CNET News - Apple
Originally posted at Technically Incorrect
Originally posted at Technically Incorrect
Originally posted at Technically Incorrect
Originally posted at News - Security & Privacy
Samsung is priming its first wave of attacks on the iPhone 5, with a newspaper ad laying into Apple’s new handset, which was revealed earlier this week. The Korean giant and Cupertino have been locked in a legal tussle surrounding their smartphones, with Apple winning a resounding victory in a California courtroom last month.
Nintendo has said it will not be releasing games for its forthcoming Wii U that make use of two gamepads until next year. The news comes just days after the gaming giant unveiled its release schedule for the new console.
Apple might be celebrating its iPhone 5 success, but Twitter was alive this week with iCloud users complaining that the service was down, with email inaccessible for a number of days.
Apple has said it has been ‘blown away’ by the response to the iPhone 5, unveiled in San Francisco at a special event last Wednesday. The new handset’s initial shipment has already sold out, with Apple fans now facing a 2-3 week wait if they preorder the new blower.
The FIFA 13 demo has sent the gaming community into overdrive, with close to 2m downloads being record three days after launch
Microsoft has announced that it will dish out Surface tablets plus a raft of other Windows 8-based devices to over 90,000 of its staff
Audi has whipped the covers off the new A3, the upgraded premium compact that the Germans claim is now the 'most advanced car in its segment'
Apple iPhone 5 pre-order time arrives, UK tarrifs announced, just days after the hanset was official revealed
German car giants Audi has launched a new iPhone app to make it easier to tracking your mileage and petrol expenses on the move
The iPhone 5's RRP price was announced at launch, but what tariffs and deals are the UK networks offering? We round 'em up
The iPhone 5's RRP price was announced at launch, but what tarrifs and deals are the UK networks offering? We round 'em up
The iPhone 5 was launched this week and Apple has made sure you can get hold of one in a matter of days with a September 21 release date
Apple has confirmed social network service Ping will be omitted from iTunes following the update next month
T3 Magazine is launching a new access-all-areas subscription, giving you the latest and greatest gadget news, reviews and features each month
Pricing details for Sony's new flagship handset have started to arrive as online retailers have begun taking pre-orders for the new phone
Intel has kicked off its Developer's Forum in San Francisco with a wide-ranging keynote detailing the company's plans for our computing future
Nintendo has revealed pricing for its next-gen Wii U console in Japan will start at 26,250 yen, pricing it higher than the PS3 and Xbox 360
The Nikon D600 is the world's smallest and lightest full frame DSLR, says its maker, and will offer an affordable alternative to the D800
Apple has announced brand new versions of its iPod Touch, Nano and Shuffle music players alongside the iPhone 5 handset
iPhone 5 launch live blog: discover everything about Apple’s new handset here in this very post, updated reguarly throughout the day
Reading through the menagerie of Techdirt posts this week led me to develop a better understanding of how some of these media companies work as well as to increase my disdain for Hollywood and their view of the consumer.
First up, we have the article regarding HBO's lack of foresight:
It's awesome to run a business; I don't attempt to run a business because pop music already gives me high blood pressure. I do understand certain fundamentals though, like planning for the long-term. HBO apparently doesn't understand this, and as bob so brilliantly brought out (Black Swan wins again!), the industry has set itself up into a position where it has to maintain revenues at a specific level or it will collapse. Because of this, the consumer suffers because HBO expects us to adapt to their needs.
Second, we have the article about Disney's presentation on copyright and creativity:
The pattern of shortsightedness continues, though here we have a company that built itself on two things: copyright and public domain, but seems to be very focused on the copyright aspect. I haven't seen the presentation, but if I were the gambling type, I'd place my bets on the fact that it will be geared towards stronger copyright law and it's relation to creativity. If this proves true, then it just adds insult to injury with Disney's already stellar record of denying the public domain, and by extension creators everywhere, the content it needs.
My third favorite was Zach Knight's (vampire detective?) article on focusing on why people don't buy:
To me, this article focuses on two things: foresight and analysis. These two aspects are key to marketing effectively, but yet Hollywood is focused on preventing stage six, which basically means their time and effort is spent trying to prevent people from taking things for free instead of nipping the process in the bud by seeing what they can change earlier on to make people want to buy. Frankly, the latter seems like it has a more sustainable, long-term effect while the former just sustains the current model. This is, once again, an example of why Steve Jobs was an awesome businessman, and Hollywood is a terrible child.
Permalink | Comments | Email This Story
There is, as expected, plans concerning information sharing -- but again, they're left pretty empty on specifics. It talks about an "information exchange framework." Unfortunately, it does not appear to highlight privacy or civil liberties concerns in discussing the information sharing stuff. That seems like a pretty big problem. Homeland Security is tasked with coming up with a way to share information, pulling on some existing efforts, but nowhere do they call out how to make sure these information exchange programs don't lead to massive privacy violations, despite the President's earlier promises that any cybersecurity efforts would take into account privacy and civil liberties.
Separately, it lists out 16 critical infrastructure "sectors," but those can be interpreted really broadly, which is dangerous. We all understand how things like the electric grid, nuclear power plants, water facilities and such can be seen as critical infrastructure. But does "communications" include things like social networking? It's important that any plan be very, very specific about what sorts of things are critical infrastructure, so as to avoid sweeping up all sorts of things like internet services and opening them up to information "sharing" abuse efforts by the government. We all know there's plenty of evidence that when the government is given a loophole to spy on private communications, it figures out ways to drive fleets of trucks through that hole. Unfortunately, there's little indication that any of that has really been taken into consideration.
All that said, it is important to recognize that this is a draft, and it is not only subject to change, but there are indications that it is likely to change. But, seeing as this could have significant impact, it should be something that the public has a chance to weigh in on.
Honestly, looking this over, you get the sense that it's really designed to do one thing: scare those who fought against the various bills back to the table to compromise and get a bill out. It's no secret that the administration's overall preference is to get a law in place, rather than this executive order. That's been a failed effort so far, but you have to wonder if this is a ploy to scare those who opposed the Cybersecurity Act into thinking that if they don't approve some legislation, the exec order might be a bigger problem. There are way too many things left open ended in this draft, and while the administration can't go as far as Congress on many things, the open-ended nature of this order could certainly lead to problems for the industries who opposed previous efforts.
Either way, we'll have some more on this next week, but since we just got this and want to get it out there for comment, hopefully folks can spend some time this weekend discussing the (yes, once again, vague) particulars...
Permalink | Comments | Email This Story
It's an odd assertion. Most groundbreaking creative efforts were conceived and carried out while the creators worked in a variety of other non-creative jobs. It was only after these breakthroughs that these artists went on to live solely on the earnings of their creative works. Somehow, we're now expected to believe that without piracy and other disruptions, creators would be making better, livable wages, possibly right out of the gate.
That whole thought process ignores the reality. Not having a paycheck tied to your creative endeavors means being able to fail more often and experiment more freely, without having to worry about hurting your current source of income. Case in point: three developers who solved a problem most companies didn't know they had, all without having to "give up the day job."
For the past two years, Brandon Medenwald, Justin Kalvoda, and Bill Burgess have held down full-time jobs while also launching their company, Simply Made Apps.On it's face, it seems terribly simple: build something better. And yet, no one had really tackled it before. So they took a weekend off to knock out the framework early last year and since then have been refining it based on customer feedback.
Their only product is an app called Simple In/Out, which solves a problem that drove Brandon crazy. He explains, “In my fulltime job as a web programmer, we had an old magnetic in/out board like they use in sales offices to keep track of who is in the office and who isn’t. Five or six years ago, they transitioned to a Web-based version.
“I was constantly frustrated with it, because some of the roughly 40 people in our firm wouldn’t use it. The board became extremely out of date. For years, I was joking that I could write a better piece of software in a weekend, but then over beers in a bar with two friends, it dawned on me we could solve this problem by using the GPS chips in cell phones.”
For the first four months, the app was free. Last September, they introduced pricing that was based on the number of people being tracked on the company’s board. Prices start at $5 per month for 4 to 10 users, and gradually step up to $160 a month for 250 to 1,000 users.Creativity very often springs from those tied to day jobs. These three don't sound even remotely "tied." It's not about sustaining yourself from a nights-and-weekend project. It's about being passionate about what you do with your nights and weekends. These days, anyone with a spark of creativity has hundreds of free-to-cheap tools at their disposal. The barriers to entry have been demolished, whether it's music, movies or software. It's not money that drives these creators: it's passion. And if you ignore that fact, and cling to past business models, you're going to find yourself trailing the pack very quickly.
Although the trio are far better programmers than they are marketers, today they have over 1,600 registered companies. More importantly, they have something they love so much that they occasionally use their vacations to devote extra time to their “nights and weekends” startup.
None of them hate their real jobs. None are eager to quit. They come across as smart, patient people who want to solve interesting problems that other companies aren’t solving.
“In a big corporation,” says Brandon, “I’d be fearful of the little people out there doing something that they are passionate about, because, passion trumps money.” He and his partners love what they do, and feel fortunate to be able to solve interesting problems.The three were able to get this off the ground using spare time and around $100 each, which covered "licenses, a Web domain, a 'doing business as' name, etc." From $300 and a few nights and weekends to 1,600 paid users, all without having to "quit the day job."
Even though the company is turning a modest profit, he says, “Because we love what we do, we don’t have to be concerned about turning a profit, which means we are extremely dangerous people when it comes to our dedication to improving services
Those arguing that creativity is tied to a steady paycheck are relics looking back fondly at the days of gatekeeping, when competition was low because the barriers were too high. It has nothing to do with wanting future artists to be properly "protected" against disruption and everything to do with keeping more people out. That sounds more than a little like fear.
Permalink | Comments | Email This Story
When you compare that string of events to this latest report of an early release of Double Fine's newest mobile game, Middle Manager of Justice, you can see that Double Fine has a better grasp of reality than Fox and many other companies.
"So I was on the train heading to work this week, and I get a call from our tech director saying, 'Hey, um, so it looks the game is live in every territory.' And I just went, 'What!?'" Looking back on it, Chi laughs, but for a time he was worried about how this early launch could affect his game's reputation.At this point, Chi had a number of options. He could have followed Fox's example and complained about the early release and told all those people who downloaded the game to stop playing it because it was unfinished. He could have threatened those players if they released any video or screen shots of the game. Or he could have done what we tried to tell Fox it could do, use it as a promotional opportunity. And that is exactly what Chi did.
"It wasn't what I wanted the world to see quite yet," he said. "At Double Fine, we pride ourselves on putting a solid product out there, so having something out there that was buggy and not quite ready yet was really frustrating."
"I guess it kind of just turned into a beta test," Chi said. "I mean, if people find bugs that we haven't found internally, I'd love to know about them so I can fix them," Chi said.While the game was not meant to be in the hands of players, Chi did what he did as a way to preserve the integrity of the company as well as strengthen its relationship with its fans. He used the early release as a way to help fans become more invested in the company by becoming early testers. He didn't have to do this. He could have had Apple remove the game from those players' accounts. Yet, he didn't because having a healthy relationship with consumers is more important than a mix up in the release schedule. Hopefully, more companies will take notice of how Double Fine handled this affair and will respond in kind.
Even just a few days later, Chi says he's received a ton of valuable feedback that's helped Double Fine eliminate bugs, and make the game's free-to-play elements less restrictive for non-paying players.
"If anything, I welcome these suggestions from people, because we're still learning and we plan to work on this well after it goes live to make the game deeper, and luckily this means we'll get an early start on that process," he said.
Permalink | Comments | Email This Story
Put in such a tough position, Twitter did what it had to do and handed over the info the government is seeking on Harris. The only concession the judge gave is that the information is filed under seal for one more week. Hopefully, Twitter can convince another court to stop this in this one short week and to allow a full appeal to be heard.
