive service branch of PayPal has again drawn the ire of many, as the company demanded that a pre-World War II antique violin, valued at $2,500, be destroyed in order to issue the disputer a refund.
It hasn’t been a particularly good few weeks for the customer service industry. Last week it was the saga of Paul Christoforo, the man who would be friends with the mayor of Boston, bro, who decided that civility was for the weak and paid a hefty price when he picked on the wrong guy. Now it is PayPal. Again.
PayPal is one of those services that has so dominated the space it exists in that it has inevitably become a source for users around the world to share, use, and occasionally become victims of. To be fair, there are millions of transaction every month at PayPal that go off swimmingly, with nary a problem. But when problems due arise, they can be whoppers.
Last month PayPal awoke the Internet on the wrong side of the bed, and then proceeded to face the digital hounds following an incident with Regretsy.com over blocking gifts for needy children. The condensed version is that Regretsy asked people to buy random gifts for a group of handpicked children, then ended up earning more money than necessary. It then decided to use that money to help the families even further and pay some of their bills. All of the transactions were conducted via PayPal, who froze Regretsy’s account before a single gift was sent.
The trouble stemmed from a classification error on Regretsy’s part that could easily have been filed under “honest mistake,” but that apparently wasn’t an option for PayPal’s reps. After a bizarre back and forth with a PayPal customer service rep, it was determined that Regretsy had erred by having the gifts purchased as “donations.”
The gifts were all part of a grab bag, so when a person wanted to help out they essentially just donated $2 in order to contribute to the total rather than choosing an individual gift to send under their name. PayPal, however, saw things differently, and concluded that each $2 transaction was actually a purchase and not a donation. That led the company to freeze the account and demand that Regretsy’s owner and operator, April Winchell, issue a refund for each and every donation, of which PayPal would receive a small transaction fee on each.
Logic would dictate that a quick call to an actual human could verify Winchell’s good intentions, but that was not to be. In a series of increasingly weird conversations, the customer service rep stopped just short of accusing Winchell of fraud, and birthed the bizarre — and very stupid — phrase that became a minor Internet meme, “You can use the donate button to raise money for a sick cat, but not poor people.”
Needless to say, the denizens of the intertubes were not amused, and the story quickly went viral. PayPal magnanimously addressed the situation (after being caught), and promised to help find an amicable resolution, which to their credit they did. But the story doesn’t end there.
Yesterday on Regretsy, Erica, a fan of the site, emailed in her own personal problems with PayPal that echoes Winchell’s “oh my god what are they thinking” experience with the financial giant.
Erica was in the process of selling an antique violin that predated World War II, to a buyer in Canada for $2,500. But when the buyer received the violin, they disputed the label on the instrument. Erica asserts that this is a common thing in the world of antique instruments — and a quick Google search can verify that it is indeed commonplace. On top of that, she also confirmed that it was appraised and verified by a legitimate luthier.
The buyer wanted a refund, which Erica was willing to provide, but then PayPal got involved. In order to issue a refund, PayPal demanded that the violin be destroyed, as the company had somehow decided that the instrument was counterfeit–despite any actual investigation into the piece itself.
The buyer then sent Erica a picture (above) of the destroyed instrument. She contacted PayPal, who strongly defended its actions. In the Terms of Service for PayPal, there is a line that reads “PayPal may also require you to destroy the item and provide evidence of its destruction.”
In many ways, this may seem like a justifiable move on PayPal’s part to protect its customers, at least until you start to think about it. First, PayPal is in no way a legitimate source for the authentication of antique violins, especially since the bulk of its interaction was handled by phone and email.
Second, for some reason PayPal immediately seemed to side with the buyer. From an impartial point of view, there is no particular reason to assume the buyer is telling the truth while the seller is not. Perhaps the PayPal reps just trust Canadians.
Third, even if this were a scam there were better ways to handle it, none of which include PayPal anointing itself as the arbiter of a product very few people in the world are experts on. Now, without actually having the shattered violin analyzed by an expert, there is no way to confirm that Erica is telling the truth. But even if she was trying to sell a counterfeit, it was not PayPal’s place to decide that, especially without concrete evidence.
If Erica is telling the truth, thanks to PayPal she is now out a $2,500 violin, and a rare antique has been destroyed. All because of a policy that had no business being cited in this situation.
PayPal has said that it is investigating the matter.

