Friday, December 19, 2014

Google slams secret Hollywood attempt to ‘censor the internet’

Search company hits out at the Motion Picture Association of America after claims it is trying to revive the failed Stop Online Piracy Act

Google has accused Hollywood of attempting to “secretly censor the internet” by reviving the failed Stop Online Piracy Act (Sopa) to enable wholesale site-blocking.

The search company alleges that Hollywood studios, through the Motion Picture Association of America (MPAA), conspired to push through the effects of Sopa through non-legislative measures.

“We are deeply concerned about recent reports that the MPAA led a secret, coordinated campaign to revive the failed Sopa legislation through other means, and helped manufacture legal arguments in connection with an investigation by Mississippi state attorney-general Jim Hood,” said Kent Walker, general counsel for Google in a blog post.

Sopa defeated
Sopa was a bill put before the US House of Representatives intended to significantly expand the powers of US authorities to combat online trafficking in copyrighted and counterfeited goods.

The sweeping act gave companies that claimed their intellectual property was being infringed the power to request court orders to forbid advertising networks such as Google, as well as payment facilities, from conducting business with infringing sites.

Complainants could also ban search engines from linking to allegedly infringing sites and obtain court orders requiring internet service providers (ISPs) to block access to those sites.

Sopa was defeated in 2012 despite the backing of the MPAA following a public outcry that prompted some 115,000 websites, including Google, to protest against the act. Ten million people signed a petition against Sopa, while 8m made phone calls to Congress and a further 4m sent emails.

‘Why is it trying to secretly censor the internet?’
Advertisement

Google cited news reports that accused the MPAA and six studios of colluding to “begin a new campaign to figure how it could secretly revive Sopa” and “to achieve wholesale site-blocking by [convincing] state prosecutors to take up the fight against [Google]”.

In Britain, copyright holders can seek court orders to force ISPs to block access to sites they deem as infringing copyright. Sites including the notorious Pirate Bay have been blocked in the UK since 2012.

The movie studios reportedly provided $500,000 a year in legal support, which was increased to $1.175 million for this “campaign”.

Google also detailed how the MPAA then convinced the Mississippi attorney-general to support the action, including sending an accusing letter to Google drafted by the MPAA’s law firm Jenner & Block but signed by Hood.

Hood then sent a “sweeping 79-page subpoena” for topics he lacked jurisdiction for, according to Google.

“While we of course have serious legal concerns about all of this, one disappointing part of this story is what this all means for the MPAA itself, an organisation founded in part ‘to promote and defend the First Amendment and artists’ right to free expression’. Why, then, is it trying to secretly censor the internet?” Walker asked in his blog post.

Source: http://www.theguardian.com

Friday, March 21, 2014

Theresa May warns Yahoo that its move to Dublin is a security worry

Theresa May summoned the internet giant Yahoo for an urgent meeting on Thursday to raise security concerns after the company announced plans to move to Dublin where it is beyond the reach of Britain's surveillance laws.


By making the Irish capital rather than London the centre of its European, Middle East and Africa operations, Yahoo cannot be forced to hand over information demanded by Scotland Yard and the intelligence agencies through "warrants" issued under Britain's controversial anti-terror laws.

Yahoo has had longstanding concerns about securing the privacy of its hundreds of millions of users – anxieties that have been heightened in recent months by revelations from the whistleblower Edward Snowden.

Advertisement

In February, the Guardian revealed that Britain's eavesdropping centre GCHQ intercepted and stored the images of millions of people using Yahoo webcams, regardless of whether they were suspects. The data included a large quantity of sexually explicit pictures.

The company said this represented "a whole new level of violation of our users' privacy".

The home secretary called the meeting with Yahoo to express the fears of Britain's counter-terrorism investigators. They can force companies based in the UK to provide information on their servers by seeking warrants under the Regulation of Investigatory Powers Act, 2000 (Ripa).

The law, now under review by a parliamentary committee, has been widely criticised for giving police and the intelligence agencies too much access to material such as current emails and internet searches, as well as anything held on company records.

However, the Guardian has been told that Charles Farr, the head of the office for security and counter-terrorism (OSCT) within the Home Office, has been pressing May to talk to Yahoo because of anxiety in Scotland Yard's counter-terrorism command about the effect the move to Dublin could have on their inquiries.

Farr, a former senior intelligence officer, coordinates the work of Scotland Yard and the security service MI5, to prevent terrorist attacks in the UK.

"There are concerns in the Home Office about how Ripa will apply to Yahoo once it has moved its headquarters to Dublin," said a Whitehall source. "The home secretary asked to see officials from Yahoo because in Dublin they don't have equivalent laws to Ripa. This could particularly affect investigations led by Scotland Yard and the national crime agency. They regard this as a very serious issue."

The move to make Dublin the centre of its headquarters for Europe, the Middle East and Africa (EMEA) was announced last month and will take effect from Friday.

In a statement at the time, Yahoo said Dublin was a natural home for the company and that it would be incorporated into Irish laws.

The firm insisted the move was driven by "business needs … we believe it is in the best interest of our users. Dublin is already the European home to many of the world's leading global technology brands."

However, the firm has been horrified by some of the surveillance programmes revealed by Snowden and is understood to be relieved that it will be beyond the immediate reach of UK surveillance laws.

Following the Guardian's disclosures about snooping on Yahoo webcams, the company said it was "committed to preserving our users trust and security and continue our efforts to expand encryption across all of our services." It said GCHQ's activity was "completely unacceptable..we strongly call on the world's governments to reform surveillance law."Explaining the move to Dublin, the company said: "The principal change is that Yahoo EMEA, as the new provider of services to our European users, will replace Yahoo UK Ltd as the data controller responsible for handling your personal information. Yahoo EMEA will be responsible for complying with Irish privacy and data protection laws, which are based on the European data protection directive."

Emma Carr, deputy director of Big Brother Watch, said: "It should not come as a surprise if companies concerned about maintaining their users' trust to hold their information start to move to countries with more rigorous oversight processes, particularly where courts oversee requests for information." Surveillance laws have a direct impact on our economy and Yahoo's decision should be ring an alarm in Parliament that ignoring the serious questions about surveillance that are being debated around the world will only harm Britain's digital economy."

Under Ripa, a warrant can be issued for an investigation that has implications for national security, or might lead to the prevention or detection of serious crimes.

Warrants to seek the retention of communications data can be issued by specified officers within police forces and the intelligence agencies.

More intrusive surveillance techniques can require the signature of a cabinet minister. From Friday, investigators may have to seek information by using a more drawn out process of approaching Yahoo through a Mutual Legal Assistance Treaty between Ireland and the UK.

A Home Office spokesperson said: "We do not confirm the details of private meetings."

This blog is sponsored by: 
http://visitwebpages.info/paypalchecks/

http://RapidFire.ExperienceBA.com/?SOURCE=livingwithoutsecrets

Saturday, March 8, 2014

What the Talking Angela app is really saying to your kids

This week, a year-old hoax about the Talking Angela app being dangerous for children has been doing the rounds on Facebook again, despite having been debunked back then, and again now.

Parents can be forgiven for being spooked by the suggestion that a cutesy talking cat app is actually a front for a paedophile ring, as one of the hoax messages claimed. So what is Talking Angela really saying to your children, and is it inappropriate? The best way to find out is to actually use the app.

I’ve spent an hour in her company today doing just that. In short: yes, the hoax is a hoax. But the app’s developer Outfit7 could be doing more to ensure parents feel at ease with their children using the app.

Some facts first: Talking Angela is part of a wider series of apps called Talking Tom and Friends, which have been downloaded more than 1.5bn times since 2010, and are currently being used by 230m people every month – lots of children, but also lots of adults.

They’ve spawned a series of popular YouTube videos in partnership with Disney, as well as a range of physical toys. Outfit7 is a well-known apps company, not a shadowy network of child-catchers, in other words: I’ve interviewed the firm in March 2011, March 2012 and June 2013 tracking the rise of its apps.

Below, you can find out how Talking Angela really works with screenshots to help you make an informed decision about whether it’s suitable for your children.

Turn Child Mode on
Talking Angela was released in December 2012 for iPhone and iPad, then in January 2013 for Android. It follows the pattern of previous Talking Tom and Friends apps: a virtual animal who’ll squeakily repeat anything you say into your device’s microphone, while interacting with her by tapping and swiping on the screen.

The most important thing for parents to understand is that Talking Angela has a child mode. You’re asked if you want to turn it on the first time you run the app, and at any other point you can toggle it on or off by tapping on the little smiley face at the top right of the screen.