The EFF has a really good explanation for why both the DA's and the judge's actions in this case are potentially so dangerous:
If Judge Sciarrino is worried that Twitter is making a mountain out of a molehill by continuing to press its challenge to the subpoena, the same has to be asked of the prosecutors who are using a misdemeanor disorderly conduct arrest that occurred more than a year ago as a pretense to obtain a wealth of information. The attempt to obtain this information from Twitter is to prove a point not even really contested: whether Harris was on the bridge during the protest.There are a lot of important issues brought up by everything that's led up to this situation, and it's unfortunate that the judge seems to have decided to toss all of those concerns overboard with his contempt claims against Twitter. Hopefully a higher court puts a stop to this in the next week.
This case was shaping up to be a constitutional showdown on a contested and unclear area of the law. Judges much higher up the judicial chain have been wrestling with the complicated issues brought about by the explosion of information turned over to third parties. In her concurring opinion in United States v. Jones, Justice Sotomayor of the U.S. Supreme Court wrote that she "would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection." If a Supreme Court justice is thinking about the issues here, why would a state trial court force Twitter into a position where it has to abandon its court case seeking clarity or risk a massive fine in deciding to pursue its appeal? Some have already questioned whether Judge Sciarrino is the right judge to pass on this landmark case.
Permalink | Comments | Email This Story
- MIT researchers have developed LiquiGlide -- a non-stick coating that could let people get every last drop of ketchup out of a bottle easily. Anticipation is no longer making me wait.... [url]
- Malcom Gladwell is famous for (among other things) his talk on spaghetti sauces and the discovery that customers want a spectrum of choices when it comes to spaghetti sauces. But ketchup seems to be the exception to the rule because there's just a single dominant brand -- and there are far fewer than 57 varieties of it. [url]
- Should ketchup count as a vegetable in school lunches? The tomato sauce on pizza may not count as a vegetable serving according to mothers and the USDA, but it might for some politicians. [url]
Permalink | Comments | Email This Story
Usually when I think of RFID chips, I tend to think of them being used for safety purposes. After all, my dog is chipped in case she decides to run off for greener pastures or tastier treats (DAMN IT, DOG, I GIVE YOU BACON ALL THE TIME!). But, despite safety often being the front man for using RFID technology, it often ends up being more about the money, such as when we previously wrote about Cleveland chipping citizens' garbage and recycling cans because recycling was a financial benefit for the city.
So reading the Wired article covering a Texas school district's decision to impliment RFID student cards, I wasn't surprised to find that it looks like this is about cash rather than keeping students safe. Now, as you'd expect, proponents of the system, did trot out their "for the children" cannon and set it on full auto.
[District spokesman Pascual Gonzalez] said the chips, which are not encrypted and chronicle students only by a serial number, also assist school officials to pinpoint where kids are at any given time, which he says is good for safety reasons. “With this RFID, we know exactly where the kid is within the school,” he said noting students are required to wear the ID on a lanyard at all times on campus.Unfortunately, as the article notes less vulgarly, that's a big steamy pile of bullshit for two reasons. First, due to lack of encryption and the nature of the technology, any tech-savvy kid can fool the system.
If you're wondering, like I did, why they would allow such a gap in the system through which their safety-minded goals could be subverted, the likely answer is that they don't care. Because this doesn't appear to be about safety at all; it appears to be about federal funding based on attendance.
The lack of encryption makes it not technically difficult to clone a card to impersonate a fellow student or to create a substitute card to play hooky, and makes the cards readable by anyone who wanted to install their own RFID reader, though all they would get is a serial number that’s correlated with the student’s ID number in a school database.
Like most state-financed schools, their budgets are tied to average daily attendance. If a student is not in his seat during morning roll call, the district doesn’t receive daily funding for that pupil, because the school has no way of knowing for sure if the student is there. But with the RFID tracking, students not at their desk but tracked on campus are counted as being in school that day, and the district receives its daily allotment for that student.So, with the chip system, even if a student is not in class and is just wandering around campus, he's counted as being in attendance and the school gets their funding. It's essentially a high tech way to game the federal funding metrics. It doesn't help keep students safe. It doesn't help make sure the kids are actually in class or learning. It's a money grab. And all this, despite the concerns of privacy advocates like the EFF and the ACLU, who signed on to a paper (pdf) blasting use of the chips, citing health concerns over electromagnetic radiation as well as the dehumanizing of children through constant surveillance.
A tip for school districts: if you're going to use RFID chips as a way to get more federal funding while pretending it's about student safety, pretend harder.
Permalink | Comments | Email This Story
Nicolas Christin, from Carnegie Mellon, recently released a fascinating research paper analyzing the Silk Road marketplace. Christin also recently appeared on Jerry Brito's Surprisingly Free podcast, which is where I first heard about the report.
There are a bunch of interesting things in the report itself, but a few key points that seemed especially interesting. The market is surprisingly stable. You might think with a very (but certainly not totally) anonymous marketplace, that seems to focus mostly on illegal products, using a really volatile currency, that the market itself would be pretty volatile as well. But the data does not suggest that at all. Also, you might expect a number of scammers to use the site, but (like plenty of regular online marketplaces), Silk Road has a rating system, and the research found that there was tremendous customer satisfaction:
On a site like Silk Road, where, as shown above, most of the goods sold are illicit, one would expect a certain amount of deception to occur. Indeed, a buyer choosing, for instance, to purchase heroin from an anonymous seller would have very little recourse if the goods promised are not delivered. Surprisingly, though, most transactions on Silk Road seem to generate excellent feedback from buyers. Table 3 provides a breakdown of the feedback ratings from 187,825 feedback instances we collected. 97.8% of feedback posted was positive (4 or 5 on a scale of 1 to 5). In contrast, only 1.4% of feedback was negative (1 or 2 on the same scale).Also, it will come as little to no surprise that the vast majority of products for sale are not what most people would consider legal. Drugs seem to represent an overwhelming percentage of items for sale, though there are also things like "books" for sale.
The report also notes various ways that such a site might be disrupted... and you have to imagine that law enforcement has been working on doing exactly that. It won't surprise me at all to find out that the operators of the site eventually do get tracked down, but I doubt that will stop these kinds of marketplaces from existing.
Permalink | Comments | Email This Story
This practice is particularly prevalent in the book publishing industry. With rare exceptions, most major publishers still keep their products under digital lock and key. There are a few exceptions. Baen was one of the first publishers to go DRM-free, recognizing the limitations far outweighed the benefits to it or its authors. O'Reilly Media has also shunned DRM for the same reasons, noting that unauthorized sharing leads to more readers without an appreciable drop in sales. TOR has attempted to do away with most of its DRM, although it has been hampered by publishers insisting the DRM remain in place.
Perhaps noting, as Cory Doctorow pointed out, that "no one's ever bought a book because it has DRM," another publisher, Harvard Business Review Press has opted to go DRM-free.
[H]BR have adopted the “buy once, read anywhere model” and that anywhere includes a Kindle. This means their consumers aren’t locked into a device or format. And it means that their purchases are ‘future proof’ to a good degree. It also means that if they want to share a book, there are no ‘technical’ things stopping that. To be sure, selling an HBR eBook is illegal but this mode is more tolerant of sharing.Here's HBR's official statement, one that treats its customers with respect.
We make our ebooks available to you DRM-free so you can read them on the device of your choice. We trust that our customers will abide by copyright law and refrain from distributing ebook files illegally. Please note that in the case that you download a PDF, it will be personalized with your email address.This small statement asking readers to respect its copyright is preferable to installing DRM and treating every paying customer like a thief. Additionally, HBR is offering multiple formats which gives readers more options and keeps them from being locked into any particular device.
Joshua Gans points out that offering this freedom to its customers should pay off for HBR, whose target audience is a bit different than most publishers.
[T]he business book market is a little different than other book markets. Many sales are generated by people giving books to each other. The typical case is of a boss insisting all of his underlings read something. But there are also bulk distributions to clients and the like. Amazon and all other platforms do not offer bulk sales so HBR had to do something different. Moreover, to manage that with DRM would just be too hard. So instead they went their own way and so now you can buy eBooks in bulk with a volume discount. A real innovation.Gans notes that this additional freedom comes at a price.
But there is a cost to this. HBR have not gone ‘all in’ on DRM free. For instance, one of the books they offer is Clay Christensen’s famous book, The Innovator’s Dilemma. Buy it from HBR directly and it will cost you $17.99 (and you can also see there they currently have the eBook ‘In stock’) but on the Kindle from Amazon it is $9.89 and from the iTunes bookstore it is $10.99 (not sure what happened to the most favored customer clause there!).The question is, will customers pay extra to avoid being locked into a device? In HBR's case, the answer is likely a "yes." As was mentioned earlier, HBR offers bulk purchases, something Amazon and iTunes don't. Additionally, these bulk rates are discounted depending on the number of copies purchased, bringing the price per copy more in line with its competition. Purchasing directly also gives the buyer three different formats (PDF, ePub, mobi) for the price of one, allowing them to move books from one device to another.
Gans suggests that HBR's ebook policy could lend itself to more innovative offerings, leading to more reasons to buy directly from the publisher and giving authors more reasons to offer their books through HBR:
I have my own eBook coming out with HBR Press in a very short time. I’d love it to be the case that they decided to offer the book on their site with an explicit ‘sharing’ option. For instance, the normal ‘don’t share’ this book might cost the same as Amazon while the ‘sharing’ option may be somewhat higher but would say allow you to assign ‘ownership’ of the book to another person as well.One of the best ways to avoid locking yourself or your customers into walled gardens like Amazon or iTunes is to give them a direct, DRM-free option that recognizes the reality of digital life. Trying to lock them into a single device or punishing them for the actions of others isn't really giving them any reason to buy from anyone but the lowest bidder. Treating your customers with respect and recognizing that most people have more than one form of "e-reader" is a better way to grow your audience. Once you've decided to stop policing infringement, you can throw that time, energy and creativity into building better, more innovative offerings for your paying customers.
Permalink | Comments | Email This Story
[Mary] Cesar is owner of Mary's Cakes & Pastries in downtown Northport. The bakery is known for its customized cakes, but it also sells fresh-baked pastries and iced and decorated form-cut cookies. During the last three to four years, its cookies, especially during the football season, have included hats with a houndstooth-like icing pattern, footballs and elephants with the letter “A.” Some customers also ordered cakes decorated with a Crimson Tide theme.Yeah, just one problem: she was doing that for the university itself.
Mary Cesar created a cake that resembled the BCS National Championship trophy for the Crimson Tide's athletic department for National Signing Day in February. And when the University of Alabama Law School held a reception for its recent graduates, it ordered 10 dozen cookies decorated with a capital “A” for Alabama from her bakery.Cesar announced that she couldn't afford to fight the legal nastygram, and was going to stop producing the popular baked goods. After the story got out, the University quickly went into damage-control mode and issued an apology, claiming that it was "not consistent with the protocol we normally follow for local vendors on trademark issues." Given the lawsuit mentioned above, it's not clear that's really accurate. Of course, part of the culprit here may be that UA outsourced its trademark enforcement to a third party. Collegiate Licensing Co., based in Atlanta, is who the letter actually came from. It would seem that if you're seeking to build up goodwill with local merchants who supply your own staff with university-themed baked goods, perhaps the first thing you should do is not let lawyers from some other state start nastygramming them.
Permalink | Comments | Email This Story
I wish I could take all the credit for its stunning success, but most of Dimeword's success roots from years of reading Techdirt. Through Techdirt, I've learned from the likes of Gerd Leonhard, Amanda Palmer, Nina Paley, Jill Sobule, Jonathan Coulton, Tim Cushing... too many to count. Techdirt keeps teaching me and all too often I find my poor brain is full.
In the spirit of the "decimal" theme of Dimeword, here are 10 things I learned -- mostly from Techdirt -- that supercharged the Dimeword campaign.
1. START SMALL AND START NOW
Principle: Before the internet, authors could toil away on a manuscript and gain royalties on book sales. The internet made copies easy, and the old model was upended. The only long-term solution is to build a fan base from the ground up, and that takes time. A lot of that time is unpaid. But if you reach out to fans, and give them something they really value, then they'll tell their friends about you. Do that enough, and you hit a tipping point.
Practice: I "started small" in 2009 by creating the Infinite Distribution Panel on Twitter (the phrase "infinite distribution" is a hat tip to Masnick's Approaching Infinity). It took me a few years to really understand how best to use #infdist, but I have a good flow now and it continues to be a great way to converse with like-minded people about piracy and digital distribution news.