View the original article here

Sick of PayPal? Check out these alternatives

online_payment
If you've had it up to here with the online commerce platform de facto, maybe it's time to take your money elsewhere on the Internet.
PayPal  has long been a tent pole of e-commerce, a service integrated into nearly every online shopping experience. But that doesn’t mean it’s above the ire of the Internet. Lately something’s been amiss over at the site, and now complaints of shoddy customer service and poorly worded user policies are coming back to haunt it.
First, in true holiday spirit, PayPal froze Regretsy’s charity campaign and a company representative dealt with the situation poorly (the phrase “You can use the donate button to raise money for a sick cat, but not poor people” comes to mind). And this isn’t the first time PayPal has been accused of abusing its power: various websites have had their donate button access revoked at the site’s whim, and in many cases, the forced refunds directly profited PayPal. Even if that is totally above board, it isn’t a practice that will endear itself to most.
Now, Regretsy is feeling that pain again, but this time as a spectator after a woman shared her story with the website. Recently, a woman named Erica sold a rare violin for $2500, and used PayPal for the transfer of funds. The buyer wasn’t satisfied, saying it may be a fraud despite legitimate authentication, and he wanted a refund which Erica was willing to grant. PayPal then decided with very little evidence that the violin was counterfeit, and stated that in order to issue a refund the buyer would need to destroy the antique violin, leaving Erica without the sale money, and without the antique violin.
Once again, we could be looking at a PayPal fail. And if you’re one of the many who’s had enough, it’s time to start doing your shopping elsewhere.

google_checkout_logo

Google Checkout

Pros: It’s never a bad idea to get on board with Google if you’re searching for Web apps. If you have even one or two other Google accounts, the incentive becomes even greater. Small business owners might already be using Google Ads or Offers (and think of the capabilities if Google Wallet really takes off), and there’s something to be said for simplicity. Comparatively low cost as well.
Cons: This is a relatively new Google product and it’s not quite ready for widespread consumer use yet. You can only use debit and credit cards, and as with all of these other options, it’s not as widely used as PayPal.
Cost: Using this to process sales will cost a minimum of 1.9-percent + $0.30 per transaction. Transaction processing rates you are charged are determined by your sales volume from the month prior (extra 1-percent if you’re selling to someone in a different country).

amazonpayments

Amazon Payments

Pros: If you’re a real e-commerce addict, you probably use Amazon often enough as is. And if you’re constantly selling items on Amazon, there’s an immediate upside right there. Of course Amazon’s prestige in the market is also a benefit.
Cons: You can’t simply install an Amazon Payment button on your site and keep users on your page, they will instead be redirected to Amazon. Amazon has been criticized for its server structure in the past, and it might come back to haunt you (not to mention you’re helping promote that brand instead of your own).
Cost: Transactions greater than $10, Amazon charges 2.9-percent + $0.30. Less than $10, 5-percent and $0.05.

Dwolla-Loga

Dwolla

Pros: Dwolla is super user friendly and ties in to the growing social commerce movement. You can send money through syncing with social networks and pay for things with your phone. Dwolla will also immediately pay for something up front that costs up to $500, as long you pay that back within a month.
Cons: In order to use its faster deposit system “Instant,” you have to pay $3 a month. Otherwise it’s a three to five day wait to get and send funds. It’s also a new company, which means it’s still developing the application’s architecture and working out the kinks.
Cost: Transactions under $10 are free; over $10 they are $0.25. 

View the original article here

Monday, January 9, 2012

Netflix members watched 2 billion hours of video in Q4 2011

netflix_wii
Netflix has proudly revealed that its customers watched roughly 10 times the amount of video content each month than users watch on Hulu.
Netflix may be down, but it’s not out. The streaming and DVD rental company announced today that its more than 20 million members worldwide watched a combined total of more than 2 billion hours of television and movies during the last three months of 2011. This equals out to an average of about 33 hours of video watching per month for each user — which isn’t hard to imagine considering the increasingly popular practice of watching entire seasons, or multiple seasons, of shows all in one sitting.
According to some estimates, this is roughly 4.5 times the amount of time the average user spent watching YouTube videos, and 10 times the amount of video content Hulu users watched, on average.
In other words: Netflix is struggling, but it is by far the most-watched source of streaming video.
“We were thrilled to deliver more than two billion hours of TV shows and movies across 45 countries in the fourth quarter,” boasted Netflix Co-Founder and CEO Reed Hastings in a statement. “Netflix delights members by giving them choice, convenience and control over the entertainment they love for an incredibly low price.”
Just yesterday, Netflix released a trailer for “Lilyhammer,” the first original series from Netflix, which stars Steve Van Zandt of “The Sopranos” and E Street Band fame, who plays a New York gangster who is transplanted in small-town Norway. This series will be followed by the much-anticipated “House of Cards,” which is produced by David Fincher and stars Kevin Spacey. A new season of “Arrested Development” will also air exclusively on Netflix, staring in 2013.
After a massive user backlash that resulted from a price increase for users who wish to receive both streaming and DVD rental, the company saw its stock price plummet as subscribers began to flee. Because of this, the company has seen months of bad press, so it’s not particularly surprising that they are touting these impressive numbers. Still, it would seem that Netflix isn’t out of the woods yet, as the company expects lose money this year as it attempts to stop bleeding customers.

