Skip to main content

Home/ Future of the Web/ Group items tagged what to do

Rss Feed Group items tagged

Paul Merrell

Rapid - Press Releases - EUROPA - 0 views

  • Did the Commission co-operate with the United States on this case? The Commission and the United States Federal Trade Commission have kept each other regularly and closely informed on the state of play of their respective Intel investigations. These discussions have been held in a co-operative and friendly atmosphere, and have been substantively fruitful in terms of sharing experiences on issues of common interest.
  • Where does the money go? Once final judgment has been delivered in any appeals before the Court of First Instance (CFI) and the Court of Justice, the money goes into the EU’s central budget, thus reducing the contributions that Member States pay to the EU. Does Intel have to pay the fine if it appeals to the European Court of First Instance (CFI)? Yes. In case of appeals to the CFI, it is normal practice that the fine is paid into a blocked bank account pending the final outcome of the appeals process. Any fine that is provisionally paid will produce interest based on the interest rate applied by the European Central Bank to its main refinancing operations. In exceptional circumstances, companies may be allowed to cover the amount of the fine by a bank guarantee at a higher interest rate. What percentage of Intel's turnover does the fine represent? The fine represents 4.15 % of Intel's turnover in 2008. This is less than half the allowable maximum, which is 10% of a company's annual turnover.
  • How long is the Decision? The Decision is 542 pages long. When is the Decision going to be published? The Decision in English (the official language version of the Decision) will be made available as soon as possible on DG Competition’s website (once relevant business secrets have been taken out). French and German translations will also be made available on DG Competition’s website in due course. A summary of the Decision will be published in the EU's Official Journal L series in all languages (once the translations are available).
Paul Merrell

New Documents Reveal FBI's "Cozy" Relationship with Geek Squad - 1 views

  • Throughout the past ten years, the FBI has at varying points in time maintained a particularly close relationship with Best Buy officials and used the company’s Geek Squad employees as informants. But the FBI refuses to confirm or deny key information about how the agency may potentially circumvent computer owners’ Fourth Amendment rights. The Electronic Frontier Foundation (EFF) obtained a handful of documents in response to a Freedom of Information Act (FOIA) lawsuit filed in February of last year. EFF says they show the relationship between the FBI and Geek Squad employees is much “cozier” than they thought.
  • In court filings, the defense mentioned there were “eight FBI informants at Geek Squad City” from 2007 to 2012. Multiple employees received payments ranging from $500-1000 for work as informants.
  • There is no evidence that FBI obtained warrants before the Geek Squad informants searched computers they were repairing. It is believed Geek Squad employees routinely search unallocated space for any illegal content that may be on a device and then alert the FBI after conducting “fishing expeditions” for criminal activity, and this is what the FBI trains them to do. EFF sought “records about the extent to which [the FBI] directs and trains Best Buy employees to conduct warrantless searches of people’s devices.” As is clear, the government stonewalled EFF and only released documents that were already referred to by news media. The FBI neither confirmed nor denied whether the agency has “similar relationships with other computer repair facilities or businesses.” The FBI also would not produce any documents that detailed procedures or “training materials” for cultivating informants at computer repair facilities.
Paul Merrell

What are rare earth metals & why they are China's 'nuclear option' in trade war with US... - 0 views

  • The escalating US-China trade conflict has raised concerns about the measures each side could use in their fight, including Beijing’s option to restrict exports of rare earth metals. The economic measure is dubbed as one of Beijing’s nuclear options in its battle with Washington due to the fact that China is the top producer of rare earth metals and holds the largest reserves.
  • The United States relies on China, the leading global supplier, for about 80 percent of its rare earths.
  • China controls around 85-95 percent of all the rare earths’ production and supply. Last year, the country produced about 78 percent of the global volume of rare earths.
  • ...2 more annotations...
  • The metals and alloys that contain them are used in many devices that people use every day such as computer memory, DVDs, rechargeable batteries, cell phones, catalytic converters, magnets, fluorescent lighting and so on.During the past 20 years, there has been an explosion in demand for many items that require rare earth metals. There were very few cell phones in use then but the number has risen to over seven billion in use today. Rare earths’ use in computers has grown almost as fast as the number of cell phones.Many rechargeable batteries are made with rare earth compounds. Demand for the batteries is being driven by demand for portable electronic devices such as cell phones, readers, portable computers, and cameras.Rare earths are also used as catalysts, phosphors, and polishing compounds for air pollution control, illuminated screens on electronic devices, and much more. All of those products are expected to experience rising demand.
  • He explained that China could cripple global industry, especially emerging technologies, if it were to ban exports of rare earth materials. There are very few options in sourcing those essential technology metals from anywhere else, the analyst said. “Of course, China does not necessarily want to do this, because, it plays a long game – and it does not want the West to develop alternatives.”
Paul Merrell