Because of #infdist, Mike Masnick asked me contribute to Techdirt during his paternity leave. This was a great opportunity to increase my online presence, so I immediately accepted.
One day, I realized that if I were to ever crowdfund my own feature film, I needed to have a committed group of fans willing to throw down when I asked them to. I'd taken a break doing any kind of writing to make sense of how artists can thrive in this new economy. I knew it was time to step back into the stream so I launched Dimeword with the hope that if I could just get just 100 of my friends and followers to chip in $10, I could raise a simple $1000 goal. If I did it right, I'd have acquired my first small group of paying fans.
Results: Thanks to being a frequent Twitter user, and writing for Techdirt, and doing various writing gigs over the years (including five years of blogging), Dimeword rocketed to its $1000 goal in less than 60 hours. As of today, five backers have donated $100, and one (here from Techdirt) has donated $500. I credit this response to my non-stop reaching out to new fans, chatting with them, engaging, conversing, entertaining, and learning from them.
2. SELL THE SCARCE. SELL YOUR SCARCITY.
Principle: Whenever radical new technologies come along, goods or services that were once scarcities suddenly become abundant and industries focusing on only selling those scarcities fight tooth and nail to defend the old way. Instead, they should be understanding what new scarcities are created by this new abundance and upgrade their business model to sell those new scarcities.
Practice: When I first looked at my campaign, I tried to see it from the perspective of someone trying to destroy my own industry, er... I mean, from the perspective of an author trying to compete with a better value proposition. What is scarce now that only I could sell? In one sense, a big scarcity these days is not using standard copyright protection. So I chose to release my stories with a Creative Commons License. After thinking about it, it seemed to make more sense to go further, to push my work out into the Public Domain. That was certainly something I didn't see anyone doing. That's my scarcity. Then I looked at ways to incorporate other "generatives" like embodiment (creating a limited edition hardback copy), convenience (an email with all the stories), exclusivity (being among the first to get the stories), etc. I tried very purposefully to work in as many of these elements so that the "reasons to buy" were scarcities made valuable by the abundant nature of public domain literature.
Results: It's worked. I've gotten over 50 people pledging $10 or more. Amazingly, I have 5 donors buying the paperback book for $100. Here's the cool part: at $100, the book has been paid for, so I can spend $62 per unit to print it and not bat an eye. And yes, it really is going to cost that much because I'm pimping out the book to be uber-high quality. The people who pledge big get big value. That's my scarcity.
3. MAKE FANS, NOT MONEY
Principle: Money is important, and without it, you fail. So of course you're in business to make money. But -- and this is the mind trick you must conquer -- money is not the reason you are in business. You are in business to help people solve their problems. Do that better than anyone and you will have more money than you know what to do with. If you focus only on making money, the temptation is too high to make an inferior product in favor of a higher profit margin. And mediocre products breed unsatisfied, resentful customers. Great products breed devout fans willing to champion you and your work to anyone who will listen.
Practice: The goal of my campaign was first to get 100 fans to donate $10+ so I could safely write 100 stories for them. That wasn't about the money -- that was about going to people I already knew who love my work and asking them to be my patron so I could set some time aside to work. It was about finding my first small group of fans. After that, I knew the next phase would be to find totally new fans to buy in for just $1, so I set a stretch goal for a bonus story tied to the number of fans that is triggered once I meet my goal of 100 $10 donors.
Results: This hasn't worked exactly as I expected. As of this writing, I have 59 $10+ donors and 12 $1 donors. This is mainly my fault because I haven't been as active as I should have been to reach out and let ALL my friends and followers know about Dimeword. On the other hand, I found five $100 backers and one $500 backer, so I suppose it balances out. My hope is that I get another 100 $1 donors by the end of the campaign. If I'd worked harder and longer at this, I might have gotten 1,000 $1 backers. Still, it's not bad for a first campaign. And my next campaign will have this campaign as part of its backstory -- word of mouth about the quality of my perks should get exponentially greater as I do more Kickstarters.
4. BUILD TRUST WITH THE CREATIVE BOTTOM LINE
Principle: "Creative bottom line" was coined by Amanda Palmer. Make great perks. Spend almost all your money if you have to. Fans will love it.
Practice: For my books, I'll be using Blurb, which offers high quality publishing options. For the $100 book, I'll likely be doing 8.5" x 11", 110 pages, super premium paper, and no Blurb logo. Per unit cost for just 7 copies? $62. Do I care? Nope. I want donors to feel like they're reading a $62 book. They're probably expecting a $30-$40 book, but it's going to feel better than that. They will like what they get for $100. On the next campaign, I'll go into it with their trust that my $100 option is sure to impress.
Results: I have no direct data on this, but I've always set a very high bar for myself creatively and everyone knows that when I do something, I do quality. I'm the dude who stayed up all night just to hunt for formatting errors on every page in my college newspaper.
5. $1 TIERS ARE PARAMOUNT
Principle: Whenever I see a campaign with their $1 tier offering just a thank you and nothing else, I wince. Amanda Palmer's $1.2 million Kickstarter gave away 311MB of digital downloads for $1. And what effect do you think that has on a casual fan? For accepting just $1, you let them legally download all your digital content (which costs you nothing to copy and send to them) and they likely become a more serious fan of your music. On the next Kickstarter, they'll happily give you more money for your $25 CD, or more.
Practice: I positioned my $1 tier to have incredible value: you get all the stories in an email eight weeks before the book comes out. If I happen to write a novel, you get a novel. Costs me nothing to copy and send, so my profit margin is 100% (well, 82% after fees and taxes). Some might argue that I'm "giving away the farm" for only $1, but my goal isn't to make money off my $1 fans -- my goal is to pinpoint who my fans are so I can more closely connect with them. Did I mention that I receive all the donor emails at the end? An email of a potential fan must be worth at least $1, no?
Results: Only 14% of my donors are from the $1 tier. I want that number to explode out to 1000%. Likely won't happen, but I really want lots of small donations by the end. I'm still thinking of ways to entice this...
6. ADVERTISE NATURALLY WITH CONTENT
Principle: "Buy now!" is a push sale. "Isn't this cool?" is pull sale. The former is seen as spam, the latter is seen as conversation. However, both promote. If you strike up conversation about your project, and keep talking about your project's value, your audience will naturally want to help you in your mission. However, it can't be disingenuous talk about value -- it must be totally authentic.
Practice: My 10 AM chats were intended to softly sell Dimeword while providing genuine perspective on Dimeword in particular, or other related topics like crowdfunding. I tried very hard to make each tweet "retweetable" by itself so that 2nd-degree readers would gain enough interest to look more closely at @Dimeword. You can't make people share stuff -- people only share stuff worth sharing. So a huge benefit was that, in addition to trying hard to connect with fans, I was also forced to create quality work. Additionally, I asked to be interviewed on Litopia, write this piece for Techdirt to be timed for the last day of the campaign, be a guest on #Scriptchat, and host a telethon. All events are opportunities for me to talk about my campaign, though I make a point to rarely ask anyone to donate. My hope is that the more others see how much energy and planning I've put into my campaign, they'll convince themselves I'm a superhero worthy of some of their pocket change, amirite?
Results: I had a little traction with the 10AM chats, but not nearly enough. If I'd started sooner, say a week or two before the campaign, then it might have had a bigger following. The Litopia interview went well and was perfectly timed at 6 days before the deadline. The #Scriptchat is happening concurrently with this Techdirt post and my telethon (psssst: right now!). If my hunch is right, all the heat will converge at once and push Dimeword up, up, up...
Principle: Delight your fans. However much money they give, give them so much more value in return that they'll feel they got a bargain. They'll brag about you to others, they'll be repeat customers, they'll become avid fans.
Practice: I felt that $1 to buy all the stories in an email would be a great bargain to many, especially since they'd get it 8 weeks before the book's official release. And $10 for an email, PDF and the opportunity to be an author's patron was also not bad value, especially when you consider how much time collectively goes into all the individual parts. But I'm adding more to all that. I'm including extra things, many of them small (see "8. Offer Gratitude") which, together, should make the donor feel really appreciated. And for the higher tiers, I plan on going the distance to make the book look truly awesome. Here's the part everyone overlooks -- the packaging is as important as the perk inside. Even if I ship in a plain USPS box, I'll write cool and fun stuff on the outside of the box and I'll wrap the perk inside with special paper, etc. As Marshall McLuhan famously said, "Medium is the message." First impressions matter a great deal. Apple knows this, which is why opening a new Mac is a near religious experience I always look forward to.
Results: I have no data yet on this, or how well received my perks will be. I shall report back.
8. OFFER GRATITUDE
Principle: You can definitely file this under "connect with fans". Gratitude costs nothing but a few seconds, but it can really mean a lot to someone to let them know they made a difference in your life. I went to NYU film school and my teacher, Thierry Pathe, made a comment that sticks with me to this day: "When you send your film to the lab to get it color corrected, in the comments section, write a thank you. It doesn't have to be anything more than, 'Thanks!' but it matters to them. They don't get paid much, so a 'Thank you' goes a long way."
Practice: At about half-way through the campaign, I emailed all my donors one by one to thank them. At a minimum, every perk will also have a "Thank you!" written on the outside of the package, and probably again on a special note inside. When possible, I ask for feedback, which is an interactive way of showing gratitude. This shit matters, yo. It sets you apart from everyone else. Plus, it's just good karma.
Results: Who knows for sure if the "personal touch" worked, but after my individual emails, one donor upped their donation from $100 to $150!
9. HAVE FUN
Principle: When people see you're enjoying yourself, it's contagious. People respond because it's an invitation to connect.
Practice: I had fun on this campaign because in part, I did it to learn about crowdfunding. I didn't have to worry about missing my goal because the goal was set so low. I could try many new things to see what worked. One day, I did a Flash Story by inviting others to sift through my tweets ("Count back 10 tweets. Find the 10th word. Add the 10th letter of the alphabet to create a new word. What is it?"). For the last 10 days of the campaign, I've done twitter "mini-lectures" every morning at 10AM and opened it up for questions afterward. As of right now, I'm doing a telethon on YouTube... for 10 hours. See how it's playful?
Results: I gathered 55 followers on Twitter in just a month, which is a high response rate. The @Dimeword account wasn't set up to be an engagement account -- i.e., equal followers to followed -- just a "push" account for news, but I still use it to chat with others. Whenever someone asks a question, I try to get back to them asap. I ask questions back. I jibe. I try to be serious, but stay playful. My fans seem to respond well to that.
10. EDUCATE WITH TRANSPARENCY
Principle: One business strategy is to reveal more inside information than your competitor with the hope that it shames them into revealing more information so that consumers can then choose the competitor with the slimmer profit margin, i.e., you. Because transparency instills honesty, it puts you way ahead of the pack.
Practice: I've made little secret how much each of my perks cost, but I'm also going to release a spreadsheet that details ALL perk costs (in money and time) and the exact profit margins. My 10 AM chats are an insider view to me as a person, but also an insider's view of Dimeword. I'm also going to use the telethon today to write a story live, and then explain how I write a 100 word story. How's that for pulling back the curtain?
Results: I've always been in favor of transparency because it's a mark of respect to your customer. Rather than dissuade customers from your product by letting them see exactly how much money you make, transparency tells them that you think they're smart enough to see the numbers and recognize that well-earned profits are well deserved. Everyone knows Apple has a 90% profit margin, but we keep buying their computers because we get such amazing value out of their products.
The overall take home message is that one hell of a lot goes on behind the scenes to make a campaign successful, much of which happens years beforehand. And some stuff isn't as obvious or as measurable as we would all prefer. For example, how much impact does a written "Thank you!" on a perk package make in helping to forge a stronger connection with a fan? For the indie artist without marketing resources to track the minutia of customer relations, we may never know.