View the original article here

Why 2012 is starting to look like 1984

1984 screencap
Between SOPA, NDAA, telecommunications surveillance, and people's willingness to share endlessly via social networking, will 2012 mark the year consumers irreversibly surrender their privacy and freedoms?
A mantra of the Internet age, articulated in 1984 by WELL founder Stewart Brand, is that “information wants to be free.” Back then — the days of 360K floppies and 1200 baud modems — Brand was referring to digital technology making information ever easier to distribute, copy, and remix than their old-school analog counterparts. The oft-forgotten corollary Brand offered at the same time was “Information also wants to be expensive,” because particular items, while perhaps of no interest to one person, can be “immeasurably valuable” to someone else.
As we head into 2012, the conflict Brand articulated between information’s “want” to be both free and expensive is taking on new dimensions. So-called “digital content” like books, music, and television is increasingly falling into the expensive category, thanks to online stores, digital distribution, copyright, and DRM. Meanwhile, information about ourselves — like our location, habits, activities, possessions, transactions, preferences, and personal information — is increasingly becoming “free,” often accessible to advertisers, corporations, and governments without our explicit consent. Or, in many cases, proffered up willingly in exchange for things like coupons.
As we enter 2012, the tension between “free” and “expensive” information is becoming more charged than ever. What could 2012 bring… and will it end up resembling Orwell’s 1984? Here are a few of the threats on the horizon.

SOPA-Internet-censorship-shutterstockStop Online Piracy Act

The Stop Online Piracy Act and its companion piece, the PROTECT IP Act (PIPA) are bills currently being crafted by U.S. Congress aiming to expand the capabilities of U.S. law enforcement agencies to combat copyright and intellectual property infringement — piracy. The proposed legislation is aimed at both the piracy of digital goods (books, movies, television shows, games, and things like live broadcasts), but also the use of the Internet and online marketplaces to traffic in physical counterfeit goods. That means pirated DVDs, Blu-rays, and CDs, but also fake drugs, fashion and accessories, electronics, antiques, collectibles, and many more items.
At a basic level, most people accept that piracy and counterfeiting are bad. It’s theft, and theft is rarely justifiable. So, on the surface, the notions behind SOPA don’t seem that onerous. The devil is, of course, in the details — or lack of details, given the very broad language in SOPA as it exists today. As originally proposed, SOPA would enable copyright holders to seek court orders against Web sites they believe are infringing on copyrights or either enabling or facilitating copyright infringement. Depending on one’s definitions, merely linking to a site that contained allegedly infringing content could be construed as “facilitating” infringement, so copyright holders could demand the site or account with that link be taken down.
In a worst-case scenario, Internet users who share a link to a cool video with their friends might find their social networking accounts suspended for “facilitating” alleged copyright infringement. Similarly, journalists writing about piracy could find their sites or publications suspended. And if a legitimate site or account were to get hijacked, transferred, or sold (because that never happens, right?) anyone who linked to or did business with once-legitimate content or sites might suddenly find themselves in violation of the law.
Under SOPA, a court could require ISPs to take down sites accused of infringement, order search engines to drop the sites from their listings, or bar online advertising and payment services (like AdSense or PayPal) from doing business with the site. The goal of those measures is ostensibly to shut down online marketplaces for pirated and counterfeit goods: Get them offline, and shut off access to their sources of online revenue. Although the bill provides for penalties against copyright holders who knowingly make false accusations of infringement (emphasis mine), the bill also grants immunity to ISPs who proactively take down accused sites. In other words, there’s no penalty to ISPs who take down sites because they’re accused of infringement, even if those claims are false. That’s a significant weakening of “safe harbor” provisions created by 1998′s still-controversial Digital Millenium Copyright Act (DCMA). Similarly, the process of requesting or obtaining a court order over alleged infringement would largely take place outside the public eye, likely with the owners of the accused site unaware action was being taken against it. If the order were granted, one morning a site or service operator could wake up and find their site gone. Site owners can file a counter-claim if they’re barred from ad or payment services, but the counter-claim would have no force.
That’s not the full course of SOPA. It also has broad implications for cybersecurity and DNSSEC, a new security layer for DNS. However, provisions like the ones outlined above obviously have tremendous implications for search engines and services that host user-generated content — think Facebook, YouTube, Twitter, and the like, but also for personal sites, blogs, small businesses, and (really) any person, organization, or business with a website. Under SOPA, merely linking to other sites could become a dangerous proposition, lest the site at the other end of the link be accused of copyright infringement.
Opponents of SOPA argue these provisions would fundamentally break the Internet and stifle innovation, and could lead to many sites and services migrating their infrastructure out of the U.S. to escape potential liability. Further, it seems unlikely SOPA’s provisions would do much to combat online piracy and trafficking in counterfeit goods, since site operators are already adept at moving to new hosting services in the space of a few hours: Even SOPA’s proposed streamlining of takedowns would still move at glacial speeds compared to the Internet world.
Proponents of the legislation argue SOPA’s provisions would protect revenues of content creators that would otherwise be lost and, hence, preserve jobs — an important buzzword in today’s political and economic climate. Supporters also note SOPA is not intended to go after single instances of links on blogs, social networking feeds, or other sites; rather, the bill is meant to offer law enforcement and rights holders tools to go after bigger fish, like substantial piracy and counterfeiting operations. However, the language of the bill as it stands today contains no such limits, implicitly relying on barriers to entry (court costs, attorneys’ fees, documentation, etc.) to curb potential abuses.
godaddy-sopaSOPA (and PIPA) are not law. Both bills are proposed legislation that has yet to make it out of committee for votes before the House and Senate, let alone be signed by the president. Nonetheless, the proposed legislation has drawn a wealth of criticism, with domain registrar GoDaddy bearing the brunt of anti-SOPA sentiment by first endorsing the bill, then retracting its support. A handful of gaming companies have also apparently withdrawn their explicit support, although it’s not clear whether that’s a genuine reassessment of their stance or merely a PR move in the wake of the GoDaddy fracas. Many other top-line Internet companies—Google, Facebook, Yahoo, Twitter, eBay, Wikimedia Foundation — oppose SOPA, as do the EFF, Human Rights Watch, and the ACLU.
The bottom line is that if legislation like SOPA and PIPA become law, the way the Internet works for most Americans could change substantially. Much of the information we understand to be “free” today, even to the level of tweets and status updates, could suddenly come with enormous consequences. The weight of those consequences will tend to suppress Internet users’ willingness to speak, communicate, link, and share — and that’s why opponents say SOPA will “break” the Internet.