Epic Games accuses Google of bullying and bribing to block competition to its Android a... - 0 views

  • oogle on Monday confronted the second major U.S. antitrust trial in two months to cast the internet powerhouse as a brazen bully that uses its immense wealth and people’s dependence on one of its main products to stifle competition at consumers’ expense. The trial that opened in a San Francisco federal court targets the Google Play Store that distributes apps for the company’s Android software that powers virtually all the world’s smartphones that aren’t made by Apple. The case, stemming from a lawsuit filed by video game maker Epic Games, alleges Google has created an illegal monopoly on Android apps primarily so it can boost its profits through commissions ranging from 15% to 30% on purchases made within an app. “The result of what Google is doing is higher prices, lower quality and less choice for everybody,” Epic attorney Gary Bornstein said Monday during a 45-minute opening statement before the 10-person jury that will decide the case.
Paul Merrell

The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters | Motherboard - 0 views

  • Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, hospitals, elevators, and the power grid. In these stories, thousands of people die. Chaos ensues. While some of these scenarios overhype the mass destruction, the individual risks are all real. And traditional computer and network security isn’t prepared to deal with them.Classic information security is a triad: confidentiality, integrity, and availability. You’ll see it called “CIA,” which admittedly is confusing in the context of national security. But basically, the three things I can do with your data are steal it (confidentiality), modify it (integrity), or prevent you from getting it (availability).
  • So far, internet threats have largely been about confidentiality. These can be expensive; one survey estimated that data breaches cost an average of $3.8 million each. They can be embarrassing, as in the theft of celebrity photos from Apple’s iCloud in 2014 or the Ashley Madison breach in 2015. They can be damaging, as when the government of North Korea stole tens of thousands of internal documents from Sony or when hackers stole data about 83 million customer accounts from JPMorgan Chase, both in 2014. They can even affect national security, as in the case of the Office of Personnel Management data breach by—presumptively—China in 2015. On the Internet of Things, integrity and availability threats are much worse than confidentiality threats. It’s one thing if your smart door lock can be eavesdropped upon to know who is home. It’s another thing entirely if it can be hacked to allow a burglar to open the door—or prevent you from opening your door. A hacker who can deny you control of your car, or take over control, is much more dangerous than one who can eavesdrop on your conversations or track your car’s location. With the advent of the Internet of Things and cyber-physical systems in general, we've given the internet hands and feet: the ability to directly affect the physical world. What used to be attacks against data and information have become attacks against flesh, steel, and concrete. Today’s threats include hackers crashing airplanes by hacking into computer networks, and remotely disabling cars, either when they’re turned off and parked or while they’re speeding down the highway. We’re worried about manipulated counts from electronic voting machines, frozen water pipes through hacked thermostats, and remote murder through hacked medical devices. The possibilities are pretty literally endless. The Internet of Things will allow for attacks we can’t even imagine.
  •  
    Bruce Scneier on the insecurity of the Internet of Things, and possible consequences.
Gonzalo San Gil, PhD.

Google Wants Know What You Do When You're Home | ThinkProgress - 0 views

  •  
    "Google plans to buy home surveillance startup Dropcam through Nest Labs in a $555 million deal that gives the Internet giant even more tools to collect specific data on your habits at home."
  •  
    "Google plans to buy home surveillance startup Dropcam through Nest Labs in a $555 million deal that gives the Internet giant even more tools to collect specific data on your habits at home."
Paul Merrell

Thomas R. Bruce on interoperability and legal information | Universal Interoperability ... - 0 views

  • Legal Information Institute ("LII") founder and director Thomas R. Bruce has begun an excellent series of blog articles on the vital role of intererability in the provision of free legal information to the world, "hacking eGovernment" as he puts it. For those who do not know of him, Mr. Bruce is a giant in the movement to make government information available to everyone. LII is headquartered at the Cornell University School of Law and has international branches. Mr. Bruce's series is one to watch for those pondering the future of hacking eGovernment.
  • Amid all the screeching in the last post, it’s a little hard to figure out what the point was. So I’ll just say it: folks, the future does not lie in putting up huge, centralized collections of caselaw . It lies in building services that can work across many individual collections put up by lots of different people in lots of different institutional settings. Let me say that again: the future does not lie in putting up huge, centralized collections of caselaw. It lies in building services that can work across many individual collections put up by lots of different people in lots of different institutional settings. Services like site-spanning searches, comprehensive current-awareness services, and a scad of interesting mashups in which we put caselaw, statutes and regulations alongside other stuff to make new stuff.
  • Read more.
Paul Merrell