What I do know is that, without Dimeword, I might have never found my highly dedicated fans. If there's one lesson that should linger here, it's this: the heart of business, the heart of providing solutions to customers and, indeed, any interaction with anyone for anything, is about connecting. Artists aren't in the business of making art. They're in the business of connecting with others through art. You can connect with others 1000 different ways -- Techdirt is rife with examples of exactly that -- but they're all essentially a variation of being human enough to discover what you have in common with others and then allowing them a chance to converse with you about it. From those connections, sales happen naturally.
One of my favorite quotes is from The Big Kahuna. The veteran salesman tells his young sales associate:
It doesn't matter whether you're selling Jesus or Buddha or civil rights or 'How to Make Money in Real Estate With No Money Down.' That doesn't make you a human being; it makes you a marketing rep. If you want to talk to somebody honestly, as a human being, ask him about his kids. Find out what his dreams are -- just to find out, for no other reason. Because as soon as you lay your hands on a conversation to steer it, it's not a conversation anymore; it's a pitch. And you're not a human being; you're a marketing rep.
Or, as someone put it to me years ago, "People like to buy from warm and fuzzy."Ross Pruden is a writer-filmmaker behind Dimeword, a crowdfunding campaign to fund new literature for the public domain. A live telecast is happening now until 10PM PT, and details are listed at Dimeword.com. Today is the last day of the campaign, and the lowest tier is just $1 -- the best value of all the tiers. Sacrifice today's latte and make Chris Dodd cry!
Permalink | Comments | Email This Story
With an apparent stalemate between the US administration and legislators about ratification procedures and the European Union out after the Parliament voted against the agreement, it looks as if there is still an uphill battle to get to reach that number.As we've discussed, Australia's Parliament has already recommended rejecting ACTA, and it appears that ratification has stalled out there as well. Ermert suggests that really the only way that ACTA might reach the necessary levels of ratification will be if other countries follow Japan's method of approval -- by which they effectively sneak it through.
Besides the EU and Japan, seven governments have signed ACTA (Australia, Canada, Morocco, New Zealand, Singapore, South Korea and the United States). Switzerland has not signed nor ratified.
“Not much is happening on the Canadian front,” wrote Michael Geist, Canada Research Chair of Internet and E-commerce Law at the University of Ottawa and long-time ACTA observer. “Canada signed ACTA, but has not ratified. Ratification would likely require some legislative amendments,” Geist said, and until those changes are introduced the country would not be positioned to ratify. There may be, according to Geist, linkage between ACTA and CETA (the Canada-EU Trade Agreement) under negotiation.
Britton Broun, media advisor of the Economic Group in the Ministry of Business, Innovation and Employment of New Zealand, responded to Intellectual Property Watch by saying: “While New Zealand has signed ACTA, the government has not yet taken a decision on its ratification.”
Along those lines, her report confirms what we'd heard about how the ruling party in Japan effectively got ratification without actually bothering to allow the opposition to take part:
But on 31 August, a committee of the House of Representatives, and on 6 September, the full House of Representatives pushed ACTA through, each time counting only the votes of the ruling party.While ACTA hasn't received that much attention in Japan, allowing the government to get away with such shenanigans, it seems likely that any attempt to do something similar elsewhere would be met with more widespread resistance. In other words, it seems unlikely that enough countries will actually get around to ratifying ACTA -- though we should never underestimate the tricks that lobbyists and diplomats will pull to try to shove this ugly pig over the finish line.
“To ratify an international treaty without the attendance of all opposition parties means a collapse of democracy in Japan,” warned Suzawa.
Permalink | Comments | Email This Story
Sanchez also highlights another sneaky interpretation. The law claims that it prohibits the interception of "purely domestic" communications. But there's an additional clause with one hell of a loophole: "Known at the time of acquisition." As Sanchez notes, you can drive quite a large truck through that loophole, because if you're, say, scooping up all email communications, you don't know -- at the time of acquisition -- if it's purely domestic... and therefore, you're good to go. Basically, ignorance is bliss for the NSA.
But these two massive loopholes and sketchy interpretations seem to be totally ignored by the Congressional reps who spoke out most strongly in favor of renewing the FAA:
The most common refrain from FAA supporters was that the law only concerned surveillance targeting “foreigners in foreign lands”—meaning it could not possibly affect the rights of Americans. Rep. Trey Gowdy (R-SC), in an impressive display of lung power, delivered a five minute floor shout to this effect. “This bill has nothing to do with Americans on American soil,” Gowdy thundered, “This bill doesn’t implicate the Bill of Rights, any more than it implicates any other part of our Constitution, unless you think that foreign nationals who are on foreign land fall within the protections of the United States Constitution.” But Gowdy has to know that this is false, because the secretive Foreign Intelligence Surveillance Court has already ruled on at least one occasion that surveillance authorized by the FAA did violate the Fourth Amendment’s prohibition on “unreasonable searches and seizures.”Similarly, we've seen how the NSA absolutely refuses to say how many Americans have been spied upon using these tools, claiming that it's impossible to know (or that it would violate their privacy to find out -- seriously). But, Sanchez notes that, despite the NSA insisting it's impossible to know, that didn't stop Representatives from claiming they just knew.
Intelligence Committee Chairman Mike Rogers (R-MI) was slightly more equivocal, seemingly acknowledging that the law might permit surveillance of Americans, but that this would happen only very rarely. The mystery here is how he could possibly know that. Sen. Ron Wyden (D-OR) has repeatedly asked the NSA for a rough ballpark estimate of how many Americans—100? 1,000? 100,000?—have had their communications caught up in the agency’s FAA dragnets. If Rep. Rogers were correct, you’d expect the answer to be “almost none”—but instead the agency has repeatedly insisted that it is unable to provide even an approximate figure. Unless Rep. Rogers somehow knows things about the NSA’s databases that the NSA does not know, he can’t have any real basis for this claim.And then there's Rep. Dan Lungren. Earlier, we had noted that when there were discussions during hearings about the FAA, he brushed off concerns about spying on Americans by saying he hadn't seen any such evidence so it couldn't be true. Of course, he didn't bother to seek out any such evidence by asking the NSA to provide the data. And here he was even worse, making bizarre claims in support of expanding the FISA Amendments Act that seem to go completely against reality.
Finally, Rep. Dan Lungren (R-CA) suggested that the necessity of the FAA was demonstrated by the failures of intelligence leading up to 9/11. After all, the 9/11 Commission had again and again emphasized the central failure to “connect the dots” that would have revealed an imminent attack before it occurred—and to “connect the dots,” Lungren asserted, intelligence agencies would need still more expansive power to first “collect the dots.” This is, in a way, the most breathtakingly erroneous statements heard during Wednesday’s floor debates, because turns the 9/11 Commission’s findings completely on their head. Their report conspicuously did not identify a lack of legal authority to conduct surveillance as a serious problem: If anything, the trouble was that agencies were drowning in information they lacked the capacity to analyze and put to use. Perversely, Lungren trades on a familiar phrase—”connect the dots”—to utterly invert the Commission’s diagnosis of the causes of 9/11.So... if you're keeping track at home, the reasons the House approved this horrible bit of legislation with massive loopholes that allows the NSA to spy on us is because it can't be used to spy on us (even though it can), it bars the collection of domestic communication (except in nearly every case that it does not), it's barely been used on Americans (except that the NSA claims it's impossible to tell how many Americans it's been used on) and we need it to "connect the dots" on terrorism (even though it doesn't help connect the dots, but merely to provide even more dots, many of which will distract from the important dots).
How do these people get elected?
Permalink | Comments | Email This Story
This isn't to say that all, or even most, schools are violating students' rights, but the sheer number of incidents reported isn't very comforting. Fortunately, some decisions are being handed down that should, if nothing else, provide precedent for those challenging administrative overreach.
On September 6, a decision was handed down in a suit brought against the Minnewaska Area School District (Minnesota), dealing with a twelve year old student who was coerced into giving school officials the password to her Facebook account so they could search it for messages they deemed inappropriate.
R.S. was a twelve year old student at a Minnewaska Area middle school. She posted a message to her Facebook page about an adult hall monitor at her school:Venkat Balasubramani has added his own punctuation to some of the more dubious or ridiculous statements made by school officials. First off is the charge of "impermissible bullying" (there's a "permissible" variety?), a broad term used nearly as often by school administrators as "disorderly conduct" is used by cops.
"[I hate] a Kathy person at school because [Kathy] was mean to me."
The post was only accessible to her friends. One of her friends brought the post to the attention of the administration. The principal called R.S. into his office and told R.S. “that he considered the message about Kathy to be impermissible bullying.” (???) As a result of the message, R.S. was required to apologize, given detention, and received a disciplinary notation in her records. R.S. was disciplined a second time when she expressed her chagrin that someone had told on her (“I want to know who the f%$# told on me.”) [“f%$#” in original] This time she was disciplined for “insubordination” and “dangerous, harmful, and nuisance substances and articles.” (???)
In essence, "R.S." was punished for "being a kid" (i.e., not liking something that happened at school, complaining, being ratted out and complaining about that, etc.). The handling of this first incident makes the school appear to be as vindictive and thin-skinned as the child they punished.
This isn't the end of the story, however. The school also received a complaint from a parent that R.S. was discussing "sexual topics" with another student "on the internet." For whatever reason (most likely stated as "concern for her safety"), the school decided to pull R.S. from class and grill her about the particulars of these conversations. Apparently, her answers weren't good enough, so three school counselors and a taser-armed cop interrogated her until she gave up her Facebook password. They proceeded to search her account, including private messages, for evidence of these conversations. Still not satisfied, they decided to search her private email messages.
After this traumatizing and intrusive incident, R.S. decided to sue the school district for violating her constitutional rights. The court agreed with her on both claims:
First Amendment claims: The court has no trouble concluding that assuming the facts as alleged as true, school officials violated R.S.’s First Amendment rights. The court says that posts on social networks are protected unless they are “true threats” or are reasonably calculated to reach the school environment and pose a safety risk or a risk of substantial disruption of the school environment. R.S.’s posts were not true threats. Even assuming the statements were reasonably calculated to reach the school audience, there was no possibility of disruption.If the alleged facts are true (and the court takes care to point out this "if"), the school will likely be writing out a settlement check. This decision, a response to the school's motion to dismiss, also allows for claims of invasion of privacy (although it does dismiss claims for "intentional inflection of emotional distress"). It doesn't seem like the school is debating the facts as presented, not if its argument that R.S.'s violation of Facebook policy (she's 12 and you "have" to be 13 to sign up for an account) means she's entitled to fewer constitutional rights is any indication.
Fourth Amendment claims: The court also says that the school officials violated R.S.’s Fourth Amendment rights to the extent they rummaged around in her Facebook page and her private email account. Private emails were like letters of other private conversations, and subject to Fourth Amendment protections. Private Facebook messages are no different. There was no evidence that the officials tailored their search to minimize the intrusion. Even if they had, they had no underlying basis to search in the first place.
Eric Goldman adds his own analysis, pointing out the inherent problem with most bullying policies/legislation:
[I]t's a good example of how administrators might use the "bullying" label as a pretextual justification for punishment. The term "bullying" has way too much semantic ambiguity, but it should never stretch as far as calling another person "mean."This is something administrators should keep in mind when crafting/revamping school policies. They should also be reminded of this simple fact, as stated by Judge Michael Davis in his decision:
For more than forty years, the United States courts have recognized that students do not check their First Amendment rights at the schoolhouse door."Safety" does not trump rights, just as surely as "policy" does not trump (or at least, shouldn't) trump common sense and proportionate responses.
Permalink | Comments | Email This Story
A Dutch television presenter, Britt Dekker, did a nude photoshoot for Playboy, and a bunch of the images leaked ahead of the December, 2011 release of the magazine. A website called GeenStijl.nl had a story about it, and included a link to a zip file that contained all the images that had been uploaded to the cyberlocker FileFactory.com. Playboy had the file taken down from FileFactory, and GeenStijl linked again to the same images on Imageshack. And from there a game of whac-a-mole followed with Playboy having the images taken down, but the images quickly spread all over the place. For what it's worth, at the time, there was a lot of speculation that Playboy itself had leaked the images to build up buzz.