National Defense Authorization Act

SOPA is not yet law, but the most recent National Defense Authorization Act is. The NDAA is an annual bill passed by the U.S. Congress authorizing the budget of the U.S. Defense Department. It’s always a bit of a political hot potato because few presidents can justify failing authorizing revenue for the Defense Department, particularly when tens of thousands of U.S. troops are overseas serving in extended conflicts. Since the President does not have a line-item veto, lawmakers try to attach all sorts of things to the NDAA, knowing the President will almost certainly have to sign them all through into law.
This year, the NDAA contains a doozy: It enables the U.S. military to conduct anti-terrorist operations on U.S. soil, and authorizes indefinite detention of terror suspects, including U.S. citizens, without trial. The law is not entirely clear whether the military can indefinitely detain U.S. citizens domestically, but it can certainly do so overseas, and foreigners can be detained whether overseas or within U.S. borders.
In signing this year’s NDAA, President Obama included a signing statement attempting to clarify his position on the law. “The fact that I support this bill as a whole does not mean I agree with everything in it. In particular, I have signed this bill despite having serious reservations with certain provisions that regulate the detention, interrogation, and prosecution of suspected terrorists.”
In essence, this year’s NDAA expands on provisions granted into the Patriot Act and extends the military’s role in domestic law enforcement. Now, the U.S. military can detain anyone, anywhere in the world, without trial or process, simply because they’re suspected of terrorist activities.
lulzsec arrestedThis may not seem to have anything to do with the Internet — until you think about groups like Anonymous and Wikileaks. Could Anonymous (or groups within Anonymous) attacking credit card operators, the threatening the NYSE, law enforcement organizations, or other organizations constitute terrorist activity? Similarly, would Wikileaks’ publication of classified U.S. diplomatic cables constitute terrorist activity? Suddenly, everyday Internet users speaking up in support of groups like Anonymous and Wikileaks might find themselves accused of aiding and facilitating terrorists. Similarly, if U.S. authorities decide these or similar groups’ activities constitute terrorism, members or alleged members might find themselves shipped to Guantanamo. No trial, no process, no appeal.
The Obama administration says it does not intend to exercise these powers. Even if that’s true, now that they’re law the only way they can be undone is with additional legislation that repeals the provisions, or through a court challenge, which would almost certainly ensure if the powers were ever utilized. But just because the Obama administration says it won’t use the powers doesn’t mean future administrations won’t. And let’s not forget that, at least in the case of Anwar al-Awlaki, the Obama administration concluded it has the power to assassinate U.S. citizens without trail. (The American-born al-Awlaki was killed in Yemen by a targeted U.S. drone strike in September 2011.)
The bottom line here is that it doesn’t matter whether the U.S. government ever exercises the powers granted under this year’s NDAA: the very fact they exist suppresses American civil liberties by explicitly authorizing the indefinite detention of U.S. citizens without trial, anywhere in the world. For folks who hold unpopular views, or merely know people who do, that’s a sobering thing to consider.

Telecom Immunity

Confused yet? Things get weirder. Late last month a U.S. Court of Appeals panel upheld the constitutionality of a law that makes telecommunications operators immune to lawsuits for assisting the federal government’s surveillance of American citizens. In other words, if your cell phone, telephone, or Internet provider turns over information about you, your activities, and use of their services over to the Federal government — even illegally — you’d have no grounds to sue. Communications companies face no sanctions for disclosing personal information to the federal government, including account information and even usage data like sites visited, account names, and location data.
When can the federal government require communications companies to hand over customer information? Essentially, anytime it likes: As part of anti-terrorist measures enacted by the Bush administration, the federal government has been engaging in warrantless wiretapping of individuals it has reason to believe may be connected to terrorist activities. Although originally revealed back in late 2005, the practice was sustained by the Bush administration and continues under the Obama administration. The activities include tapping phone calls, as well as intercepting Internet traffic (email, Web use, etc.) VoIP traffic, and text messages. The government is the sole arbiter of what individuals are surveilled, and is under no requirement to disclose its activities.
However, there is an upshot to the appeals court ruling. The court only finds the immunity granted to telecommunications operators to be legal; a case against the government challenging the legality of warrantless wiretapping practices can still proceed. That case, Jewel v. NSA, alleged that the National Security Agency set up secure facilities within AT&T facilities across the United States to engage in an “unprecedented suspicionless general search” of digital communications.
“The federal courts remain a forum to consider the constitutionality of the wiretapping scheme and other claims, including claims for injunctive relief,” wrote Judge Margaret McKeown of the 9th Circuit.
However, even if the Justice Department does not appeal the ruling that Jewel vs. NSA can proceed, it is likely to move the case be dismissed on state secrets grounds. Given the volume of information that has already been disclosed about the NSA’s domestic surveillance operations, the Justice Department may have a difficult time asserting a state secret privilege, but it does mean key proceedings of the case could take place outside public view.