This is important, because the feature at the centre of the scary Facebook messages Angela’s ability to text-chat with users – is turned off when Child Mode is toggled on. If you’ve read about Angela asking kids for their names, ages or engaging in banter about clothes-swapping parties, none of this can happen if Child Mode is on.

The downside of this: it’s far too easy to toggle it on and off there’s no Pin preventing a child from tapping on the smiley face and switching it back on. Given the current controversy, this would be an easy but important change for Outfit7 to make.

What can kids do when Child Mode is turned on, though? They can get Angela to repeat her words, stroke and poke her (in the non-inappropriate sense!) to see animated responses, and make birds fly onto the screen – don’t worry, she doesn’t eat them.

There is also a camera feature, which has been referenced in some of the Facebook messages about Talking Angela. It’s true that it encourages users to look into their device’s camera and make specific gestures: nod, shake head, smile, yawn or stick out their tongue, so Angela can copy it.

Some changes needed
As a parent, there are some features in Talking Angela that concern me, although not the ones being cited in the Facebook hoax messages.

First, there’s a musical-note button at the bottom right which on my smartphone launched the YouTube app with the official Talking Tom and Friends channel – starting with a video trailer for the separate My Talking Tom mobile game.

The problem here: kids can easily scroll down to the comments section (samples: “I do not know why the fuck there’re many dislikes” and “Was I the only one who thought he was spelling out fuck?”. Not the kind of reading material you’d want for your young child.

You can also tap a “more” button to see suggestions of other videos, some of which are from Outfit7’s channel, and some of which aren’t. And then watching those videos brings up more suggestions, and so on. If you wouldn’t type “cats” into YouTube’s search box then leave your child to get on with it, you shouldn’t leave them unattended with Talking Angela.

Next, in-app ads. If you download Talking Angela for free, it’ll display banner ads at the top of the screen. They’re generally ads for other apps: Hotels.com, Google and (in a curveball) the Department for Work and Pensions all appeared while I was using it today. Usually, tapping on a banner ad takes you to its download page on the app store.

Finally, in-app purchases. Talking Angela uses a system of virtual coins to buy some features: presents and accessories for Angela, for example, from hats and handbags to makeup. Whoever’s using the app gets 25 free coins a day, while others can be bought from an in-app store: from £0.69 for 4,200 to £17.49 for 146,500.

Meanwhile, the app also offers free coins in return for watching video ads for other apps: The Simpsons: Tapped Out, Knights & Dragons, Total Domination Reborn, Battle Camp and Monster Legends for example.

If you’ve turned on your parental and app store restrictions, your kids shouldn’t be able to download free apps or make in-app purchases without your permission. Whether you feel comfortable with the features above is your decision, though.

Text-chatting with Angela
Finally, what happens if you turn child mode off – as any child can relatively easily – and start chatting to Angela using the text box at the bottom of the screen? It’s this feature that’s fuelled the Facebook hoax.

While it’s definitely not connecting your children to paedophiles, it does raise some issues. These are all genuine questions that Angela asked me while I chatted to her:

“How long have you been friends with your best friend?”

“I’ve met my best friends at school. Where did you meet yours?”

“What will you do today?”

“I’d like to be your friend. What’s your name?

“I’m 18. How old are you?”

“What do you do with your friends for fun?”

And yes, Angela does ask at one point “You know what’s fun too? A clothing swap party. Have you ever been to such a party?” before segueing into an anecdote about how she swapped clothes with her virtual boyfriend Tom for japes.

It ends innocently – “Friends ROFLed and everybody at the party cheered at us. It was a cool night!” – but taken out of context with some of the questions above, it’s no surprise that parents are spooked. She’ll even tell you that “cat sex is hair raising. It’s purrfect” if you ask her about, well, cat sex. As some children surely will.

The point: children aren’t meant to be using Talking Angela’s text-chat feature, yet the app’s developer hasn’t taken any meaningful measures to prevent them from simply toggling the child mode off. There’s not even the “swipe down with two fingers” or “write this sequence of numbers as figures” parental gate that’s become common in children’s apps in recent months.

Responsibility on both sides
This is the main thing to understand about Talking Angela: it’s an app aimed at children and adults alike, including text-chat that would seem cheeky and silly for the latter, but inappropriate for the former. The problem is the lack of a strong-enough barrier between the two modes.

When it comes down to it, your children are still going to be chatting to and sticking their tongues out at a cartoon cat, not falling into the clutches of the “PEDO RING” [sic] that’s been mentioned on Facebook.

A couple of commenters on my previous article about the Talking Angela hoax suggested concerns about the app normalising the kind of conversations that you wouldn’t want children having with strangers in the real world. That’s a legitimate criticism, and one that Outfit7 should act on by making it harder for kids to turn off the Child Mode.

But the hoax is a reminder that as parents, we also have responsibilities to be aware of what apps our kids are using and how they work – from first-hand experience. For now, I would steer my children to other apps rather than Talking Angela, but that’s based on testing it out for myself, rather than believing hysterical ALL-CAPS warnings posted on Facebook.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Friday, March 7, 2014

2014 is the year of the smart watch - and the toothbrush


A new smart toothbrush unveiled this week could monitor how well you brush your teeth, and could one day be used to send data back to your dentist. Oral B’s Smartseries toothbrush, which launched in the UK in June priced at £199, sends data back to a smartphone app recording how many brushstrokes are used, targeting problem areas and following personalised brushing routines.

This vision of the internet-connected future was just one of the gadgets unveiled this week at Mobile World Congress in Barcelona, which kicked off with a keynote from an exuberant Facebook founder Mark Zuckerberg.

Explaining the company’s $19bn acquisition of the messaging app WhatsApp, MWC’s 75,000-strong audience was abuzz with what the deal would mean for mobile networks, and whether WhatsApp’s latest move into voice technology would threaten traditional mobile businesses.


For Facebook, expansion depends on gaining users in developing markets, where the mobile phone is king and mobile broadband outstrips traditional internet three to one, according to data from the International Telecommunication Union.

But it was the internet of things - connecting physical devices to the internet - preoccupying the discussions of mobile phone networks. The potential is vast, and operators are excited by potential expansion of providing data services to everything from toothbrushes and fridges to cars and washing machines.

“We currently have 13m devices connected to our network, of which 1.6m of those connections are machine-to-machine,” said Olaf Swantee, chief executive of EE talking to the Guardian. “We are working to grow those connections up to 32m and M2M connections are going to play a very big part in that.”

The goal is to turn everything into a smart, data-driven device. Cars could talk to the road about black ice, fridges could order food automatically when it runs out, or you could ask your washing machine “how are you getting on?” and the washing machine could reply “almost there sir, just on the spin cycle, I’ll be done in 15 minutes”.

These machine-to-machine (M2M) connections are expected to number 250m globally by the end of 2014, according to data from the GSMA. To support the vast number of devices networks are working on capacity and speed, so there were plenty of companies keen to show off hardware that enables super fast connectivity.

In another corner of the trade show South Korean Telecom demonstrated its next generation 4G mobile data network, which is capable of delivering speeds of up to 450 megabits per second – over three times as fast as the fastest standard UK home broadband. Nokia Solutions & Networks claimed to be the ultimate king of speed, supplying data at 2.6Gbps or 2,600Mbps. At that speed, a very large 4K ultra high definition film could be downloaded in seconds.

For the high street, however, the first wave of a more connected world will be yet more devices to track health and fitness.

South Korean giant Samsung launched three new smartwatches, the Gear 2, Gear 2 Neo and Gear Fit, each with a built in heart-rate monitor.

Signalling an increasingly intense battle between the mobile phone makers, Huawei also launched a fitness tracker for the wrist but that can convert to a headset to take phone calls. Sony already has a smartwatch and a fitness band, while both Motorola and HTC are working on a smart wearable.

Mobile World Congress 2014 may not have been the year that internet connected devices became mainstream, but it will certainly be remembered as the year of the smartwatch.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Thursday, March 6, 2014

MtGox files for bankruptcy in Japan after collapse of bitcoin exchange

MtGox filed for bankruptcy protection in Tokyo on Friday, with the world’s former biggest bitcoin exchange blaming “a weakness in our system” for its collapse.

The exchange’s CEO Mark Karpeles, bowing, apologised at a news conference for causing trouble to so many people, and said that he intended to launch a criminal complaint against the hacking attack which caused the site’s downfall. However, he added, he had no specific means to do so.

Mt Gox had liquid liabilities of 6.5bn yen (£38m), dwarfing its total assets of 3.84bn yen (£22.6m), the company said. It had 127,000 creditors in bankruptcy, just over 1,000 of whom are Japanese.