Either way, GeenStijl got sued for copyright infringement -- and they responded by pointing out that they just linked to the content. The court put forth a three pronged test, and found that GeenStijl, even with just links, met the criteria for infringement. As explained on the FutureOfCopyright site (linked above):
The court considered if the publishing of the hyperlinks by GeenStijl.nl constituted a publication (Dutch: ‘openbaarmaking’) as defined in article 12 of the Dutch Copyright Act. In principle, placing a hyperlink on a website is not a publication, unless three criteria are met: there must be an intervention, a new audience and profit.By my reading, all three of the prongs of the test, as presented here, are somewhat problematic. The reasoning on the first prong -- intervention -- just doesn't seem right. The claim that "the public wouldn't have had access" but for the link on GeenStijl isn't true. They did have access since the files were already on the cyberlocker. GeenStijl perhaps made it a lot more widely known, but at this point you're arguing about whether or not it's legal to make a factual statement. Did the photos exist on a cyberlocker? Yes. Saying so shouldn't be infringing.
- Intervention: The leaked pictures of Britt Dekker were stored on FileFactory.com, a cloud service to store files and share them with others. However, these files can’t be found through search engines, only users with the exact URL have access to the files. The URL to the file with the leaked pictures was publicly unknown, until GeenStijl.nl made it available to its large audience by publishing an article about it, the court says. Therefore, the actions of GeenStijl.nl are an intervention, according to the court. Without this intervention, the public wouldn’t have had access to the pictures before their official publication in Playboy.
- New audience: According to the court, there wasn’t an audience for the pictures before GeenStijl.nl published its article.
- Profit: By publishing the URL to the pictures, GeenStijl.nl had the unmistakable intention to attract more visitors, the court states. With success: in 2011, the article about Dekker was the best viewed topic on GeenStijl.nl, according to the statistics.
The second prong really just seems like a repeat of the first prong. The entire argument that seems to have convinced the court is that GeenStijl was the first to link to the content. Under US law you face much more liability for leaking "pre-release" material, so you could argue that this is a similar situation in the Netherlands, but again, it's not GeenStijl "leaking" the material. They're acting as a journalist, telling people such content exists.
The final prong is completely useless. Basically it seems to say that because the article was popular, that's evidence for infringement. I can't see how that makes any sense at all. If GeenStijl was, for example, selling access to the images, then there's a much stronger argument of "profit." But just saying that because the site got a lot of traffic, they profited seems like a dangerous precedent.
The Future of Copyright article mentions the cases against FTD as being similar, but I'm not sure that's true. While a lower court had found FTD guilty for linking, on appeal it was said that links weren't the problem, it was the promoting of uploads that got FTD in trouble.
Either way, it's of little surprise that Tim Kuik, the head of the Dutch anti-piracy group BREIN, is cheering on this ruling, suggesting that this case will be useful in other efforts to go after sites that link to infringing content. Of course, given the specific nature of the ruling, including how much of it seemed to rely on the fact that GeenStijl was the first to somehow create an audience for these images, I do wonder if it really has that much value for BREIN in those types of cases. Similarly, it may be a bit exaggerated to claim -- as GeenStijl did in response to the ruling -- that the ruling outlaws Google. Again, the ruling does appear to be highly fact-specific.
It is a troubling ruling for a number of reasons. Merely setting up the precedent that a link itself is infringement has all sorts of problematic implications. But the highly specific details associated with the ruling, especially the reliance on being the first to publish the link, at least suggests that this has limited value as a wider precedent.
Permalink | Comments | Email This Story
Last year, Senator Pat Leahy introduced an ECPA reform bill that was mostly good. It basically said that if the government wants to get access to your data on a server, it first needs to obtain a warrant -- something that is sorely missing today. There were some loopholes that concerned us, but for the most part, it was a very big improvement. And it went nowhere. Now, many folks around here will remember Senator Leahy for being the driving force in the Senate behind PIPA -- and you may be quick to want to dismiss his actions here. But just because he's (strongly) supported that bad bill, it doesn't mean that everything he introduces has been similarly problematic.
Leahy is trying again to move forward with his ECPA reform plan, this time attaching it to an update of the Video Privacy Protection Act (VPPA). We've discussed the VPPA before. The short version is that it was a special law that bars the release of video rental info, passed in response to Supreme Court nominee Robert Bork having his video rental history leaked. But, of course, in this modern age where people automatically stream their music playlists or book purchases to Facebook... Netflix is left out in the cold, because the VPPA doesn't allow them to do the very same thing. So, there's an update to the VPPA making the rounds that basically changes the law to let you tell the world what you streamed from Netflix last night (if you so choose to share that kind of info).
That bill has a chance to actually go somewhere, and it looks like Leahy sees it as another chance to see if he can get his ECPA reform package through the Senate. While it's no secret that I've had my differences with various Leahy proposals in the past, this is a reform that is badly needed to protect our privacy from government intrusion. Requiring a warrant to access your info in the cloud is a common sense move that's long overdue.
Permalink | Comments | Email This Story
This "stop irritating me" via handcuffs has become so common it has its own term: "contempt of cop." Abusing the intent of the law to shut someone up (or confiscate their recording equipment) has become so common that entire blogs and websites are able to fill page after page with accounts of these actions.
Fortunately, the judicial system has pushed back. A decision handed down recently by the 7th Circuit Court goes even further than simply declaring a certain situation as being unconstitutional. Judge Joel Flaum's decision actually invalidates a section of Chicago's municipal code.
First, the background:
Buddy Bell participated in a January 2008 protest against the Iraq War in downtown Chicago. While President George W. Bush was at a luncheon nearby, Bell held a banner that said: "End the war and occupation TROOPS HOME NOW."
After Chicago police arrested a protester who entered the street carrying a banner, Bell and two other protesters also stepped into the street and approached the police squad car, chanting, "Hell no, we won't go. Set him free." When the activists refused to get back on the sidewalk, the police arrested them for disorderly conduct.
In particular, the police charged Bell under a Chicago municipal code that makes it a crime to disobey a police officer's instruction to leave the scene when other individuals are engaging in nearby acts of disorderly conduct that "are likely to cause substantial harm or serious inconvenience, annoyance or alarm."Unfortunately, this sort of catch-all charge is far from unusual. Bell's filing of a federal complaint against the city of Chicago isn't that unusual, either. Many cities are finding themselves paying out thousands of dollars to settle lawsuits stemming from abuse of citizens by law enforcement. Bell challenged this particular part of Chicago's municipal code as unconstitutional. District Judge John Darrah originally dismissed Bell's claim for "lack of standing," but the Seventh Circuit Court reversed the dismissal.
Judge Flaum went further, invalidating that particular section of the Chicago Municipal Code after finding that it "substantially inhibits protected speech and is not amenable to clear and uniform enforcement."
"To the extent that [the ordinance] authorizes dispersal when an assembly creates or is threatened by 'substantial harm,' it does not improperly infringe upon protected speech," Judge Joel Flaum wrote for a three-member panel. "We cannot say the same, however, for authorizing dispersal on the basis of 'serious inconvenience, annoyance or alarm.'"Flaum does more than shut down a purposely vague ordinance. He also throws in a dig at the circumstances that called this ordinance into question ("if performed by three or more individuals"). He also calls attention to the other terms used to justify charges being brought under this code, noting that "alarm" is still dangerously non-specific, but saves the real criticism for "annoyance."
Unlike the code's provision for responding to nuisances, the ordinance "does not specify what inconveniences, if performed by three or more individuals, may trigger an order to disperse," the 35-page decision states.
"Nor does it clarify that, whatever the inconvenience at issue, dispersal must be necessary to confront the violation," Flaum wrote. "To this end, the ordinance lacks the necessary specificity and tailoring to pass constitutional muster, and we must conclude that the ordinance substantially impacts speech."
As for "annoy," Flaum noted that the ordinary meaning, "which is 'to trouble, to vex, to impede, to incommode, to provoke, to harass or to irritate,' compels this reading: not every annoying act gives rise to imminent danger or nuisance."Chicago's stance is that this ordinance is in place to ensure "safety." But safety for whom? Certainly not the public. And does law enforcement really need to be kept safe from "inconvenience, annoyance and alarm?" The Seventh Circuit Court says it doesn't, not if the cost of the safety is the Constitutional rights of citizens.
"Avoiding annoyance is never a proper basis on which to curtail protected speech," he wrote.
"We cannot conceive of an annoying behavior, however annoying it may be, that could constitutionally draw as a remedy dispersing others engaged in protected speech," Flaum added.
Permalink | Comments | Email This Story
As Techdirt has reported, open access (OA) is scoring more and more major wins currently. But the battle to gain free access to academic research has been a long one. One of the key moments was the launch of the Budapest Open Access Initiative (BOAI) ten years ago, which saw the term "open access" being defined for the first time:
By "open access" to this literature, we mean its free availability on the public internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, should be to give authors control over the integrity of their work and the right to be properly acknowledged and cited. To mark that first decade, the BOAI site has published a series of further recommendations for the next ten years, with the aim of making "open" the default for peer-reviewed research literature.
The first is that:
Every institution of higher education should have a policy assuring that peer-reviewed versions of all future scholarly articles by faculty members are deposited in the institution’s designated repository. This is to ensure that copies of research, including theses and dissertations, are always available from some independent online collection or database of articles, and not just from publishers, for example. The first guideline also comes out against
the use of journal impact factors as surrogates for the quality of journals, articles, or authors. We encourage the development of alternative metrics for impact and quality which are less simplistic, more reliable, and entirely open for use and reuse. The question of whether to pay attention to impact factors -- an attempt to gauge influence in the academic world -- is a vexed one: most people agree it's a dreadful way to measure someone's achievements, but institutions keep on using them anyway when handing out jobs and money. It would be a real achievement if the new BOAI guidelines helped bring in better ways of measuring academic quality.
The second recommendation is that "the optimal license for the publication, distribution, use, and reuse of scholarly work" is CC-BY – that is, attribution. It's a bold move, since CC-BY gives users a lot of freedom that authors are sometimes reluctant to grant. Here's a good explanation of why that's a sensible position to take; it's from a blog post about the new recommendations by Peter Suber, one of the key figures in the open access movement:
The purpose of OA is to remove barriers to the scholarly uses of scholarly literature, without harming scholars. There’s no legitimate scholarly need to suppress attribution to the texts we use. And in any case, suppressing attribution would hurt authors. If they don’t get paid for their articles, at least they should get credit. Their impact and careers depend on that. The third recommendation picks up on the first, and goes into some detail about how institutional repositories should work. That's a reflection of the fact that such repositories are widely accepted now, so the issue is more a question of optimizing their use.
Finally, there is a recommendation on advocacy and coordination that includes the following:
The worldwide campaign for OA to research articles should work more closely with the worldwide campaigns for OA to books, theses and dissertations, research data, government data, educational resources, and source code. That clearly touches on many of the key issues covered here on Techdirt, and represents a radical and welcome extension of ambitions by proponents of open access. That they feel in a position to make this move is a measure of just how much they have already achieved in the ten years since the Budapest Open Access Initiative was announced.
We should coordinate with kindred efforts less directly concerned with access to research, such as copyright reform, orphan works, digital preservation, digitizing print literature, evidence-based policy-making, the freedom of speech, and the evolution of libraries, publishing, peer review, and social media.
Permalink | Comments | Email This Story
Of course this hasn't stopped people from attempting to drag service providers into legal complaints. For instance, we have the occasions when Twitter is sued for the actions of its users because it is mistakenly thought to be the publisher of the tweets. Or when the entertainment industry wants to hold Google responsible for Android apps that may allow for file sharing. There are many many more stories like these. Luckily, courts and most law makers understand that service providers cannot or should not be held liable for the actions of their users. Most, anyway.
Jeffrey Nonken Has alerted us to a recent law passed in Malaysia that would hold everyone from the website to the ISP to the coffee house with open wifi to the owner of a borrowed computer responsible for the online postings of a single person.
Section 114A of the bill seeks “to provide for the presumption of fact in publication in order to facilitate the identification and proving of the identity of an anonymous person involved in publication through the internet.” In other words, the section makes it easier for law enforcement authorities to trace the person who has uploaded or published material posted online.This language had the internet-using public in Malaysia in an uproar, and they protested this law in much the same fashion as the protests over SOPA and ACTA. When these protests were finally heard, the Prime minister had the law reviewed, but to no avail.