The true value of privacy

Does any of this actually matter? Some might argue that talking about preserving privacy and civil liberties is pointless in an age when many everyday citizens regularly share intimate details of their daily lives with the entire world, including who they know, where they are, what they’re doing, what they like, what they’re looking for, and what they buy. Couple that with personal information about most people squirreled away in private and government databases (think health care providers, credit reporting agencies, banks, credit card companies, even grocery stores, not to mention the erstwhile efforts of online advertisers to track your every move across every site on the Internet) and it’s easy to see why former Sun head Scott McNealy said “You have zero privacy anyway. Get over it.” And that was way back in 1999, before things like smartphones, Facebook, and Foursquare.
facebook-timeline
Fundamentally, the value of privacy comes down to whether individuals consider personal information to be free or expensive. It’s easy to consider information about other people “free,” after all, most of the time, it doesn’t matter to us. That leads to the comforting fallacy that individuals have nothing to worry about if they have nothing to hide. Perhaps, for a handful of people who have absolutely no qualms about living their entire lives in the public eye, that might be true.
However, there’s a distinct difference between having something to hide (like, say, terrorist connections), and not wanting every iota of personal information available to anyone, at any time. Few people would want their entire medical histories made public—which could lead to problems with insurance, health care, job prospects, and more. Similarly, few people would want their communications or financial records available to anyone, or consent to having their location monitored at all times. Is it acceptable to live our lives constantly wondering how our actions might be interpreted by the myriad of other people, organizations, and governments who might be watching?
Simply put, most people believe that information about themselves belongs to them, and ought to be under their control. We find information about ourselves to be “immeasurably valuable.” Sure, we’re free to share details if we like. But we should also be free not to share information, or to have information about ourselves collected and used with no right of recourse, appeal, deletion, or correction, because we recognize that information could be misused by others, to our detriment.
Unfortunately, in the world of 2012, it looks like Americans — and most other people — are finding themselves with less and less choice in the matter. And if you’re a marketer or a government, maybe that’s doubleplusgood.

View the original article here

Google exec comments on the sponsored Chrome campaign and the finger pointing continues

chrome oops
The involved parties all weigh in on the Chrome advertising debacle, including Googler Matt Cutts.
Earlier this week, Google came under fire for a pay-per-post campaign promoting its Chrome browser. In addition to being hypocritical (Google has made a lot of noise about punishing this type of spammy, page boosting, “thin” content), one sponsored blog post in particular failed to follow Google’s “nofollow” hyperlinking rule.
Google dutifully dropped Chrome’s page rank for the next 60 days and in a company statement explained that given its position, the company needs to hold itself to a higher standard.
matt cuttsMatt Cutts, head of Google’s webspam team, has also commented on the incident and given us some background on what exactly happened. “Google was trying to buy video ads about Chrome, and these sponsored posts were an inadvertent results of that,” he says via Google+. “If you investigated the two dozen or so sponsored posts (as the webspam team immediately did), the posts typically showed a Google Chrome video but didn’t actually link to Google Chrome. We double-checked, and the video players weren’t flowing PageRank to Google either.”
Cutts says there was one exception, however, in which a blogger failed to make a link to Chrome “nofollow” and as a result Google has demoted Chrome’s page rank.
Of course it’s not just the fact that one of these paid-for-posts was unwittingly giving Chrome an SEO boost. Google is also taking heat for creating the very type of Web content it tries to bury. According to Cutts, the campaign’s intention was purely “to get people to watch videos—not link to Google.”
One company hired to produce the video ads, Essence Digital, cops to Google’s innocence in the entire situation. “Google never approved a sponsored-post campaign. They only agreed to buy online video ads. Google have consistently avoided paid postings to promote their products, because in their view these kinds of promotions are transparent or are not in the best interests of users,” the company said in a statement. “In this case, Google were subjected to this activity through media that encouraged bloggers to create what appeared to be paid posts, were often of poor quality and out of line with Google standards. We apologize to Google who clearly didn’t authorize this.” 
There’s been a lot of finger pointing in this debacle, with most of the blame falling squarely on the shoulders of the unnamed blogger who failed to use the “nofollow” attribute. But it’s all fairly simple: Google says it doesn’t engage with pay-per-post advertising, but it hired a couple of companies (including Unruly Media) which do precisely that. Unruly Media has explained that while it doesn’t tell its writers what to write, it does pay them for it. Still, for all the blame-shifting going on here, at least Google is demoting itself a bit, even if it’s just to appease us all. 