The news conference is Karpeles’ second public statement since MtGox deleted its website on Tuesday, following a terse comment released on Wednesday.

The “weakness” referred to by Karpeles is thought to be an issue related to “transaction malleability“, a loophole in the bitcoin system which was exploited by malicious actors to get free bitcoins from the site.

“MtGox filing for bankruptcy is not the end of bitcoin but it is the beginning of the end of bitcoin in its current form,” says currency trader Alistair Cotton of Currencies Direct.

“Over the last year we’ve seen ever-increasing usage and with it huge volatility in value and blows from banks and regulators. These are growing pains as the currency evolves in front of our eyes and the MtGox bankruptcy is part of that.”

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Wednesday, March 5, 2014

Saint David's Day: Google doodle leeks online

Google has celebrated St David's Day with a doodle depicting a red dragon taking tea with a woman wearing the traditional Welsh national costume of a tall black bonnet and a long red dress.

St David's Day or Dydd Gŵyl Dewi Sant is the feast day of Saint David, the patron saint of Wales, and falls on 1 March every year.

Saint David was born towards the end of the 5th century and became renowned as a teacher and preacher, founding monastic settlements and churches. The date of his death is recorded as 1 March, though the year of his death is uncertain.

Schools and cultural societies across Wales commemorate Saint David with parades and concerts, and it is traditional to wear daffodils or strips of leek on lapels and caps.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Tuesday, March 4, 2014

Are Windows 8 tablets too expensive?

I’m looking for a good 7in or 8in tablet, and I don’t know what to do. It doesn’t have to have a super-duper HD retina display or Dolby sound. I use it mainly for Microsoft Exchange email, browsing, watching the occasional BBC video or live news etc, and running a few apps. I’m not a gamer.
Currently, I’m using a Kindle Fire to fill the gap, but it’s very limited both in terms of capabilities (what can be installed) and grunt.
I have bought four Android tablets -- a Samsung Galaxy Tab 7 (Wi-Fi/3g) in 2011 and three Google Nexus 7 tablets, including new and old models -- and they have all had problems. This year I tried another 2012 Nexus 7. All was well for a few days until Android updated to KitKat (4.4.2 KOT49H), when I started having exactly the same touch screen problems as I had had with both 2013 units. Having frequently suffered from things being broken by Android updates, this has just made me sick of Android.
I thought perhaps of a Windows 8 (not RT) tablet. I like the idea of being able to run some of my desktop software on a tablet, but they are just too expensive.
I also did something I thought I’d never do -- consider an Apple device -- so I’ve been reading up on the iPad Mini. The old model is now going for around £215, and I don’t really want to go too much higher. However, I’m not a fan of the Apple “closed” system or having iTunes installed: years ago it completely trashed my PC. Also, when I tried an iPad Mini in John Lewis, the video clips on the BBC News website wouldn’t play. The sales assistant told me the only way to watch BBC videos was by using the BBC News app, which curiously didn’t work. Brian
I’m tempted to suggest a BlackBerry tablet as that may be the only one you haven’t tried, and they are very cheap. However, the fact is that Android is the only real choice in the cheap tablet market (£50-£200) apart from Amazon’s Kindle Fire, and you already have one of those. Also, it’s not much of an alternative in the sense that it uses a forked version of the open source part of Android, without the proprietary Google layer that provides access to Google Play etc.

When it comes to choosing between an Apple iPad and a Windows 8 tablet, they are different beasts with different capabilities. You’d usually choose an iPad to get access to the vast selection of high-quality apps, which have actually been designed for tablets rather than phones. You’d usually choose a Windows 8 tablet because it provides access to the vast selection of Windows programs. The Windows Store now has about 240,000 tablet apps and covers most needs, but it’s still nowhere near the iPad’s ecosystem.


I don’t think there’s actually much difference in terms of ease of use in tablet mode, once you have learned the specific edge-swipes that do special things in the Metro-sorry-modern interface. (If you won’t learn those, you have no chance.) Most of the complaints about Windows 8 have been about using the tablet interface to access desktop features, and Microsoft is in the process of fixing those.

I’ve been using a Haswell-powered Surface Pro 2 on loan from Microsoft, and while it has many improvements over the first version, the experience hasn’t really changed the views I expressed when I reviewed it here (Microsoft Surface Pro review: a device of many talents). It’s amazingly versatile. For example, you can use it as a desktop with full size keyboard and monitor -- or several monitors -- and its Wacom-style pen-operated graphics make it exceptionally good value for creative types. It also makes life simpler when you can do PC-level photo and video editing then switch to tablet-style viewing on the same machine. It’s dramatically cheaper than buying a desktop, an Ultrabook, a graphics tablet, and a tablet. On the other hand, it’s not the optimum choice for any particular function, and if you don’t need all the features, it’s an expensive option.

It’s true that Windows 8 tablet hybrids can cost from about £350 to over £1,000, but new tablets with 8in screens are very much cheaper, and prices now start at about £250. (Or, for American buyers, about $250.) They can still do all the good stuff, such as supporting multiple monitors, though usually without the high-resolution digitising pen input. The obvious drawback is that an 8in screen is very small for running desktop programs, especially if you don’t know them well enough to use keyboard shortcuts.

The cost savings come from the smaller screen sizes and the use of 32-bit Intel Atom chips with 2GB of memory. However, the new Bay Trail chips are dramatically better than the old Atoms used in netbooks. For example, the Z3770 is roughly as fast as an Intel Celeron 1007U or a low-voltage Core i3-4010Y, and ahead of old staples such as the second-gen Core i3-2375M. Of course, the extra efficiency of Windows 8 helps as well.

Cheaper Windows?
There may be further price reductions to come, both through economies of scale -- production is still ramping up -- and because Microsoft might cut the price of Windows 8 on ultra low cost PCs.

You may know that netbooks were cheap partly because Microsoft offered manufacturers a special version of Windows XP called Home Edition ULCPC for “ultra low cost personal computers”. The rumoured price was closer to $15 than the usual $45, but it was basically free money for Microsoft -- XP had reached the end of its very profitable life -- and netbook manufacturers preferred it to free Linux. Today, the competition is with free Android, and Microsoft is willing to cut the price because it wants to sell more copies of Windows 8. (And it needs to sell more Windows 8 tablets to encourage developers to write more apps for the Windows Store.)

Anyway, on February 22, Bloomberg reported: “Manufacturers will be charged $15 to license Windows 8.1 and preinstall it on devices that retail for less than $250, instead of the usual fee of $50, said the people, who asked not to be named because the details aren’t public. The discount will apply to any products that meet the price limit, with no restrictions on the size or type of device, the people said.”

Currently there are exactly zero Windows 8.1 devices designed to retail for less than $250 (though you might get one in a sale), so if the story is true, Microsoft is trying to penetrate a part of the market that now goes by default to Android devices and low-end Chromebooks in the $199.99 to $249.99 price range.

Windows 8 mini-tablets
If you fancy trying an 8in Windows 8 tablet, there are several to choose from. The notable ones include the Dell Venue 8 Pro, Toshiba Encore, Acer Iconia W4, Lenovo MiiX 2 and Asus VivoTab Note 8.

The cheapest I can see at the moment is a Toshiba Encore 8 with 32GB of storage on sale (£50 off) for £199.99 at PC World. This has micro-USB and micro HDMI ports so you could plug it into a monitor or TV set, and apparently includes £100-worth of Microsoft Office Home and Student 2013. This is the same price as a Nexus 7 and cheaper than your discounted iPad Mini, without even counting the extra cost of Apple cables.

The rule of thumb is that 32GB on Windows tablets is equivalent to 16GB on Android and iPad tablets, but you can improve on that using tips from this Guide to Maximizing Disk Space on your Dell Venue 8 Pro (or other Windows 8.1 system). The standard tricks include copying off the Recovery platform, which saves 5GB or 6GB, and mounting a fast 64GB SD card as Permanent Storage.

I have nothing against the iPad Mini: when I had one on loan from Apple, I liked it a lot and gave it a five-star review. It played BBC videos perfectly, and colours looked more naturalistic than they did on a Kindle Fire. Also, if you want access to the iPad ecosystem, it’s the cheapest option. However, a Windows tablet will do the tablety things you need, and it will enable you to RDP into your desktop PC, and stream videos via an Xbox, if you have one. It will also run Adobe Flash and standard desktop PC software using a PC or wireless Bluetooth keyboard. And you won’t be forced to install iTunes.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Monday, March 3, 2014

Twitch Plays Pokémon: live gaming's latest big hit


An infinite number of monkeys with an infinite number of typewriters would rapidly type the works of Shakespeare. How would they do at videogames?