According to the amended law, however, the originators of the content are those who own, administer, and/or edit websites, blogs, and online forums. Also included in the amendment are persons who offer webhosting services or internet access. And lastly, the owner of the computer or mobile device used to publish content online is also covered under section 114A.
When the petition was ignored by the government, netizens and media groups organized an online blackout on August 14, which succeeded in mobilizing thousands of internet users. The global attention which the action generated was likely what convinced the Prime Minister to agree to have the cabinet review the controversial amendments. Although this announcement was initially welcomed by opponents of the amendments, the Cabinet ultimately upheld the amended law.As we know, these kinds of laws have a strong potential for abuse -- one of the primary reasons US citizens opposed SOPA and CISPA. Giving a government the ability to prosecute a whole string of people only tenuously connected to a potential crime is a recipe for disaster. It will open up the ability for the government to stifle free speech even if it doesn't have to lift a finger. What will happen is that sites will now over-filter comments to avoid liability. Businesses that offered free wifi will potentially cut the service in an effort to avoid prosecution. This law will cause damage to the ability of Malaysian citizens to communicate freely over the internet.
This move to apply such harsh secondary liability is nothing surprising from a nation that supports internet filters which it promises will not be used to punish political dissent. Or the country whose courts, as part of a sentence for defamation, ordered a man to post his apology 100 times on Twitter. With the record that Malaysia has on internet freedom, it is no surprise that the outcome was what it was. However, we hope that the citizens of Malaysia continue their protests, and that those who support and passed this law will repeal it.
Permalink | Comments | Email This Story
Today we learned that YouTube has taken the step of restricting access to the video in question in both Egypt and Libya. When asked about it, YouTube responded with the following statement.
"We work hard to create a community everyone can enjoy and which also enables people to express different opinions," YouTube said by e-mail. "This can be a challenge because what's OK in one country can be offensive elsewhere.
This video -- which is widely available on the Web -- is clearly within our guidelines and so will stay on YouTube. However, given the very difficult situation in Libya and Egypt we have temporarily restricted access in both countries."
While I understand why YouTube is doing this, I think it's misguided for two reasons. First, stupid and hateful as the video in question reportedly is, blocking access (potentially seen as taking it down in Egypt and Libya) can be interpreted to mean that the fault for what's happening is in part with the video itself. It isn't. The guilt for this violence is not in some stupid video. It isn't even in the massive protests in the Muslim world against the video (though I'd probably suggest they learn about the Streisand Effect). The guilt for the violence and death belongs on the thugs and murderers who committed it. End of story. This is especially true when the company has acknowledged itself that the video does not violate YouTube's terms of service.
The EFF agrees.
It is easy to understand why YouTube might feel compelled to act in response to the rioting over this video, especially after three U.S. embassy employees were killed in the Libyan city of Benghazi, but the blame for the violence lies not with the video, but with the perpetrators. Once YouTube has made the decision to pro-actively censor its content, they start down a slippery slope that ends in YouTube Knows Best moral policing of every video on their site. It is disappointing to see YouTube turn its back on policies that have allowed it to become a such a strong platform for freedom of expression. We hope that this new-found enthusiasm for pro-active censorship is a temporary aberration rather than a sign of things to come.The second reason is that YouTube's move is almost certainly equal parts too late and ineffectual. As the company's statement itself noted, this video is and already was all over the internet. Censoring the video now is a bit like covering your ears and eyes as your house burns around you. The problem of religious intolerance and violent reactions to it is going to exist whether you acknowledge it's there or not. Nobody is served by trying to pretend the hateful attitudes in the video don't exist. And it isn't like the protests have ceased now that YouTube has restricted access in those countries. The cat is already out of the bag. All you've done now is open the door to blocking videos based on people deciding to be offended with little to no effect on the violence at hand. So what was the point?
I'll be clear again: every description of the video in question suggests that it is cartoonishly crafted and inflammatory bigotry. But it doesn't violate YouTube's TOS, it is speech, and taking it down was a poor decision made in fear. That isn't the way I expect a company like YouTube to behave.
Permalink | Comments | Email This Story
Every time a new gadgets gets released, I eagerly await someone to come along and take them apart and show me what they look like on the inside. The photos are always these pristine tables with each piece delicately separated and neatly organized. All of the time and effort that went into engineering these parts, [...]
Ever since Valve released the first Portal game there have been a number of really well done replica Portal guns and turrets made, Ben Heck created a Portal shirt, and there’s even a live show that uses portals. No one has managed to actually make a working portal yet, though, and it will remain impossible [...]
The Wii U has now been officially announced along with release dates for the US, Japan, and Europe. But we still don’t know that much about the hardware other than it will run a triple-core IBM Broadway CPU, an AMD Radeon GPU, and gives developers (only) 1GB of RAM to play with. Until Nintendo decide [...]
If you’re one of those geeks in the world that is obsessed with being able to control their environment via a mobile device (and really, that’s most people), then you’ll want to take a look at this cool new hack that is depicted in the video above. Using an inexpensive LED kit from IKEA, the [...]
Japanese designer Yuri Suzuki has brought new meaning to the phrase “mind the gap” with his latest piece of electronic art. Based on the London Underground’s iconic Tube map created by Harry Beck, Suzuki has created a working AM/FM radio printed circuit board (PCB) that is an exact replica of the subway layout right down [...]
Utilizing green energy solutions typically means you also need batteries to store that energy. In the case of something like solar panels they usually have their own battery storage system, but unless you have a very large array of panels the energy stored isn’t going to cope with much beyond keeping your lights on at [...]
If you haven’t pre-ordered Resident Evil 6 for the Xbox 360 yet, Microsoft has a tempting offer that may give you a reason to do just that. When you buy RE6 directly from Microsoft, you’ll receive $30 worth of coupons, $20 of that is 1600 Microsoft points, while the other $10 is a gift card for Microsoft’s [...]
The new iPhone 5 has all the bells and whistles that consumers were clamoring for last year, but has that extra year saved Apple some money? According of a provisional estimate of pricing from UBM TechInsights, the new iPhone has a bill of materials totaling $167.50. That's not bad when you consider the iPhone 4S was estimated [...]
Protecting a web user’s privacy choices is a hot-button issue, and it’s at the heart of the Do Not Track discussion. Mozilla got the DNT ball rolling, Opera quickly offered up its support, and even Microsoft embraced the emerging standard in Internet Explorer 10. Others, however, remained aloof. Google, for example. With its own array [...]
Working at one of the world’s largest tech companies has certain perks, especially when it’s a company like Microsoft and three of the most important product launches in its corporate history are about to happen. One way to get the word out about your new operating system and hardware (and their benefits) is to put [...]
Hardware enthusiasts have been toying with the idea of submerging computers in mineral oil for some years now, but chip maker Intel has just completed a long-term study on oil cooling for servers. In the study, two identical servers were run for a year: one in oil and the other air-cooled. The results? Oil submersion [...]
Acer had planned to launch a customized version of its Cloud Mobile smartphone in China that ran Alibaba’s Aliyun OS. The phone is already available elsewhere running Android, but with Acer’s brass keen to expand the company’s mobile market share, shifting to Aliyun in China seemed like a good idea. Google apparently thought otherwise. According [...]
Back in June, Intel revealed what it called the NUC — or Next Unit of Computing. A bold moniker to be sure, when the device doesn’t look all that dissimilar to the numerous other diminutive PC options already available on the market. Intel had originally pitched the NUC as a device for use in kiosks [...]
Back in July a number of images leaked of a brand new PlayStation 3 console carrying the model number CECH-4011B. It looked much smaller than the current CECH-3000 model many of us have under out TVs and it is being referred to as the PS3 Super Slim. Sony has a history of updating its console [...]
Nintendo’s latest console has had something of a rough start. It wasn’t totally clear at the official unveiling what was actually announced, and then later on it was made clear that this was a whole new console. The Wii U is Nintendo’s grand attempt at combining the explosive popularity of the original Wii and the [...]
Spinning hard drives might not be as important at a consumer level as solid state drives continue to come down in price, but for storing large amounts of data, spinning drives will be the best deal for some time to come. A new drive from Western Digital seeks to power the expanding cloud storage infrastructure, [...]
Apple has finalized the iOS 6 software that it first previewed months ago. Developers have had access to some builds to test apps, but now there is a relatively bug-free Gold Master build out there that anyone can use. This is the same file that is going to be pushed to users through iTunes on [...]
When the issue of patents comes up, it's often in the context of the US courts. While the US patent system takes a lot of heat, Germany has its fair share of patent infringement cases too. In a recent hearing, a regional court in Munich found that Motorola did infringe an Apple patent for the [...]
Vintage gaming fanatics who were turned off by the reprised Neo Geo X’s $200 price tag may find comfort in knowing that a barebones version of the old-school handheld will also be available for $130. In 1992, the Neo Geo AES console was released, ushering in a groundbreaking new home system that brought arcade-quality fighting [...]
Intel sits in a pretty dominant position in the chip making business, with the exception of one sector: mobile devices. For smartphones and tablets ARM is the market leader due to its low power, high performance chip designs working so well for those form factors. Intel hopes to change that with the introduction of the [...]
The arrest was reported by the Sheriff's Department, but there was no information by either that office or the FBI as to the charge.
A lawyer for Brown, Jay Leiderman, said Brown was being charged with threatening an FBI agent. He is reportedly being held without bail in a federal detention center near Dallas.
The recorded video chat on TinyChat, which has been posted online, shows Brown, 31, in a split-screen conversation with several others, one of whom wears the V-for-Vendetta Guy Fawkes mask that Anonymous members have adopted.
A woman, who some have identified as Brown's girlfriend, is shown on the screen from his location. At one point, she turns off the video but the audio continues with shouting and noise, and another voice says "get your hands down." The other chat participants exchange jokes about whether the noise from Brown's camera is actually an FBI raid.
Brown had appeared in a video published on Wednesday on YouTube, which was entitled "Why I'm Going to Destroy FBI Agent Robert Smith Part Three: Revenge of the Lithe." In a rambling rant, Brown said Smith was chosen because Brown's mother is being threatened with obstruction of justice for allegedly hiding his laptop.
Brown said he hid it himself, and that his mother is, in fact, "a rule follower," which is "what's absurd about this."
On the tape, Brown says, "Robert Smith's life is over." He added that, "When I say his life is over, I'm not saying...
There were reports that Apple had stopped taking pre-orders altogether, but as of Friday afternoon we were able to go through the process online without being told of any issues. A call to Apple's hotline, however, yielded only an apologetic message about high call volume.
The iPhone 5 is also available for pre-order from Best Buy, Walmart and other retailers, as well as from Verizon Wireless, AT&T and Sprint Nextel. Lines form at stores on Sept. 21. Analysts estimate that Apple can expect to sell 50 million iPhone 5s by the end of the quarter and year.
Given the history of iPhone glitches, such as the antenna issue that prevented Consumer Reports from recommending the iPhone 4, some consumers may choose to wait until the first 10 million or 20 million customers field-test the iPhone 5.
But wireless analyst Gerry Purdy of MobileTrax told us the high volume expected by Apple, plus the fact that it is not a major redesign of the product -- though it is thinner, lighter and taller -- suggests that glitches are unlikely.
"This is a refresh of the product, rather than a revolution or innovative product," Purdy said. "They wouldn't be into a run-rate of -- to be conservative -- 40 or 50 million units unless they felt it was pretty stable."
He added that concern about potential glitches or malfunctions has likely kept Apple making only incremental improvements in the device, including the increased screen size and a radio for long-term evolution high-speed data. Expectations for near-field communication for mobile payments, however, fell short.
The survey, conducted by Harris Interactive for Radvision, is an attempt to lay down some markers about exactly what are the boundaries of acceptable behavior in the long-envisioned but only recently implemented trend of video calling. Radvision, owned by Avaya, offers the Scopia video conferencing platform.
Not surprisingly, age plays a part in the evolving etiquette. The study found that those age 35 and older were more likely to feel that a bathroom is off-limits at any time, than were their younger counterparts.