View the original article here

Thursday, January 5, 2012

How to Check and Fix Your Problematic Hard Drive [Windows 7]

chkdsk-hard-driveThere are many things that your computer depends on to function normally. For the computer to function at all, you need the big five: power supply, motherboard, RAM, hard drive, and CPU. Of the five, the hard drive contains the most important stuff required for you to use the computer – the operating system. When that component acts up, all sorts of funny things start happening.

What Happens?

If your hard drive starts acting nasty, you’ll know it because the computer loads much more slowly than usual, perhaps executing this behavior on one or two programs in particular. BSOD (blue screen) errors will happen more frequently than previously when they were absent. Although these also may be signs that your physical memory and other components might not work properly, you shouldn’t discount the possibility of the hard drive being the cause of this mess. Other problems that narrow down to the hard drive are CRC errors when transferring files from one folder on the same drive to the other. Other times, the progress bar just stays stuck in the middle and doesn’t move for hours.
chkdsk-bsod

Why Does This Happen?

Hard drives aren’t eternal, and neither are solid state drives (SSDs), contrary to what some may say. SSDs, in fact, are more volatile than hard drives. The degradation of a storage drive’s interior is something perfectly natural and happens after years of use, depending on the quality it was manufactured with. This degradation manifests itself in the form of bad sectors, which are small areas of the drive that can no longer be used due to physical damage. To ensure that your drive doesn’t risk being further damaged, you must run the disk checking utility in Windows to mark the areas that aren’t functional anymore. 
chkdsk-platter-closeup
Notice how close the R/W heads come to the platters. The precision necessary makes the hard drive a very delicate instrument.

Before You Run Disk Checker

Try restarting your computer. There are times when your drive might have a minor fluke. Don’t restart your computer like you usually do. Shut it down, wait 20 seconds, and turn it back on. This gives the drive time to reset its read/write heads and bring the internal platters to a complete stop. If your hard drive is having errors only working with one file, try putting a copy of it somewhere else on the drive. See if it works after that. If it’s still not working, the file might have a problem, not the drive.

Running Disk Checker

To run the disk checker utility, access your command prompt. If you don’t know how to do this, click your “Start” menu, go to “All Programs -> Accessories -> Command Prompt“. Once in the command prompt, type “chkdsk /r” and press “Enter” on your keyboard. If and when you get a prompt, type “Y” and press “Enter.” Once you restart your computer, the disk checker utility will run on its own. Let it do its job and it will take care of your drive.
If you’re curious, the “/r” flag tells the “chkdsk” utility to scan the drive for errors and recover readable information from bad sectors. If the utility finds errors, it will also correct them because of the implication of the “/f” flag. If someone tells you to type both “f” and “r” flags, just use the “r” one and let them know that they don’t know what they’re talking about.
View the original article here

Watch Continuous Videos On YouTube With NowBox [iPad]


Watch Continuous Videos On YouTube With NowBox [iPad]

NowBox-LogoEver wish you could just watch YouTube videos continuously without the constant searching in between each find, good or bad? NowBox for iPad makes it all possible.
Sure, within YouTube itself you can save your favorite videos to a playlist to watch in a constant stream, but what about videos that are new to you? Every time you search for a video, YouTube always displays a list of others it thinks you might like. It allows you to go off on several different tangents as you can easily get caught up watching for long lengths of time. But you have to keep searching and clicking and looking. NowBox does the searching, clicking, and looking for you.

Setting NowBox to work with your choices and taste in videos is a simple two-step process. After starting the app, it asks for your interests, for those videos you enjoy watching on YouTube. These cover a wide area of basics, such as entertainment, news, tech, how-to, etc. Simply tap the ones that interest you.
NowBox-Setup
Next, sign in to the services you use. Not only does NowBox utilize your YouTube account, it also uses your accounts with Facebook and/or Twitter. It not only learns of your interests through what you watch and post to social networking sites, it learns from videos that your friends and followers watch and post on Facebook or tweet about on Twitter.
NowBox-YouTube
NowBox sets up your channels the way you told it to, and gives you some basic subscriptions as it looks throughout YouTube subscriptions, viewing history, and your friends’ videos that they have posted about. You can choose a channel to start viewing.
NowBox-Channels
Once you start playing a channel, it comes up with a continuous playlist. There is no searching for other videos in between. It’s doing all that work for you. You can also view the videos in a listing below. As with YouTube, you can go full-screen to watch the videos. Just like with many apps, you can post directly to Facebook and share your finds.
NowBox-Play
While NowBox works with your YouTube subscriptions, it also suggests others you might like. At any time you can get more information on a channel. It gives you a short description and tells you how many videos are in it as well as how many subscribers. You can unsubscribe or subscribe at this point.
NowBox-Info
You can also get a listing of all the channels NowBox has found for you, which includes ones that you are already subscribed to, ones your friends and followers have posted about, or ones that match your particular interests.
NowBox-Listing
NowBox is always working and checking for new videos for you. Every time you open it up it goes back to your YouTube, Facebook, and Twitter to find new videos for you. It allows you to just sit back and relax while you watch. Additionally, it works with AirPlay, so you can view the videos on AppleTV as well, not being confined to your iPad.