Currently, 56,312 people are attempting to play Pokémon Red at the same time. At times, that has been as high as 150,000. That is: there is one game of Pokémon Red, and all 150,000 people are controlling it at once.

It is going strangely well.

“Twitch Plays Pokémon” is half art project and half reality show for the 21st century. The idea is relatively simple. Pokémon Red, the 1996 Game Boy hit that kickstarted the Pokémon franchise, is running on an emulator hooked up to Twitch, a website which lets gamers broadcast video games live.

Viewers can enter button commands in the chat window, and they get passed onto the emulator, which enters them in order.

In theory, it harnesses the wisdom of the crowds to find the best way through the game, with playing 24 hours a day, seven days a week. (The game has currently been running for just over eight and a half days)

In practice, however, it looks like this:


With tens of thousands of players all entering commands at once, coordinated action is nearly impossible. Worse still, the footage is delayed by around 20 seconds, leaving players voting on actions they haven’t actually seen. And even when the decision is obvious, just enough viewers set out to deliberately disrupt events that nothing quite goes to plan.

Take the Ledge (an event which earned its capital L). In Pokémon, ledges are one-way barriers, which the player can jump off but not climb up. One particular ledge, encountered three days after the stream began, was just below a wall. To get past, all the players had to do was press right for a few seconds to walk twelve paces east, then up. Pressing down at any point would send them back to the start.

It took them seven hours to walk those twelve paces.

History

Twitch Plays Pokémon’s creator has mostly taken a back seat in the whole thing. Speaking to the Guardian under conditions of strict anonymity, they expressed surprise at the stream’s popularity.

“I wasn’t expecting it to get very popular at all. When I put it up I was thinking it would peak around 300 concurrent viewers at most, I wasn’t expecting over 100,000!

“I’m sitting at a computer all day and frequently dealing with servers anyway. The biggest change [since the stream began] has been the amount and nature of messages I receive. I have TPP opened on a secondary monitor all day so I can keep an eye on it.”

But while the game mostly plays itself, there have been times a hand from above has been required. The biggest change since the stream began was the introduction of “democracy mode” on Wednesday, which replaced the original “anarchy mode” with a system of votes on which button should be pushed next.

“It was made to make otherwise impossible sections possible,” explains the creator. “I knew when this thing got very popular and the inputs became chaotic that I’d eventually have to make a change that wouldn’t go over well with everyone…

“The problem was that some sections of the game are impossible without some amount of precision with the inputs, precision that just wasn’t going to be possible with the existing input mode.”

Initially, democracy mode was mandatory. But after the backlash, a system was introduced to let players vote on whether or not to vote.

“I made a change to the way inputs are determined but it didn’t go over well so I put in a toggle to switch between the original mode and the new mode. The viewers had already named these modes anarchy and democracy and I thought they were cool and descriptive names and used them.

“I think the community has responded much better than I was fearing: I was expecting viewer [numbers] to drop by a lot more, and to receive a lot more abusive messages.”

Community

TPP has generated a fanatical community, which has taken its devotion to almost-religious levels.

Typically, that would be hyperbole, but in this case it’s accurate. On the second day of the game, players received the Helix Fossil, an item with no practical use. But because it was at the top of the item list, it ended up being selected – often repeatedly – in the heat of battle. The community interpreted this as “turning to the Helix Fossil for guidance”, and so the meme of the blessed Helix Fossil was born.

Other legends were born along the way. Eevee is a low-level doglike Pokémon that can evolve into three different forms depending on which elemental rock is used. The water form, Vaporeon, is tremendously useful because it can use Surf to travel on water, which is crucial for finishing the game. Unfortunately, the players bought and used the Fire Stone instead, turning Eevee into Flareon. The fire dog became known as the “False Prophet”, before being released into the wild a few days later.

It goes on: a high-level Pidgeot is known as “Bird Jesus” for winning so many battles; a Rattata with dig, a move that can escape dungeons, is damned for digging the player out of Team Rocket’s HQ after hours spent navigating a maze; a Drowzee is the “Keeper” of Flareon after the two were placed in storage next to each other.

The whole thing has a tongue-in-cheek element, a self-aware attempt to find method in the madness. Even without the community, TPP is frequently gripping. Watching the community attempt to name a pokémon (party members have included “x(araggbaj”, “AAJST(????” and “aaabaaajss”), or feeling dread as the cursor hovers over a command which will destroy hours of work, is strangely compelling, even if it’s bookended with hours of dull repetition.

It’s provoked essays on the nature of anarchy and democracy, fan art detailing the history of the faith, a mention in XKCD and a lot of faintly terrible memes. There are even spin-offs, such as Twitch Plays Pokémon Plays Tetris, which takes the same commands and puts them into a hacked version of Tetris.

As I was writing this, the players had reached the most risky section yet, an area called the Safari Zone. It’s one of the few places it’s possible to render the game unfinishable, by running out of money entirely, and it relies on near-perfect commands to be entered 270 times in a row. But then they did it anyway, coming together and producing detailed maps to help with co-ordination.

The players are well over half way through the game, now, with three gym badges to go before they can fight the elite four, and finish the game.

It can’t be long, and the creator is already planning what comes next. “I’ve received a lot of requests to continue with the Pokémon franchise after the Elite Four and the Pokémon Champion get defeated, so I’m going to do that. I’m still deciding which of the generation 2 Pokémon games to go with.”

It’s tempting to draw wider conclusions about the success of Twitch Plays Pokémon. As tech blogger Andy Baio writes, it is “to me, the most wonderful thing online right now, a microcosm of the internet at large.”

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Sunday, March 2, 2014

How computer generated fake papers are flooding academia

Like all the best hoaxes, there was a serious point to be made. Three MIT graduate students wanted to expose how dodgy scientific conferences pestered researchers for papers, and accepted any old rubbish sent in, knowing that academics would stump up the hefty, till-ringing registration fees.

It took only a handful of days. The students wrote a simple computer program that churned out gobbledegook and presented it as an academic paper. They put their names on one of the papers, sent it to a conference, and promptly had it accepted. The sting, in 2005, revealed a farce that lay at the heart of science.

But this is the hoax that keeps on giving. The creators of the automatic nonsense generator, Jeremy Stribling, Dan Aguayo and Maxwell Krohn, have made the SCIgen program free to download. And scientists have been using it in their droves. This week, Nature reported, French researcher Cyril Labbé revealed that 16 gobbledegook papers created by SCIgen had been used by German academic publisher Springer. More than 100 more fake SCIgen papers were published by the US Institute of Electrical and Electronic Engineers (IEEE). Both organisations have now taken steps to remove the papers.

Hoaxes in academia are nothing new. In 1996, mathematician Alan Sokal riled postmodernists by publishing a nonsense paper in the leading US journal, Social Text. It was laden with meaningless phrases but, as Sokal said, it sounded good to them. Other fields have not been immune. In 1964, critics of modern art were wowed by the work of Pierre Brassau, who turned out to be a four-year-old chimpanzee. In a more convoluted case, Bernard-Henri Lévy, one of France's best-known philosophers, was left to ponder his own expertise after quoting the lectures of Jean-Baptiste Botul as evidence that Kant was a fake, only to find out that Botul was the fake, an invention of a French reporter.

Just as the students wrote a quick and dirty program to churn out nonsense papers, so Labbé has written one to spot the papers. He has made it freely available, so publishers and conference organisers have no excuse for accepting nonsense work in future.

Krohn, who has now founded a startup called Keybase.io in New York that provides encryption to programmers, said Labbé's detective work revealed how deep the problem ran. Academics are under intense pressure to publish, conferences and journals want to turn their papers into profits, and universities want them published. "This ought to be a shock to people," Krohn said. "There's this whole academic underground where everyone seems to benefit, but they are wasting time and money and adding nothing to science. The institutions are being ripped off, because they pay publishers huge subscriptions for this stuff."

Krohn sees an arms race brewing, in which computers churn out ever more convincing papers, while other programs are designed to sniff them out. Does he regret the beast he helped unleash, or is he proud that it is still exposing weaknesses in the world of science? "I'm psyched, it's so great. These papers are so funny, you read them and can't help but laugh. They are total bullshit. And I don't see this going away."

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Saturday, March 1, 2014

Meet the seven people who hold the keys to worldwide internet security

It sounds like the stuff of science fiction: seven keys, held by individuals from all over the world, that together control security at the core of the web. The reality is rather closer to The Office than The Matrix.

In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs.

There is a strange mix of accents predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75 cent vending machine soda. In the corner, an Asteroids arcade machine blares out tinny music and flashing lights.