European Union fines Intel a record $1.45 billion - Los Angeles Times - 0 views

  • European regulators today levied a record antitrust fine of $1.45 billion against Intel. Corp. for abusing its position as the world's dominant computer chip maker. The fine comes after nearly two years of investigation by the European Commission into allegations that the Santa Clara company offered improper rebates and other discounts to discourage companies from buying microprocessors from its smaller rival, Advanced Micro Devices Inc. Complaints from AMD triggered the case.
  • The fine tops the $1.23-billion fine European regulators levied against Microsoft Corp. last year for abusing its dominant position in computer software.
  • "Intel takes strong exception to this decision. We believe the decision is wrong and ignores the reality of a highly competitive microprocessor marketplace – characterized by constant innovation, improved product performance and lower prices. There has been absolutely zero harm to consumers. Intel will appeal."
  • ...2 more annotations...
  • The European ruling, which had been expected in recent days, comes as the U.S. Federal Trade Commission continues its own antitrust investigation against Intel, which was opened in June 2008. AMD also has sued Intel in federal court.
  • "The relief that the Europeans imposed I think will provide an excellent guide to U.S. enforcers as they try to determine what to do about Intel's exclusionary conduct," Balto said today.
Paul Merrell

American and British Spy Agencies Targeted In-Flight Mobile Phone Use - 0 views

  • In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: “What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight.” This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA’s Signals Intelligence Directorate, or SID, and it was classified “top secret.” It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. The NSA attributed the increase to “more planes equipped with in-flight GSM capability, less fear that a plane will crash due to making/receiving a call, not as expensive as people thought.” The sky seemed to belong to the agency.
Gary Edwards

The lock-in battle shifts to Sharepoint | Blankenhorn - ZDNet.com - 0 views

  • On the surface SharePoint is merely a document management system which lets everyone in your company share and find Office documents easily. But critics like our own Matt Asay call it a Trojan Horse, which will bind companies which deploy it to Microsoft forever. You can put together everything SharePoint does using open source projects, but it takes work. You can combine Alfresco (from the Electronic Content Management (ECM) software company Matt works for), the Liferay portal, JasperSoft for reporting, and Zimbra’s e-mail server. Throw in some Jive forums and you’re more than done. But what does that cost, really, compared to just using something from Microsoft which already works with your current Office applications? Exactly. Once companies start using SharePoint, Asay worries, there is no way for them to ever ditch Microsoft applications and file formats. SharePoint is tied to those formats, and as the share fills the cost of switching away rises exponentially.
  •  
    August 2007 discussion about SharePoint. Everythign projected in this article is happening - including the proprietary file format and protocol lock-in
  •  
    Most quality online stores. Know whether you are a trusted online retailer in the world. Whatever we can buy very good quality. and do not hesitate. Everything is very high quality. Including clothes, accessories, bags, cups. Highly recommended. This is one of the trusted online store in the world. View now www.retrostyler.com
Paul Merrell

Privacy Day | ACLU of Oregon - 0 views

  • Help strengthen Oregon's privacy protections and limit the use of dragnet surveillance. We are advocating for:•    SB 339 - Strict guidelines for the use of automatic license plate readers (ALPR) •    SB 640 - A warrant requirement to access email, phone, and location records •    SB 641 - A warrant requirement to search cell phones Advances in technology have made it too easy for law enforcement to track where you go, what you do, and who you are with. Most of the data the government collects is about innocent people who are not suspected of any crimes. Yet the government collects that personal information - or accesses it directly from your internet or cell phone provider – and can keep it for years on end.  Technology has changed but your rights haven't.
  •  
    Privacy measures that the ACLU is pushing at the state level in Oregon. Links are to short summaries of legislation.
Paul Merrell