How To Setup, Connect, and Accept Remote Desktop Connections In Windows 7

 win7-remote-desktop-logo

Microsoft Remote Desktop Manager for Windows 7 allows you to connect to any computers in your network. This allows access to files, documents and Network resources on each PC as though you were sitting directly in front of it, regardless of the location.
Begin by allowing access to the workstation. If your OS doesn’t have it already installed, the Standard Edition is free and can be downloaded quickly. It has all the main features most people would need to connect to a remote computer. If you need something more heavy-duty, there is a paid Enterprise version for connection needs such as VPN. Here is a walk through of how to setup the free Standard Edition of Remote Desktop.

Setup For Remote Desktop Connections

1. Go to the “Start -> Control Panel -> User Accounts (If they are enabled) -> System & Security“.
win7-system-security
2. Under System, select the Allow Remote Access Tab.
win7-allow-remote-access
3. When you enable the Remote Desktop, you have two options:
  • Select “Allow connections from computers running any version of Remote Desktop” and click Apply. This option is for having more than one version of Remote Desktop enabled.
  • If you have a single version of Remote Desktop running, simply select the last option.  “Allow connections only from computers running Remote Desktop with Network Level Authentication
win7-allow-connection
4. Click the “Select Users” button, followed by the Add button.
win7-add-user
5. Next, we will select the users who will have access to the Remote Manager. Choose ”Advanced -> Find Now”. A drop down list will be displayed where you can select the users, computer or domain name that can be granted access. Click on the name who will be given access and click OK to save your changes.
win7-select-users
6.  Click OK 3 times to exit all of the open windows and begin the Connection steps below.
Note: To revoke a users permissions to access Remote Desktop, select the account in the steps above, then select Remove.

Setup For Accepting Remote Desktop Connections

For an administrator to connect to your PC, they must have permission to access your computer. This is particularly helpful in a training situation and is often used for troubleshooting by a technician.
1. Set up access by going to the “Start -> Control Panel -> System -> Advanced System Settings”.
2. Select the Remote tab, then select the Allow Remote Assistance connections to this computer. At the bottom of the screen, select “Allow connections from computers running any version of Remote Desktop“. Lastly, select Advanced which will open a new screen. Select ”Allow this computer to be controlled remotely” and press OK.
win7-allow-remote-control
Note: Before you can connect to a Remote Desktop you will need to configure your Router and Firewall
  • Connect behind a Router with a single computer – Configure your Router’s port forwarding to allow port connections on 3389 then type in your IP address supplied by your ISP.
  • Connect behind a Router with multiple computers – For each computer you want to remotely connect to, you will need to configure each computer to listen to different ports to avoid port conflicts.
  • If you have a Firewall running, you will also need to configure that to allow communication to the port you opened in your Router.

Connect To Your Remote Desktop

Now that you have done all the work to set up the Remote Desktop, you will only have to start at this step each time you want to access the computers in your network.
1. Go to the “Start -> All Programs -> Accessories -> Remote Desktop Connection”.
2. A box like the one below will open where you will enter the address of your remote computer. Click Connect to enter your credentials.
win7-remote-desktop-connection
3. Entering your credentials at sign in, will connect you to the Remote Desktop where you can access the PC in your network

Another Candidate Campaigning Against SOPA Supporter: Jack Arnold

On Friday we posted about Karen Kwiatkowski running for Congress against Rep. Bob Goodlatte in Virginia using SOPA as a key campaign point. With Goodlatte being one of the key supporters of SOPA this makes a lot of sense. Soon after we posted that, we heard from Jack Arnold (and from his campaign, separately), noting that he's running against Rep. Marsha Blackburn in Tennessee and is also using SOPA as a key campaign issue. His "common sense" writeup about SOPA is absolutely worth reading. Here's a snippet:

As SOPA is drafted at present, no thinking person could possibly support it. It would give unheard-of censorship power to the Department of Justice and would have numerous foreseeable negative consequences. For example, it would cripple the internet as it exists today and would remove Google, Yahoo and Bing from their positions as market leaders in internet searches in favor of less-restricted foreign search engines. Plainly, this would move U.S. jobs overseas.

Worst of all, Congressman Marsha Blackburn claims (in public) to be staunchly anti-regulation, but she co-sponsored this bill. The same woman who is so ?anti-regulation? that she leapt to the defense of Gibson Guitar?s right to use foreign endangered lumber instead of the home-grown kind ? literally jumping in front of an ongoing federal investigation ? now finds herself to be regulation-loving. The same politician who is in the fore of (correctly) lambasting Eric Holder?s mismanagement of The Fast and the Furious wants to turn over our right to use the internet to the management of the same man.