It might be a fairly typical office scene, were it not for the extraordinary security procedures that everyone in this room has had to complete just to get here, the sort of measures normally reserved for nuclear launch codes or presidential visits. The reason we are all here sounds like the stuff of science fiction, or the plot of a new Tom Cruise franchise: the ceremony we are about to witness sees the coming together of a group of people, from all over the world, who each hold a key to the internet. Together, their keys create a master key, which in turn controls one of the central security measures at the core of the web. Rumours about the power of these keyholders abound: could their key switch off the internet? Or, if someone somehow managed to bring the whole system down, could they turn it on again?

The keyholders have been meeting four times a year, twice on the east coast of the US and twice here on the west, since 2010. Gaining access to their inner sanctum isn't easy, but last month I was invited along to watch the ceremony and meet some of the keyholders a select group of security experts from around the world. All have long backgrounds in internet security and work for various international institutions. They were chosen for their geographical spread as well as their experience – no one country is allowed to have too many keyholders. They travel to the ceremony at their own, or their employer's, expense.

What these men and women control is the system at the heart of the web: the domain name system, or DNS. This is the internet's version of a telephone directory – a series of registers linking web addresses to a series of numbers, called IP addresses. Without these addresses, you would need to know a long sequence of numbers for every site you wanted to visit. To get to the Guardian, for instance, you'd have to enter "77.91.251.10" instead of theguardian.com.

The master key is part of a new global effort to make the whole domain name system secure and the internet safer: every time the keyholders meet, they are verifying that each entry in these online "phone books" is authentic. This prevents a proliferation of fake web addresses which could lead people to malicious sites, used to hack computers or steal credit card details.

The east and west coast ceremonies each have seven keyholders, with a further seven people around the world who could access a last-resort measure to reconstruct the system if something calamitous were to happen. Each of the 14 primary keyholders owns a traditional metal key to a safety deposit box, which in turn contains a smartcard, which in turn activates a machine that creates a new master key. The backup keyholders have something a bit different: smartcards that contain a fragment of code needed to build a replacement key-generating machine. Once a year, these shadow holders send the organisation that runs the system the Internet Corporation for Assigned Names and Numbers (I can) a photograph of themselves with that day's newspaper and their key, to verify that all is well.

The fact that the US-based, not-for-profit organisation I can rather than a government or an international body has one of the biggest jobs in maintaining global internet security has inevitably come in for criticism. Today's occasionally over-the-top ceremony (streamed live on Icann's website) is intended to prove how seriously they are taking this responsibility. It's one part The Matrix (the tech and security stuff) to two parts The Office (pretty much everything else).

For starters: to get to the canteen, you have to walk through a door that requires a pin code, a smartcard and a biometric hand scan. This takes you into a "mantrap", a small room in which only one door at a time can ever be open. Another sequence of smartcards, handprints and codes opens the exit. Now you're in the break room.

Already, not everything has gone entirely to plan. Leaning next to the Atari arcade machine, ex-state department official Rick Lamb, smartly suited and wearing black-rimmed glasses (he admits he's dressed up for the occasion), is telling someone that one of the on-site guards had asked him out loud, "And your security pin is 9925, yes?" "Well, it was…" he says, with an eye-roll. Looking in our direction, he says it's already been changed.

Lamb is now a senior programme manager for Icann, helping to roll out the new, secure system for verifying the web. This is happening fast, but it is not yet fully in play. If the master key were lost or stolen today, the consequences might not be calamitous: some users would receive security warnings, some networks would have problems, but not much more. But once everyone has moved to the new, more secure system (this is expected in the next three to five years), the effects of losing or damaging the key would be far graver. While every server would still be there, nothing would connect: it would all register as untrustworthy. The whole system, the backbone of the internet, would need to be rebuilt over weeks or months. What would happen if an intelligence agency or hacker the NSA or Syrian Electronic Army, say – got hold of a copy of the master key? It's possible they could redirect specific targets to fake websites designed to exploit their computers – although Icann and the keyholders say this is unlikely.

Standing in the break room next to Lamb is Dmitry Burkov, one of the keyholders, a brusque and heavy-set Russian security expert on the boards of several internet NGOs, who has flown in from Moscow for the ceremony. "The key issue with internet governance is always trust," he says. "No matter what the forum, it always comes down to trust." Given the tensions between Russia and the US, and Russia's calls for new organisations to be put in charge of the internet, does he have faith in this current system? He gestures to the room at large: "They're the best part of Icann." I take it he means he likes these people, and not the wider organisation, but he won't be drawn further.

It's time to move to the ceremony room itself, which has been cleared for the most sensitive classified information. No electrical signals can come in or out. Building security guards are barred, as are cleaners. To make sure the room looks decent for visitors, an east coast keyholder, Anne-Marie Eklund Löwinder of Sweden, has been in the day before to vacuum with a $20 dustbuster.

We're about to begin a detailed, tightly scripted series of more than 100 actions, all recorded to the minute using the GMT time zone for consistency. These steps are a strange mix of high-security measures lifted straight from a thriller (keycards, safe combinations, secure cages), coupled with more mundane technical details a bit of trouble setting up a printer and occasional bouts of farce. In short, much like the internet itself.

As we step into the ceremony room, 16 men and four women, it is just after lunchtime in LA and 21.14 GMT. As well as the keyholders, there are several witnesses here to make sure no one can find some sneaky back door into the internet. Some are security experts, others are laypeople, two are auditors from PricewaterhouseCoopers (with global online trade currently well in excess of $1tn, the key has a serious role to play in business security). Lamb uses an advanced iris scanner to let us all in.

"Please centre your eyes," the tinny automated voice tells him. "Please come a little closer to the camera… Sorry, we cannot confirm your identity."

Lamb sighs and tries again.

"Thank you, your identity has been verified."

We file into a space that resembles a doctor's waiting room: two rows of bolted-down metal seats facing a desk. Less like a doctor's waiting room are the networks of cameras live-streaming to Icann's website. At one side of the room is a cage containing two high-security safes.

Francisco Arias, Icann's director of technical services, acts as today's administrator. It is his first time, and his eyes regularly flick to the script. To start with, things go according to plan. Arias and the four keyholders (the ceremony requires a minimum of three, not all seven) enter the secure cage to retrieve their smartcards, held in tamper-evident bags. Middle-aged men wearing checked shirts and jeans, they are Portuguese keyholder João Damas, based in Spain; American Edward Lewis, who works for an internet and security analytics firm; and Uruguayan Carlos Martinez, who works for Lacnic, the internet registry for Latin America and the Caribbean.

All but one of the 21 keyholders has been with the organisation since the very first ceremony. The initial selection process was surprisingly low-key: there was an advertisement on Icann's site, which generated just 40 applications for 21 positions. Since then, only one keyholder has resigned: Vint Cerf, one of the fathers of the internet, now in his 70s and employed as "chief internet evangelist" by Google. At the very first key ceremony, in Culpeper, Virginia, Cerf told the room that the principle of one master key lying at the core of networks was a major milestone. "More has happened here today than meets the eye," he said then. "I would predict that… in the long run this hierarchical structure of trust will be applied to a number of other functions that require strong authentication." But Cerf struggled with the travel commitment and dropped his keyholder duties.

At 21.29, things go awry. A security controller slams the door of the safe shut, triggering a seismic sensor, which in turn triggers automatic door locks. The ceremony administrator and the keyholders are all locked in an 8ft square cage. Six minutes of quiet panic go by before they hit on a solution: trigger an alarm and an evacuation. Sirens blare and everyone piles out to mill around in the corridor until we can get back to the 100-point script. Every deviation has to be noted on an official record, which everyone present must read and sign off at a later point. Meanwhile, we use the downtime to snack: people rip open a few bags of Oreo biscuits and Cheez-Its.

Both the US commerce department and the Department of Homeland Security take a close interest, to differing degrees, in Icann's operations. In the wake of the ongoing revelations of NSA spying, and of undermined internet security, this does not sit well with many of Icann's overseas partners. Some, including Russia and Brazil – whose president has made such demands very public – are calling for a complete overhaul of how the internet is run, suggesting it should be put under UN auspices.

The question of who put Icann in charge is hotly contested. Lamb argues that "it's the online community; it's the people who've put Icann in charge". Eklund Löwinder, the Swedish keyholder who vacuumed the day before, puts it more bluntly. "Well, mainly, it was the US Department of Commerce," she says. The European Commission wants changes to this system, though it still expresses its faith in Icann; the EU recently called for a "clear timeline for the globalisation of Icann".