Months After Appeals Argued, NSA Cases Twist in the Wind - US News - 0 views

  • Three cases that likely lay the groundwork for a major privacy battle at the U.S. Supreme Court are pending before federal appeals courts, whose judges are taking their time announcing whether they believe the dragnet collection of Americans' phone records is legal. It’s been more than five months since the American Civil Liberties Union argued against the National Security Agency program in New York, three months since legal activist Larry Klayman defended his thus far unprecedented preliminary injunction win in Washington, D.C., and two months since Idaho nurse Anna Smith’s case was heard by appeals judges in Seattle. At the district court level, judges handed down decisions about a month after oral arguments in the cases. It’s unclear what accounts for the delay. It’s possible judges are meticulously crafting opinions that are likely to receive wide coverage, or that members of the three-judge panels are clashing on the appropriate decision.
  • Attorneys involved in the cases understandably are reluctant to criticize the courts, but all express hope for speedy resolution of their fights against alleged violations of Americans’ Fourth Amendment rights.
  • Though it’s difficult to accurately predict court decisions based on oral arguments, opponents of the mass surveillance program may have reason for optimism.
  • ...1 more annotation...
  • Two executive branch review panels have found the dragnet phone program has had minimal value for catching terrorists, its stated purpose. After years of presiding over the collection and months of publicly defending it, President Barack Obama pivoted last year and asked Congress to pass legislation ending the program. A measure to do so failed last year.
Gonzalo San Gil, PhD.

French Magazine Fined €10,000 For Encouraging Piracy | TorrentFreak [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! 'Encouraging': what a shady wording... # ! Does TV News 'encourage' wars or Movies killings, scams and all the crimes they show to the people...? # ! Anyone could say so...
  •  
    [ Ernesto on June 30, 2015 C: 62 Breaking The music industry has won a landmark ruling in France where a local magazine was fined €10,000 for showing readers how and where pirated films and music can be downloaded. The ruling is the first of its kind and serves as a warning to other publications that write about online piracy. ...]
  •  
    [ Ernesto on June 30, 2015 C: 62 Breaking The music industry has won a landmark ruling in France where a local magazine was fined €10,000 for showing readers how and where pirated films and music can be downloaded. The ruling is the first of its kind and serves as a warning to other publications that write about online piracy. ...]
Gonzalo San Gil, PhD.

Small ISP stands up to Rightscorp's "piracy fishing expedition" and wins | Ars Technica - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! The Beginning of The ISPs #Upheaval... # ! What Media/Entertainment Industry will do # (as '#They' refuse to enter in the Digital Age...)?
  •  
    A Rightscorp DMCA subpoena, asking for 71 subscriber identities, is thrown out. by Joe Mullin - May 11, 2015 8:20 pm UTC
Gary Edwards

A Proprietary Web? Blame the W3C | TechConsumer Paul Ellis - 0 views

  • The real culprit This may seem like a forgone conclusion to many of you after seeing the W3C’s development timetables, but the real reason Flash and Silverlight exist is because the “open-web” people dropped the ball. HTML simply can handle what Flash and Silverlight can do. It has become increasingly stale for modern web development needs. Here is some perspective, HTML5 has finally added a tag for handling video. Flash 6 came out in 2002 with video support! Where is the HTML version of Line Rider? It is in Flash and Silverlight now. If you want to see something really interesting check out Hard Rock Cafe’s memorabilia page (Silverlight 2 required) and tell me if you’ve ever seen something like that with HTML
  •  
    A must read. This article was slashdotted.
David Corking

Should this group be changed to invite-only? - 8 views

I suggest that you do what makes best use of your time. Deleting spam is a thankless task if you have a better solution.

spam off-topic

Paul Merrell

Cloud Computing: The Nine Features of an Ideal PaaS Cloud - 0 views

  • What sort of cloud computer(s) should we be building or expecting from vendors? Are there issues of lock-in that should concern customers of either SaaS clouds or PaaS clouds? I’ve been thinking about this problem as the CEO of a PaaS cloud computing company for some time. Clouds should be open. They shouldn’t be proprietary. More broadly, I believe no vendor currently does everything that’s required to serve customers well. What’s required for such a cloud? I think an ideal PaaS cloud would have the following nine features:
  • 1. Virtualization Layer Network Stability
  • 2. API for Creation, Deletion, Cloning of Instances
  • ...7 more annotations...
  • 3. Application Layer Interoperability
  • 4. State Layer Interoperability
  • 5. Application Services (e.g. email infrastructure, payments infrastructure)
  • 6. Automatic Scale (deploy and forget about it)
  • 7. Hardware Load Balancing
  • 8. Storage as a Service
  • 9. “Root”, If Required
  •  
    Most quality online stores. Know whether you are a trusted online retailer in the world. Whatever we can buy very good quality. and do not hesitate. Everything is very high quality. Including clothes, accessories, bags, cups. Highly recommended. This is one of the trusted online store in the world. View now www.retrostyler.com
Matteo Spreafico

About Loopt | Loopt - 1 views

  • Loopt shows users where friends are located and what they are doing via detailed, interactive maps on their mobile phones. Loopt helps friends connect on the fly and navigate their social lives by orienting them to people, places and events.
« First ‹ Previous 181 - 198 of 198
Showing 20 items per page