But gender can also be a factor. Women are more likely than marrieds to dress in business attire for work-related video calls than men. Single or never-married Americans are more likely to dress casually for a video call or conference than they would otherwise do for an in-person meeting.
The survey indicated that where you live in the U.S. can affect how likely you are to have employed video calling. For instance, those who live in the southern or western U.S. are more likely to have participated in video calls than those in other parts of the country. The study does not indicate why, although it could be related to a wider geographical spread between population centers in those regions and, therefore, a lesser propensity for local traveling.
Bob Romano, global vice president of marketing for Radvision, said in a statement that the growth of video calling is not surprising, since "many companies are looking for alternative cost-effective and efficient ways of doing business." The generational difference is yet another consequence of the "bring your own device" movement in which, Romano noted, "younger entrants into the workforce are familiar with using video...
But with the launch of the Apple iPhone 5 making headlines, and the iTunes updates being announced right alongside it, security researchers stood at attention when Apple released a security update for iTunes 10.7 that fixes a jaw dropping 163 vulnerabilities. The issue affects Windows 7, Vista, XP SP 2 or later.
"Visiting a maliciously crafted Web site may lead to an unexpected application termination or arbitrary code execution," Apple said in its security bulletin. "Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling."
We caught up with Wolfgang Kandek, CTO of Qualys, to get his take on the whopping number of vulnerabilities and what kind of target that puts on iTunes' users backs.
Kandek told us he doesn't think iTunes is very high on the priority list of the attackers -- and it is quite possible that none of the fixed vulnerabilities can actually be exploited through iTunes.
"We do not treat iTunes vulnerabilities different from other software packages," Kandek said. "Personally, I recommend customers to first address the most exploited attack vectors, such as outdated PDF readers, old Java installations, etc."
The greater threat may be the new version of the Blackhole exploit kit Sophos is reporting. Sophos characterizes Blackhole as arguably the most successful exploit it has seen over the past couple of years.
According to Sophos, the new Blackhole exploit kit claims to: prevent direct download of executable payloads; only load exploit contents when the client is considered vulnerable; drop use of the PluginDetect library; remove some old exploits; and change from a predictable URL...
The change, which takes effect this weekend, comes after years of bitter back and forth between the world's largest online mall and the California Legislature over whether Internet retailers should have to charge sales tax. The two sides reached a deal in 2011 that included a one-year grace period set to end Saturday.
The deadline has spurred at least some consumers into impulse-buying mode, making big-ticket purchases and stocking up on essentials before the tax collection kicks in.
"Even the mailroom is laughing at me," said Derek Daniels, 37, who has had Amazon packages delivered to his Los Angeles office every day this week. He's loading up on household supplies like trash bags and collecting birthday and Christmas presents for his Superman-loving 2 year-old.
"We are hoping he won't fall in love with Batman by the time November rolls around," Daniels said.
The looming deadline prompted San Diego artist John Purlia to finally buy that Samsung flat-screen television that had been sitting in his Amazon shopping cart for months. He also picked up four CDs, an external hard drive and an oddly decorated $17.99 kitchen cutting-board -- a gag gift for his sister.
"The TV was the motivating factor and the other stuff came along for the ride," said Purlia, 52. "I know I'm going to be back at Amazon before Saturday looking to take advantage of this. It's like the final days of a sale."
Technically, Purlia and Daniels owe taxes on all of this: California residents are supposed to calculate their obligation and send it directly to the state. But fewer than 1 percent do, according to the Franchise Tax Board.
Lawmakers have long complained...
The digital drama unfolded earlier this week when the cyber-sleuths at the tech giant's Digital Crimes Unit acted on research that showed that crooks were using fake software to infect computers with malware connecting to the Nitol botnet. The botnet activity via the domain 3322.org, dated back to 2008.
A botnet is a system of computers that has been compromised by hackers.
"We found malware capable of remotely turning on an infected computer's microphone and video camera, potentially giving a cybercriminal eyes and ears into a victim's home or business," wrote Richard Domingues Boscovich
, assistant general counsel of Microsoft's Digital Crimes Unit, on Microsoft's official blog Thursday. "Additionally, we found malware that records a person's every keystroke, allowing cybercriminals to steal a victim's personal information." As part of its Project MARS (Microsoft Active Response for Security) program, Redmond, Wash.-based Microsoft filed suit in the U.S. District Court for the Eastern District of Virginia, seeking a temporary restraining order against an individual named Peng Yong, his company and other unnamed individuals, which was granted on Monday. Yong denies any wrongdoing. That order allowed Microsoft to take control of the 3322.org domain through a new domain system that allows the company to block Nitol and nearly 70,000 other malicious sites while keeping traffic to legitimate sites flowing normally. "In an operation like this, you are trying to take the servers that are botted offline once you identify them," explained technology consultant Rob Enderle of the Enderle Group. "Once you identify the IP address, you isolate the machines so they can't talk to anyone else, which effectively shuts them down. It's like what you would...
"We found malware capable of remotely turning on an infected computer's microphone and video camera, potentially giving a cybercriminal eyes and ears into a victim's home or business," wrote Richard Domingues Boscovich , assistant general counsel of Microsoft's Digital Crimes Unit, on Microsoft's official blog Thursday. "Additionally, we found malware that records a person's every keystroke, allowing cybercriminals to steal a victim's personal information."
As part of its Project MARS (Microsoft Active Response for Security) program, Redmond, Wash.-based Microsoft filed suit in the U.S. District Court for the Eastern District of Virginia, seeking a temporary restraining order against an individual named Peng Yong, his company and other unnamed individuals, which was granted on Monday. Yong denies any wrongdoing.
That order allowed Microsoft to take control of the 3322.org domain through a new domain system that allows the company to block Nitol and nearly 70,000 other malicious sites while keeping traffic to legitimate sites flowing normally.
"In an operation like this, you are trying to take the servers that are botted offline once you identify them," explained technology consultant Rob Enderle of the Enderle Group. "Once you identify the IP address, you isolate the machines so they can't talk to anyone else, which effectively shuts them down. It's like what you would...
A team at computational engineers at the University of Southampton in the U.K., aided by the 6-year-old son of one of the team members, has done just that. The team used 64 Raspberry Pi computers, held together by the Lego blocks, and they've now published a do-it-yourself, step-by-step guide in case you'd like to build your own supercomputer.
Raspberry Pi is a credit card-size, single-board computer that was developed in the U.K. by the Raspberry Pi Foundation in order to teach basic computer science in the schools. It features a Broadcom system-on-a-chip, with an ARM 700 MHz processor, VideoCore GPU, and 256 MB of memory. An SD card is used for booting and storage. The Raspberry Pi Foundation is supported by the University of Cambridge Computer Lab and Broadcom.
The design was developed by Professor Simon Cox and his son James, and the machine is constructed in two Lego towers. Cox and Cox had been testing the Raspberry Pi over the summer, programming it using Python and Scratch languages.
The control code was written in Python using Microsoft's Visual Studio. Scratch is a programming language developed by the Massachusetts Institute of Technology, and it's intended to help children learn to create their own interactive stories, animations, games and art. The entire system was built for a bit more than $4,000, excluding the Ethernet switches.
Professor Cox said in a statement that, "as soon as we were able to source sufficient Raspberry Pi computers, we wanted to see if it was possible to link them together into a supercomputer." In fact, getting enough of the $35 Raspberry Pi's was the biggest challenge, since the Foundation regularly sells out of them shortly after each batch is created. The entire Lego-linked...
Some are pointing to what they say are dramatic differences in how A&T and Verizon will handle FaceTime over cellular, while analysts argue the two approaches are nearly identical. Keyword: nearly.
Customers purchasing an iPhone 5 can sign up for Verizon's relatively new Share Everything Plan, with prices beginning at $40 monthly that includes unlimited voice, unlimited text, picture and video messaging, and a data plan that can be shared with up to 10 devices on a single account.
Verizon's news release pointed out that, "customers wanting to use FaceTime on their iPhone 5 can do so using any Verizon Wireless data plan allowance." Verizon still has some customers on old plans that can use FaceTime over cellular on an unlimited basis. But AT&T is only letting customers on its new shared data plans access FaceTime over cellular.
AT&T opened up a net-neutrality can of worms last month when it said it planned to offer FaceTime only to cellular customers on shared data plans. Customers have historically used the video chat application over Wi-Fi, but Apple's latest version of its mobile operating system, iOS 6, offers mobile broadband capabilities using FaceTime. The new iOS will be available for download Sept. 19 and will come pre-installed on the iPhone 5.
Groups like Public Knowledge are coming together against AT&T's moves in light of the mobile OS updates. John Bergmayer, a senior staff attorney at Public Knowledge, insisted that by blocking FaceTime for many of its customers, AT&T is violating the FCC's Open Internet rules.
AT&T's Bob Quinn said calling the move a violation is "another knee-jerk reaction," and said "those arguments are...
Connections provides collaboration, communication and communities between employees, and outside to clients or vendors, and is available in either on-premise or cloud-based versions. The platform, which IBM said is being used by more than 60 percent of Fortune 100 companies, integrates activity streams, calendaring, wikis and blogs.
The new version of Connections provides several new capabilities. An activity stream offers a more consolidated and customizable view of the social connections, such as instantly available status and content updates. Users can now utilize content directly inside the Activity Stream without switching between applications.
There is also a broader support of mobile devices, including geo-location tagging. IBM gave the use case example of an insurance agent out in the field who can take a photo, tag it with geo-location data, and then upload that photo along with the data to Connections, for use throughout the network.
A new e-mail capability offers a simplified access to e-mail within the environment. The landing page can now feature content from any outside source, which can be utilized alongside the company's own content, e-mail and calendar. Content can include Twitter feeds, Facebook posts, weather data, videos, Web pages or log files.
Connections' expanded analytics includes a view of what's trending at a given time, so that users can see the most popular topics being discussed.
Suzanne Livingston, senior product manager for IBM Social Business, told us that the new version expands on the analytics layer that was introduced in version 3, with additional business intelligence. She also pointed out that Connections is supporting OpenSocial and Activity Streams standards, enabling better integration...
The solutions include: the Cisco Adaptive Security Appliance line; virtualized ASA for multi-tenant environments; a data-center-grade intrusion prevention system; and new improvements to the Cisco AnyConnect Secure Mobility Client to meet the requirements of a more mobile and productive workforce.
"For enterprises to confidently seize the business benefits offered by data center virtualization and the cloud, security must be seen as the art of the possible, not as a hindrance," said Christopher Young, senior vice president and general manager of Security and Government Group at Cisco. He notes that the solutions let administrators deliver IT as a service with security without compromising network performance.
As Cisco sees it, the virtualization and cloud mega trend is forcing profound shifts within data centers -- and those shifts affect everything from IT services to business models to architectures. If addressed properly, Cisco said, these trends offer business benefits such as reduced capital investments, new revenue growth and the greater efficiency, agility and scalability demanded by globalization.
With its new security solutions, Cisco is working from the principle that security has to be integrated across the network to ensure protection of unified data centers. Cisco believes network policies should be unified across physical and virtual worlds, intra-virtual machine communication should be secured, and access to applications by wired and mobile clients must be protected.
"Security is measured by levels of trust. It's about global authority and access. There has been a true shift in the realm of security," said Nick Schmidt, senior manager, Information Technology at CDW. "Cisco's security solutions play a key...
My true answer must wait until I've had a chance to put the iPhone 5 through its paces. But the new iPhone, unveiled Wednesday, looks awfully inviting from my vantage point. Like many people, I've had an iPhone 4 that has frankly grown stale. But I also postponed the purchase of a new smartphone -- waiting to see what Apple would do.
The iPhone 5 has the same Retina display as on its predecessor. But Apple finally upped the screen size to 4 inches, from the 3.5-inch display that was on all the earlier models. That permits a fifth row of app icons on the home screen. It's still a smaller screen than the display on many rival Android devices. But the extra real estate is welcome just the same, and the device -- which I got to pick up at the demonstration area set up after Apple's press event here -- felt comfortable.