Eklund Löwinder explains that while the security might occasionally seem ridiculous, every step is very important when it comes to maintaining trust. "It's a system based on backups of backups, layers and layers of security," she says, her dangly cat earrings swinging. "Of course it is a bit romantic and thrilling to be a part of this, because I am a romantic by heart. I have to admit I love the internet. It's a piece of engineering art you have to admire. And to be able to contribute to make this a safer place makes me feel good."

Where does she keep her key? She admits she has two copies, in case she loses one; one of them never leaves a bank deposit box. The other, which she uses twice a year in the ceremonies on the east coast, is attached to a long metal chain. Most of the time it sits in a wooden puzzle box, with a hidden lock, created by her furniture designer son.

By 22.09 (we are all sticking to GMT) the ceremony is back on and everyone's returning to the script. The high-security machine that will generate the master key is set up. Once activated by the smartcards, this will produce a lengthy cryptographic code. If dropped, or even knocked too hard, the machine will self-destruct.

Now that everything has been removed from the safes, we move to act two of the ceremony: the key signing. The first step would be familiar to anyone – getting the laptop plugged in and booting it up – but some witnesses watch like hawks, logging and initialising each step. Others are beginning to flag, checking their watches or having whispered conversations with their neighbours.

At 22.40, a series of USB drives is set up, one of which will be used to load the signed key on to the live internet at the end of the ceremony: this is when the code is uploaded to the servers that dictate who controls .com, .net, .co.uk and more.

The output of the previous ceremony is checked, to make sure people are working off the same key – a process that requires Arias to read aloud a 64-character code. Everyone nods as they verify it against their sheets.

At 22.48 the high-security machine a small, plain grey box with a keypad and card slot in front is wired up. Each keyholder hands over his individual smartcard. Then, at 22.59, nearly two hours after the ceremony began, it's show time. Alejandro Bolivar, an American expert from Verisign, the security company that administers the "root zone" of the domain name system, steps forward to read out a nonsense sequence of words generated by the previous key. He begins: "Flatfoot warranty brickyard Camelot…" and continues for nearly a minute before concluding, "blackjack vagabond." The sequence corresponds with the witnesses' notes, so they nod and sign their script. A short line of code is typed into the laptop at 23.02, and seconds later the new key is signed, to a smattering of applause.

After a 20-minute sequence of disconnecting secure machines and powering down the laptop, a USB stick is handed to Tomofumi Okubo, another Icann staffer. Deliberately or otherwise, Okubo makes a slight bow as he is passed the stick holding the "signed" digital key. Later Okubo will transmit the key on a secure channel to Verisign and this signed key will be made live across the internet. It will take effect for three months, from 1 April (yes, really). After that, the key will expire and error messages will start to appear across the internet.

Given how high the stakes are, and the number of possible targets, does Okubo think the system is trustworthy? "I think so," he says. "You'd have to compromise a lot of people…" He trails off.

Does this often slightly bizarre ceremony work? Are the security precautions integral, or just for show? Bruce Schneier, an American cryptologist and security expert who worked with Glenn Greenwald and the Guardian to analyse some of the files leaked by Edward Snowden, suggests it's a little of both. "A lot of it is necessary, and some of it is necessary theatre," he concedes. "This process is both technical and political, which makes it extra complicated… I think the system is well designed." As to whether the system will survive in the aftermath of the NSA revelations, Schneier thinks the jury is still out: "That, we don't know."

Back in the ceremony room, the four keyholders are once again locked in a cage with the safes holding their smartcards, this time returning them for future use. It is 23.32 on the clock and each is solemnly holding up their keycard, in a new tamper-evident bag, for the cameras to witness before returning it to the safe. Not everyone present is entirely gripped. "It's like a combination of church and a baseball game and I don't know what else," says Icann PR Lynn Lipinski. "I'm getting sleepy."

At 00.06, five hours after we all arrived, it's time to shut off the live-streaming cameras. Lamb checks in to see how many people have been following the ceremony.

The system admin calls back: "We peaked at 12."

We file out, job done.

"Wait," Okubo says. "One question before we go… Can I ask who's coming for dinner?"


There's a show of hands and, with the web secure for another three months, the keyholders to the internet file out into the LA sunshine.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Monday, February 24, 2014

2029: the year when robots will have the power to outsmart their makers

Computers will be cleverer than humans by 2029, according to Ray Kurzweil, Google's director of engineering.

The entrepreneur and futurologist has predicted that in 15 years' time computers will be more intelligent than we are and will be able to understand what we say, learn from experience, make jokes, tell stories and even flirt.

Kurzweil, 66, who is considered by some to be the world's leading artificial intelligence (AI) visionary, is recognised by technologists for popularising the idea of "the singularity" – the moment in the future when men and machines will supposedly converge. Google hired him at the end of 2012 to work on the company's next breakthrough: an artificially intelligent search engine that knows us better than we know ourselves.

In an interview in today's Observer New Review, Kurzweil says that the company hasn't given him a particular set of instructions, apart from helping to bring natural language understanding to Google.

"My project is ultimately to base search on really understanding what the language means," he said. "When you write an article, you're not creating an interesting collection of words. You have something to say and Google is devoted to intelligently organising and processing the world's information.

"The message in your article is information, and the computers are not picking up on that. So we would want them to read everything on the web and every page of every book, then be able to engage in intelligent dialogue with the user to be able to answer their questions."

Kurzweil's prediction comes hot on the tail of revelations that Google is in the throes of assembling the greatest artificial intelligence laboratory on Earth. The company has bought several machine-learning and robotics companies, including Boston Dynamics, the firm that produces lifelike military robots, for an undisclosed sum; and the smart thermostat maker, Nest Labs, for $3.2bn (£1.9bn).

This month it bought the cutting-edge British artificial intelligence startup DeepMind for £242m and hired Geoffrey Hinton, a British computer scientist and the world's leading expert on neural networks.

Kurzweil is known for inventing devices that have changed the world the first flatbed scanner, the first computer program that could recognise a typeface, and the first text-to-speech synthesiser. In 1990 he predicted that a computer would defeat a world chess champion by 1998 (in 1997, IBM's Deep Blue defeated Garry Kasparov), and he predicted the future prominence of the world wide web at a time when it was only an obscure system that was used by a few academics.

For years he has been saying that the Turing test the moment at which a computer will exhibit intelligent behaviour equivalent to that of a human will be passed in 2029. "Today, I'm pretty much at the median of what AI experts think and the public is kind of with them," he adds. "The public has seen things like Siri [the iPhone's voice-recognition technology], where you talk to a computer. They've seen the Google self-driving cars. My views are not radical any more."

Kurzweil had been working with Google's co-founder, Larry Page, on special projects over several years until Page offered him a job. "I'd been having ongoing conversations with him about artificial intelligence and what Google is doing and what I was trying to do," he notes.

"And basically he said, 'Do it here. We'll give you the independence you've had with your own company, but you'll have these Google-scale resources.'"

In 2009 Kurzweil co-founded the Singularity University, partly funded by Google, an unaccredited graduate school devoted to his ideas and the aim of exploring exponential technologies.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Six alternatives to WhatsApp now that Facebook owns it

Facebook has bought messaging app WhatsApp, which means those who have been avoiding feeding their data into the world’s biggest social network might think about switching to another instant messaging service.

As WhatsApp is based on phone numbers rather than usernames, Facebook has in effect just bought a list of hundreds of millions of phone numbers.

“Currently, WhatsApp can change terms and conditions at any time, without notifying users, which many people who use this service aren’t aware of. Meanwhile, Facebook already has a very broad copyright license on people’s content and already shares your data with many other services,” explains StJohn Deakins, chief executive of online identity service Citizenme.

“Now with Facebook buying WhatsApp, this could see more and more private information becoming part of Facebook’s database. From a personal data standpoint, this is extremely worrying.”

While WhatsApp is certainly the most high-profile text messaging replacement app in the UK, it is by no means the only horse in the race.

Line
WhatsApp’s biggest competitor is Line, a messaging app that lets users send text messages, images, video and audio, was well as make phone calls over the internet or video conference.

The Line messaging app is available for almost every computer and mobile platform, including Windows, OS X, the iPhone, Android, BlackBerry, Windows Phone, Nokia’s Asha and even Firefox OS.

Line has 350 million users globally, expanding rapidly from 10 million in December 2011 according to data from Statista. Line Corporation is headquartered in Japan, a subsidiary of South Korea’s online content and search company Naver Corporation.

Kik Messenger
Another messaging app alternative, Kik Messenger sends texts, images and voice messages over a smartphone’s data connection avoiding mobile operator messaging charges. It also integrates a web browser into the application allowing users to browse content and share it directly with their friends.