What gives? Well, the answer isn?t hard to find. We?re coming up on an election year. Some heavy-hitting lobbyists are behind SOPA: the MPAA and other media conglomerates, including ones that own record labels, pay their D.C. firms well. And these big corporations and interests are tired of seeing their bottom-line eroded by the theft of their products. These corporations, like Gibson and its Brentwood CEO, have deep pockets and are spreading around a lot of free cash and campaign ads to get the most draconian version possible of an anti-piracy law through Congress. Congressman Blackburn isn?t the only co-sponsor they bought. This bill has a total of 31 of them, from both parties.

I expect that, as other candidates pop up around the country and realize that the incumbent they're challenging is actively supporting a bill that would enable censorship of the internet, hurt the American economy and put online security at risk, we're going to see plenty of others campaigning on this issue as well.

23 Comments | Leave a Comment..


If you liked this post, you may also be interested in...

View the original article here

Wednesday, January 4, 2012

Hackers Figuring Out How To Set Up Satellites To Route Around Internet Censorship

It's been pointed out over and over again that censoring the internet is no way to deal with things like copyright infringement -- and that people will always figure out ways to route around such censorship. That's why it's interesting to hear that some folks at the famed Chaos Communication Congress in Berlin last week outlined some plans to set up their own satellite system for routing around internet censorship around the globe. And... a key reason given for why this is needed? SOPA, of course:

He cited the proposed Stop Online Piracy Act (Sopa) in the United States as an example of the kind of threat facing online freedom. If passed, the act would allow for some sites to be blocked on copyright grounds.
They're obviously a long way from this, but the ability of amateurs to build and launch their own satellites into space has been growing and that's only going to accelerate. On top of that, with efforts like SOPA and other censorship efforts around the globe, it's giving more urgency to folks who believe in freedom of speech and civil liberties to figure out ways to decentralize and move away from systems that can be controlled by governments.

We've noted in the past couple of years that a few big events have started to call attention to the parts of the network that are centarlized and vulnerable to censorship -- and that's resulted in numerous efforts to decentralize those elements and make them censorship-proof. These projects won't all work (and some will certainly fail miserably), but as more and more people realize that these censor-proof systems are needed, it means that they will get created.


View the original article here

No, Sony Electronics, Nintendo And EA Have NOT Publicly Changed Their Position On SOPA


Overhype
by Mike Masnick
Tue, Jan 3rd 2012 7:42am

It's amazing how a little bad reporting turns into a big story. Late last week, we saw a report on Business Insider, by Matt Lynley, claiming that Nintendo, EA and Sony Electronics had dropped... Filed Under:
pipa, protect ip, sopa, supporters
Companies:
ea, nintendo, sony electronics

It's amazing how a little bad reporting turns into a big story. Late last week, we saw a report on Business Insider, by Matt Lynley, claiming that Nintendo, EA and Sony Electronics had dropped support of SOPA. However, the reporting on this story is highly questionable. It was based on a report from November from Joystiq about how those three companies supported the bill. But, if you read the actual article on Joystiq, you'll see that it notes that these three companies had not specifically come out in favor of SOPA, but rather had signed onto a letter from the US Chamber of Commerce (or, rather, its front group, the Global IP Center) which was sent before SOPA was introduced. While it does urge Congress to support something like SOPA, it was not a direct endorsement of SOPA itself.
Now, jump forward to last week. A number of lists have been put out listing the companies who supposedly support SOPA -- but many of the lists were made up by combining two separate lists. One was the official list from the House Judiciary site, which does, in fact, list out companies who have explicitly said they support SOPA. The other... was that letter that the Global IP Center sent. So, here's the problem. It appears that Lynley just checked the list from the House Judiciary Committee... and saw that Sony Electronics, EA and Nintendo were not on that list... and decided they must have quietly removed themselves from the list.
Here's the problem: those three companies were apparently never on that list. They were on the other list.
You can see an older version of the House Judiciary Committee list of SOPA supporters here. Note that it has GoDaddy on it, as well as all those law firms who demanded removal from the list. This was the original list that the Judiciary Committee came out with. You know what you'll see? Absolutely no mention of EA, Sony Electronics or Nintendo.



















And yet... a ton of news sites have picked up on the BI story and written their own versions, claiming that those three companies have quietly dropped their SOPA support: Yet, as far as I can tell, none of these three companies has made any statement suggesting they've changed their position at all. Perhaps they did change their position, but it's not because they're missing from the House Judiciary list... because they were never on that list as far as we can tell. It's kind of amazing to me that people kept demanding specific statements from GoDaddy to prove they'd really changed their position on SOPA but eagerly accept that these three companies have changed their position. It's really quite amazing to me that so many publications (many well respected) all seemed to key off this one, highly questionable, Business Insider report, which was based on someone who never checked the earlier list, and assumed that it must be accurate. 25 Comments | Leave a Comment..

If you liked this post, you may also be interested in...
View the original article here

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | cna certification