Choosing a screen size is always a balancing act against the overall physical dimensions and design. The iPhone 5 is just a little taller than the iPhone 4S, but it is still, Apple says, the thinnest and lightest iPhone ever made. It is 18% thinner, in fact, than its immediate predecessor. And the iPhone 5 is one-fifth lighter than the 4S. It is made entirely of glass and aluminum.
As had been rumored and as I had hoped, the iPhone 5 can tap into speedy wireless 4G LTE networks. Apple will be working in the U.S. with AT&T, Sprint and...
Apple has said that its iOS 6 software will sport more than 200 new features, though some won't be available on all devices. The new features include an updated mapping service and better integration with Facebook.
On Wednesday, Apple showed off the virtual assistant Siri giving driving directions. Siri will also let you post Facebook status updates you speak out to her.
There's also an enhancement to email, so you can deem certain people "VIPs" and locate emails from them more easily.
As announced in June, iOS 6 will be a free upgrade for iPhones released since 2009 -- the 3GS, 4 and 4S models. It will also be available on the iPad 2 and this year's iPad model and newer iPod Touch devices.
The update for older devices will be available starting next Wednesday. The new iPhone 5, with iOS 6 built-in, will be out two days later, on Sept. 21, in the U.S., Australia, Canada, France, Germany, Hong Kong, Japan, Singapore and the U.K. Advance orders will begin this Friday. It will be available in 22 more countries on Sept. 28.
Here are some highlights of iOS 6:
Apple's mobile devices will have a mapping program, built in-house.
In the past, Apple has given prominent billing to Google Inc.'s mapping app. But the two companies have increasingly become rivals as people buy more devices running Google's Android operating system. Google also has been keeping some features, including turn-by-turn directions spoken aloud, exclusive to Android.
Apple's new Maps application will have a voice navigation feature. It will have real-time traffic data and offer alternative routes as traffic conditions change.
It will also include "flyover" three-dimensional images taken by helicopters hired by the company to fly over major cities. Google has been...
The new earbuds, called EarPods, are being sold separately for $29 but will be included at no extra charge with the iPhone 5 and the refreshed iPod Touch and iPod Nano.
The company says the earbuds were three years in the making and required scanning hundreds of ears looking for commonalities. They are more elliptical than the current earbuds and have a smaller speaker that points into the ear canal. They also have other ports meant to maximize airflow.
They don't create a seal like other in-ear headphones, but Apple says the audio quality is "just as impressive as what you'd hear from more expensive headphones." Like the older versions, the EarPods come with a microphone and a remote control on the cord to adjust volume, control playback of music and movies and answer and end calls.
One design change that could cause some annoyance is the iPhone 5's new "Lightning" port, through which the device gets charged.
It's 80 percent smaller than the 30-pin connector that has been on iPods since 2003 and all iPhones and iPads ever released. It also accepts the new cord's flat connection reversibly, so you don't have to fumble with its orientation as you had to before.
Apple said the new connector is appropriate because the iPhone 5's body is thinner. It is also a feature of the new line of iPod Touch and iPod Nano devices, which were refreshed on Wednesday. Along with getting the new connector, the Touch adopted the iPhone 5's...
Long anticipated, the 4G LTE iPhone -- a data hog's delight -- reaches consumers' hands Sept. 21, less than 10 days from now. Verizon's LTE network has been up since the end of 2010, and ATT launched its network a year ago, announcing last week that it would reach 100 markets by the end of the year.
Sprint Nextel, the third major carrier to get the iPhone, began rolling out its new LTE network in June, and on Monday announced a major expansion of its network to an additional 100 cities in the next few months, with full implementation expected by the end of 2013. (Sprint's unlimited plans could even further entice heavy data use.)
In announcing the new iPhone, an Apple executive noted that LTE data speeds can be faster than home Wi-Fi connectivity, thereby inviting users to discontinue connecting to Wi-Fi if they have an unlimited plan.
So it's safe to say all three carriers, which have relatively few devices now using LTE as compared with 3G (Verizon has the most) will be virtually bombarded with iPhone data surges.
"The carriers, of course, want customers to use LTE as much as possible, given the better user experience and likelihood they will exceed data plan minutes," said Kirk Parsons, a wireless analyst at JD Power and Associates, after the product launch.
"I suspect this will be even more pronounced for iPhone owners as they tend to use data applications and service more often in general, and now having an LTE-capable device will only increase their data usage opportunities."
But can the wireless carriers handle the surge? After all, Verizon has suffered from...
Andrew Feldman, general manager and corporate vice president of the Data Center Server Solutions group at AMD, said the rise of virtualization, cloud computing, and Big Data require a new generation of compute in which networking and storage are equal partners in the solution.
"This does not fit the mold of traditional servers," Feldman said. "We are at the beginning of a new wave of computing that requires data centers to become pools of computing and storage resources with the flexibility to expand in both dimensions."
AMD is pitching that the SM15000 system removes the constraints of traditional servers and allows data centers to expand compute, networking and storage independently. Does the pitch hold water? First, more facts.
Micro servers are dense, hyper-efficient systems in which the compute, storage, and networking are linked by a fabric that lets them share common infrastructure components. The SeaMicro SM15000 micro server uses patented Freedom Fabric. That, AMD said, makes possible the disaggregation of data center infrastructure.
With the new AMD Opteron processor, AMD's SeaMicro SM15000 provides 512 cores in a 10-rack unit system with more than 4 terabytes of DRAM and supports up to 5 petabytes of Freedom Fabric Storage.
AMD's SeaMicro SM15000 server is the first micro server to support the latest generation of Intel Xeon processors based on the "Ivy Bridge" micro-architecture. A SeaMicro SM15000 server configured with 64 Intel Xeon E3-1265Lv2 CPUs provides 256...
GSMArena.com - Latest articles
It looks like the Chinese smartphone manufacturer Oppo Mobile has something amazing in the making. The company's CEO Chen Mingyong teased the Oppo Find 5 quad-core flagship with 1080p display, sporting the mind-blowing pixel density of 441ppi. Such pixel density puts the upcoming 5" device in an entirely different league from the current crop of top shelf smartphones. A 441ppi pixel...
It appears that HP might be looking for a way back into the smartphone game, people . Immediately after the computer giant's CEO Meg Whitman spoke about the company releasing a smartphone eventually, an HP branded, Android ICS booting handset, dubbed Bender has appeared in GLBenchmark test result database. The mysterious handset sports some seriously beefy specs, which include Qualcomm...
In a quiet fashion Motorola has released a developer edition of its latest and greatest DROID RAZR HD smartphone, sporting a bootloader which can be unlocked. The handset is destined for users with a knack for flashing custom ROMs, as well as those who don't like Verizon's take on Android. There is no release date set for the headset. A sign up page however is up and running for the...
Nokia is still picking up pace in the smartphone market, with the Microsoft-driven Lumias yet to make the impact the Finns have been hoping for since the strategy reset. In the meantime, the company has been enjoying a pretty easy run in the...
A twitter update from Rogers in Canada reveals that an ICS update is in the works for the Xperia ion. The update is scheduled to arrive next week, although the exact day is not specified. The Sony Xperia ion went international back in June, and is now available in most markets for around 490. It features a 12 MP camera capable of 1080p recording, 13.2 GB of internal memory, a 4.6" LED...
LG and Qualcomm sent invitations for a joint event that will be held in New York on September 19. The invitation clearly shows that it will be all about some new smartphone and it would be a real shocker if the device in question isn't the US version of the Optimus G. The event is called Live Without Boundaries, but that doesn't really give us much information about the nature of the...
The Motorola DROID RAZR M is the first of the new RAZR family to become available - you can get it right now online or from Verizon. The phone offers a 4.3" screen in a package about the same size as the new iPhone 5, a dual-core Krait processor at 1.5GHz, plus a battery that's "40% more powerful than the iPhone 5 or iPhone 4S". And there's also LTE connectivity on Verizon's 4G network, of...
Just as promised at the iPhone 5 announcement event, Apple made the smartphone available for pre-order from its website today. If you live in the US, you'll also be able to book your Apple iPhone 5 directly from Verizon and AT&T. Initially, only users from US, UK, Canada, Australia, Japan, Hong Kong, Singapore, France, and Germany will be able to make a pre-order, with many more to follow...
It has been discovered that the iPhone 5 won't be able to do simultaneous voice and LTE data on CDMA networks. This has been independently confirmed by both Verizon as well as Sprint in the US. Now it's not that you cannot do voice and LTE data together on CDMA; there are phones out there that can do this. But if you remember, Apple chose to go with a single chip and singe radio for voice...
Samsung has announced the new Galaxy Victory 4G LTE for Sprint, continuing their tradition of releasing phones that have ridiculously long name for no good reason. Other than that enormous name, the Galaxy Victory 4G LTE for Sprint also has a 4-inch, 800 x 480 resolution display, 1.2GHz dual-core Snapdragon S4 processor, 4GB internal memory with microSD card slot, 5 megapixel rear camera...
The Apple iPhone 5 is barely out the door and pre-orders haven't even started yet, but analysts have already come up with the first forecasts for its market performance. RBC Capital Markets is expecting the new iOS flagship smartphone to ship 8 to 10 million units this month alone. The iPhone 5 will only launch on September 21, but it will already be available in 31 countries before the...
Owners of the Atrix HD, rejoice, as Motorla has launched a new software update bringing lots of improvements and bug fixes. The new enhancements list begins with improved Wi-Fi connectivity allowing for stronger connections. The power consumption has also been optimized, which Motorola says will definitely result in longer battery life. The camera is improved as well and now performs...
The UK prices for the iPhone 5 will start from £529 (around 660) for the 16GB variety. The German and French SIM-free prices start from 679. Since the German and French pricing is the same, I guess those would be the starting prices for the Apple iPhone 5 lineup throughout most of Europe. As it's evident, the iPhone 5 prices are slightly higher than what the iPhone 4S used to cost...
One of the key features that Apple chose to talk about during the iPhone 5 keynote yesterday was the camera. The camera on the iPhone 4S was already impressive and if Apple is to be believed, the one on the iPhone 5 is even better. Now on paper, the camera on the iPhone 5 is identical to that on the 4S. It still has the same 8 megapixel backside illuminated sensor with a hybrid IR filter,...
It may look like Samsung is dipping a toe in unknown waters but its long-time partnership with Microsoft is a wet suit of sorts. The Ativ Tab may be the company's first Windows 8 RT tablet but not its first Windows slate. You may be familiar with the Samsung...
While our friends across the Atlantic have been basking in the full shine of fast LTE wireless network connectivity, here in Europe the adoption rate has been... well, let's just say, less than stellar. But fast or not, LTE adoption in Europe is happening. It's the 4G we've all been waiting and now that the mobile hardware has matured enough, Apple is finally confident enough to hop on the...
The iPhone 5 is now official. Apple has just unveiled its most latest iPhone to date. As it turned out all the previous leaks of images and specs were on the spot. The Apple iPhone 5 features a 4-inch Retina display with a resolution of 1136x640 pixels (that's 326ppi), 100Mb LTE connectivity, dual-band Wi-Fi. The new iPhone is thinner - 7.6mm and lighter - 112 grams than its 4S...
The Apple event is underway and the star of the show will be the new iPhone, though we expect to see a couple of new iPods as well. Here's the place where we'll be uploading the new info as soon as it becomes available, so make sure to keep an eye on this space. Apple doesn't do live streaming, unfortunately, so we can't just embed a live video stream from the event as we usually do. Those...
Samsung Sweden, Norway and Denmark posted update schedules for all recent Galaxy models on their Facebook pages. All lists are identical and give information for the firmware updates on Galaxy S III, S II, S II LTE; all available slates, Omnia W and a few bada phones. Apparently the Galaxy S III Jelly Bean update will roll out in October or November, while the Galaxy S II one will come...
Some events are closely associated with certain imagery. There are a lot of pumpkins around Halloween, a decorated tree on Christmas, lots of fireworks on New Year's Eve and, of course, the Apple Store goes down every time there's a new Apple product coming. The Apple Store is down! Unless you've lived in a cave for the last month, you'll know that today Apple will be launching the next...
Powered by RSS Content Generator