Kik is available on the iPhone, Android, Windows Phone, Nokia’s Ovi store and BlackBerry. Now with 100m users globally, Kik was released in 2010 and quickly hit 1 million users in just 14 days.

BBM
BlackBerry’s Messenger is the grandfather of the phone instant messaging apps. Originally only available as an integral part of BlackBerry’s smartphones, allowing secure instant messages to be sent between BlackBerry users, BBM was released for both Android and the iPhone in September 2013 making it cross platform for the first time.

BBM for iPhone and Android was downloaded 10m times in the first day, with over 80 million users globally across all platforms by October 2013. BlackBerry announced that by December 2013 BBM had 40 million users of its iPhone and Android apps.

BlackBerry currently has no plans to bring BBM to Windows Phone or other platforms.

Viber
A messaging app that stated out life as a direct Skype competitor for free voice calling, Viber has expanded into a cross-platform messaging client and was recently bought by the Japanese e-commerce giant Rakuten for $900m.

Viber is available for iPhone, Android, BlackBerry and Windows Phone, as well as Samsung’s Bada and Nokia’s Symbian and Series 40, plus the desktop, making it one of the most widely available messaging apps.

All users can send text, pictures and video messages using Viber, but voice calling and some other features are limited to the iPhone, Android and Windows Phone.

Google Hangouts
Google’s messaging strategy has historically been a bit of a mess with different messaging protocols across different services that could not communicate with each other. In 2013 Google launched Hangouts to unify its messaging platforms.

Available on the desktop, Android and iPhone, Hangouts allows users to send text and images, as well as hold video calls and group messaging with read states and typing indicators. Hangouts is also integrated into Gmail.

Skype
Skype maybe known for voice and video calling, but it also integrates a solid instant messaging function.

Available for Android, the iPhone, Windows Phone and BlackBerry, as well as desktops, home phones TVs and games consoles, Skype allows you to send text messages, images, videos, voice messages and send group messages.

The others

There are a plethora of other messaging apps out there, including WeChat huge in China but yet to break big in the UK Tango and TextFree, as well as Apple’s iMessage, which is baked into the iPhone and iPad, but is also available on Apple’s computers.

Facebook also has two other messaging apps. Its Facebook Messenger app is available through the Facebook desktop site as well as mobile apps for iPhone and Android, while Instagram allows users to send photos publicly or privately.

Snapchat, the ephemeral image sharing app, also allows users to send quick photo and text messages, and the likelihood of it being bought by Facebook now looks to have dwindled.

Beyond traditional messaging there is also Twitter’s direct messaging feature, which can also be used as an instant messaging system, sending private messages to followers.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Mark Zuckerberg goes to Barcelona to make mobile friends

If confirmation was needed that we live in the age of the mobile phone, then the presence of Facebook founder Mark Zuckerberg at the Mobile World Congress gathering next week should underline the ascendancy of the handset. Zuckerberg will deliver the keynote address on Monday, fresh from announcing a $19bn (£11.4bn) deal to buy WhatsApp, the hottest mobile texting app in town.

The presence of this social media superstar at one of the less glamorous trade shows is proof that mobile is now the priority for technology giants such as Facebook and Google. Facebook has shifted its focus from laptops and PCs as it strives to catch up with consumers' changing technological tastes. As a result its mobile site, also accessible via tablets, is now used by 945 million of its 1.23 billion monthly active users.


Facebook will attend the MWC event with every big name in technology, including every global mobile operator and handset maker. In all, 75,000 delegates descend on Barcelona to showcase the next wave of smartphones and gadgets.

Facebook has obviously seen mobile as the key to its future for a while. Its purchase of WhatsApp last week, which added another 450 million monthly active users, is the biggest in a long line of acquisitions that includes Instagram, the mobile-based photosharing site.

Facebook has its own home-grown mobile applications too. The standard Facebook app has become one of the primary ways of accessing the social network for millions, while its Facebook Messenger application has joined WhatsApp in the ranks of text message replacement services.

The strategic shift to mobile has been driven partly by Facebook users' embrace of mobile technology, but also by the subsequent impact on Facebook's primary revenue source, advertising. As more people migrate to using Facebook on tablets or phones, the number of eyeballs using the desktop version of Facebook shrinks. Facebook, and its advertisers, have to go where the users are.

Beyond existing users in developed countries such as the UK and the US, Facebook also sees mobile as a way of engaging with people in the developing world. Already, around 81% of Facebook's 757 million daily active users are based outside the US and Canada. In the markets where Facebook is not already reaching saturation point, it is the mobile phone that is often the primary computing device – especially in developing nations, where mobile phone coverage far outstrips traditional landline and broadband infrastructure.

The International Telecommunication Union (ITU) estimates that there are at least 6.8 billion mobile subscribers globally, while data from Portio Research suggests that that figure will rise to 8.5 billion by the end of 2016. Of those mobile subscribers, 5.2 billion are based in the developing world, with mobile data available to 1.2 billion of those users, according to data from ITU. By contrast only 357m fixed broadband connections exist in the developing world.

The path to increasing Facebook's user base in these developing nations is therefore through mobile, something that is obviously on Zuckerberg's mind as he prepares to take the stage in Barcelona. But MWC is not just about Facebook, of course. Several major mobile manufacturers are expected to unveil their new smartphones, tablets and a plethora of accessories. New Smart watches will appear, but glitzy phone launches will still dominate. Samsung's highly anticipated Galaxy S5 is a follow-up to last year's top-of-the-range Galaxy S4, which has dominated sales of smartphones that use Google's Android operating system in the UK.

The S5 is expected to feature a bigger screen and more processing power, but the biggest improvement is anticipated to be in the software department, where Samsung stands accused of falling behind competitors.

Sony, too, is expected to launch at least one new high-end device in Barcelona, with the follow up to the waterproof Xperia Z1 expected to be unveiled. A replacement for the thinnest and lightest full-sized Android tablet, the Xperia Tablet Z, is also expected, which could see an Android device worthy of rivalling Apple's iPad Air.

A new device from Nokia is also expected: the Nokia X. It is anticipated to be an Android smartphone, but one that is very different from Google's Android, looking more like Microsoft's Windows Phone and running Microsoft and Nokia's applications instead of Google's Maps, Gmail and search. One of Zuckerberg's reasons for buying WhatsApp at such vaulting expense was to prevent it from falling into the hands of Google. But thanks to the popularity of Android, the search giant's presence will be felt strongly in Barcelona.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Apple mobile devices at risk of hacking, firm says

A major flaw in Apple software for mobile devices could allow hackers to intercept email and other communications that are meant to be encrypted, the company has said, and experts say Mac computers are even more exposed.

If attackers have access to a mobile user's network, such as by sharing the same unsecured wireless service offered by a restaurant, they could see or alter exchanges between the user and protected sites such as Gmail and Facebook. Governments with access to telecom carrier data could do the same.

"It's as bad as you could imagine, that's all I can say," said Johns Hopkins University cryptography professor Matthew Green.

Apple did not say when or how it learned of the flaw in the way iOS handles sessions in what are known as secure sockets layer or transport layer security, nor did it say whether the flaw was being exploited.


But a statement on its support website on Friday was blunt: The software "failed to validate the authenticity of the connection".

Apple released software patches and an update for the current version of iOS for iPhone 4 and later, 5th-generation iPod touches, and iPad 2 and later.

Without the fix, a hacker could impersonate a protected site and sit in the middle as email or financial data went between the user and the real site, Green said.

After analysing the patch, several security researchers said the same flaw existed in current versions of Mac OSX, running Apple laptop and desktop computers. No patch is available yet for that operating system, though one is expected soon.

Because spies and hackers will also be studying the patch, they could develop programs to take advantage of the flaw within days or even hours.

The issue was a "fundamental bug in Apple's SSL implementation", said Dmitri Alperovich, chief technology officer at the security firm CrowdStrike. Adam Langley, a senior engineer at Google, agreed with CrowdStrike that OS X was at risk.

Apple did not reply to requests for comment. The flaw appears to be in how well-understood protocols were implemented, an embarrassing lapse for a company of Apple's stature and technical prowess.

The company was recently stung by leaked intelligence documents claiming that authorities had a 100% success rate in breaking into iPhones.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

What are the most popular swearwords on Twitter?

What do you think is the most commonly used swearword on Twitter? Well of course it is. Very detailed work by researchers at Wright State University in Ohio has found that 34.7% of all the swearwords in their sample of 51m tweets were "fuck" or one of its long list of cognates.

In comparison, the second and third most popular swearwords "shit" and "ass" accounted for 15.0% and 14.5% respectively, while other highlights included "bitch" (10.3%), "hell" (4.5%), "whore" (1.8%), "dick" (1.7%), "piss" (1.5%) and "pussy" (1.2%). Between them, the top seven make up 90.6% of all the swearing on Twitter, and Twitter is a sweary place. In daily life it is thought that between 0.5% and 0.7% of the words we use are swearwords, but the proportion on the site is roughly twice this, at 1.15%. According to this study, about one in every 13 tweets contains a swearword of some kind.


Intriguingly, swearing also seems to be an early-week thing. Tweets become more and more likely to contain a swearword as the day progresses, perhaps reflecting the accumulation of things we have to swear about, and peak profanity is reached between midnight and 1.30am, suggesting that people who are awake at that time are, let's say, the least inhibited. Yet Friday, Saturday and Sunday are consistently the least sweary days of the week.

Perhaps at the weekend the less inhibited people are so intent on getting really uninhibited that they don't tweet very much at all.

As seen in past studies of offline behaviour, women were more likely to swear when talking to women, while men (who swear more overall) were much more likely to swear when talking to other men. Interestingly, men and women were also more likely than the other to use their own gender's insults. Women, for instance, were the main advocates of "bitch" and "slut" and were still more likely to use the terms in all-female conversations. It is difficult to be sure how playfully the words were being used, of course. Although the researchers do find that "cursing is associated with negative emotions". No shit?

Source: The Guradian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

PlayStation 4 – muted Japanese launch shows how industry has changed

The queues seemed to stretch forever along the crowded streets of Akihabara, Tokyo’s famed Electronic Town. Outside the biggest stores, scuffles broke out as gamers fought for favourable positions the police were called in. It was chaos. This was March 2000, the launch of the PlayStation 2 console the most successful games machine ever produced. The rest of the world would have to wait months for this, but back then the domestic market was the most important to Sony, as it had been to all major console manufacturers for twenty years. Japan was the epicentre of gaming; it had the console makers, the best developers and the biggest games. But over the course of the following decade things changed.


February 22, 2014. The PlayStation 4 is being launched in Japan three months after the machine’s high profile arrival in North America. There have been queues, of course, but no riot police this time, and no one is watching the sales figures for a hint of how this console may perform it has already sold five million units elsewhere in the world. There are a couple of Japanese launch titles gangster adventure Yakuza: Ishin and fantasy strategy sim Dynasty Warriors 8: Xtreme Legends the key examples but, apart from a new beta demo for Final Fantasy 14: A Realm Reborn there is nothing huge. Talking about the delay, Shuhei Yoshida, president of Sony Worldwide Studios, has said that the Japanese development industry wasn’t quite ready to support the machine, but this isn’t the whole story. It papers over something more profound. The country hasn’t been ready for years.

In 2002, Japan accounted for 50% of the global video game market. By 2010, it was at 10%. If you go back to the era of PlayStation 1 and 2, you will see it was dominated by Japanese giants like Nintendo, Sony, Capcom, Konami and Namco. The biggest games were arcade conversions the likes of Tekken, Ridge Racer and Street Fighter but the biggest console originals came from Japanese studios too: Super Mario, Resident Evil, Final Fantasy, Metal Gear Solid... These were the games everyone was excited by. The top ten best selling games of the nineties were all developed in Japan.

But in the early 2000s Western tastes began to change. The arrival of Rockstar’s seminal open-world shooter, Grand Theft III, kickstarted a whole new genre of expansive sandbox games, while the increasing popularity of first-person shooters like Quake and Unreal led to big American franchises like Medal of Honor and Call of Duty set in grittily authentic landscapes. As a whole, Japanese gamers tended to prefer fantasy adventures and hyper-stylised arcade-style shooters they didn’t go for open-worlds, they didn’t go for cinematic naturalism. A rift was developing.

Risk factors
At the same time economic factors were working against the Japanese industry. An economic recession shrank the domestic market for console games, and hit publisher’s ability to compete in terms of development costs. The Dreamcast title Shenmue, an incredibly prescient, ambitiously sprawling adventure required a reported $70m to develop, almost ruining its publisher Sega – but in the West, among companies like Electronic Arts, Activision and Ubisoft, this would soon be a pretty standard budget. And on the other side of the financial spectrum, a very strong indie scene has developed in the US and Europe, often with the financial backing of larger publishers (there is a thriving indie scene developing in Japan, but it has largely been contained in hobbyist groups). It also seems easier for younger talent to rise into positions of prominence within larger developers whereas in Japan, a rigidly hierarchical management structure can keep fresh talent from blossoming.

By the time of the PS3 and Xbox 360, Japanese publishers were bit part players. While Nintendo was still in a dominant position thanks to the massive success of the Wii console, Capcom, Namco, Konami, Square Enix and co struggled to maintain interest in their big franchises. Some tried to Westernise the brands, often diluting the appeal in the process. The later Resident Evil and Final Fantasy titles have, in the eyes of many gamers, lost their intrinsic qualities in the bid to appeal more broadly. In 2009, Keiji Inafune, the producer behind such mammoth games as Mega Man, Onimusha and Resident Evil 4, famously stated that the Japanese development scene was finished. It was stuck in a past of traditional role-playing games and sci-fi mech battlers. It couldn’t compete.

There have been notable exceptions, of course. Plenty of them. Formed by a cabal of legendary designers and producers, Platinum Games has produced two of the finest games of the decade: Bayonetta and Vanquish; Grasshopper Manufacture retains the Japanese sense of surreal mischief with titles like No More Heroes and Lollipop Chainsaw; Capcom has produced the enormously popular Monster Hunter series of creature capture games; and of course Nintendo is still turning its big names Mario and Zelda into beautiful gaming experiences. Perhaps most tellingly, From Software’s Demon’s Souls and Dark Souls titles intricate obtuse, demanding fantasy action adventures – have garnered an obsessive following in the West despite eschewing the industry flow toward more intuitive, less challenging, gaming experiences.

Signs of life
But the industry is very different now than it was in 2000. The smartphone sector has exploded, some believe at the expense of the handheld console gaming sector (although Pokemon and Animal Crossing are still wonderful and popular). The PC scene in the West is strengthening through the dominance of the Steam platform, and the traditional console market has Activision, EA, Take Two and Ubisoft at its head. Look at the big gaming sites and the most anticipated titles of 2014 are Destiny, Titanfall, Watch Dogs, Tom Clancy’s The Division... All produced in North America. And of course there is the rise of the online massively multiplayer RPG, a genre dominated in Asia by Chinese and South Korean giants.

Japan is still there, however. Inafune’s apocalyptic comment isn’t quite accurate. Dark Souls 2, Mario Kart 8, Metal Gear Solid V: Ground Zeroes and new Final Fantasy and Kingdom Hearts titles are all looking enticing. The global fanbase is watching. Certainly, there has been a huge fall between 2000 and 2014, between dominating the industry and getting the freshest console three months after other territories (and the Xbox One hasn’t even got a Japanese release date yet). But this business has always been about trends, it is cyclical, and the next big thing could easily come out of Tokyo or Osaka. Dark Souls shows there is an appetite for the sort of challenging and cryptic titles that Japanese publishers excel at. And there are new routes to market that cut out the repressive strata of traditional publishers. Last year, Infanune, the developer who criticised the staid Japanese industry, turned to Kickstarter to fund his new project Mighty No 9, and achieved his target in a matter of hours. Sony is supporting indie-minded development in Japan, funding offbeat titles like Tokyo Jungle and Rain with young teams and fresh ideas. Companies like Playism and Nyu Media are helping to get brilliant Japanese indie titles like La Mulana and Gigantic army to the west; boutique western publishers like Rising Star and Rice Digital are cherry picking the best local fighting games, JRPGs and shoot-’em-ups. There is masses of activity bubbling under the surface.

So the late launch of the PS4 tells us one story about the Japanese games industry, but it doesn’t provide a full-stop or a signal of unstoppable decline. The British industry has suffered a huge fall from grace in recent years, as major publishers have pulled out, shutting studios in their wake. But it has clambered back, not just with high profile releases like GTA V, Batman and Forza Horizon, but with cool interesting indie projects. Japan is doing the same, perhaps. Veteran gamers know that from Metroid to Herzog Zwei to Resident Evil to Metal Gear to Killer7 to Dance Dance Revolution to Demon’s Souls, Japan has led industry thinking on design and mechanics; it has innovated, it has invented new genres with style and flourish and purity of vision. It is now playing catch up again, but it is a skilful player. Maybe PlayStation 4, with its more open publishing platform, its easy welcome to smaller studios, its global digital distribution, will be a major part of that process.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks