Skip to main content

Home/ Indie Nation/ Group items tagged million

Rss Feed Group items tagged

John Lemke

$100 Million Pledged To Indie Film On Kickstarter... And 8,000 Films Made | Techdirt - 0 views

  • And, yes, the "but what about my $100 million movie" crowd will scoff and argue that this number is so "small." But, two points there: first, this number is growing very, very, very fast. And if you can't understand how trends explode, then you're going to be in trouble soon. Second -- and this is the more important point -- those funds helped create 8,000 films. For those who have been arguing about culture and how we're going to lose the ability to make movies... this suggests something amazing and important is happening which goes against all those gloom and doom predictions. By way of comparison, the UN, which keeps track of stats on film production, claimed that in 2009, 7,233 films were made. Worldwide.
  •  
    "Less than a year after being declared the darling of Sundance -- especially for not having "the arrogance of a studio" -- Kickstarter has announced that over $100 million has been pledged to indie film via its platform (which, of course, is hardly the only crowdfunding platform that filmmakers use, though it is the most popular). There are some caveats, of course. This is over Kickstarter's lifetime (since April 2009), but the numbers have been growing rapidly. $60 million of those pledges came in 2012. Also, that's pledges, not actual money given, since only projects that hit their target get the money. The actual total collected is $85.7 million -- which means that'll get over $100 million pretty quickly. "
John Lemke

David Byrne and Cory Doctorow Explain Music and the Internet | culture | Torontoist - 0 views

  • Byrne and Doctorow were there to talk about how the internet has affected the music business. While that was certainly a large part of the discussion, the conversation also touched on all the ways technology and music interact, from file sharing to sampling.
  • Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s—Public Enemy’s It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul’s Boutique—would have each cost roughly $12 million to make given today’s rules surrounding sample clearance.
  • “In the world of modern music, there are no songs with more than one or two samples, because no one wants to pay for that,” Doctorow said. “So, there’s a genre of music that, if it exists now, exists entirely outside the law. Anyone making music like Paul’s Boutique can’t make money from it, and is in legal jeopardy for having done it. Clearly that’s not what we want copyright to do.” When the conversation turned to downloads and digital music distribution, both men were surprisingly passionate on the topic of digital rights management, and how it’s fundamentally a bad idea.
  • ...1 more annotation...
  • Doctorow argued that the way humans have historically shared music is totally antithetical to the idea of copyright laws. He pointed out that music predates not only the concept of copyright, but language itself. People have always wanted to share music, and, in an odd way, the sharing of someone else’s music is embedded in the industry’s business model, no matter how badly some may want to remove it.
  •  
    "Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s-Public Enemy's It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul's Boutique-would have each cost roughly $12 million to make given today's rules surrounding sample clearance."
John Lemke

NSA paid $10 Million bribe to RSA Security for Keeping Encryption Weak - 0 views

  • According to an exclusive report published by Reuters, there is a secret deal between the NSA and respected encryption company RSA to implement a flawed security standard as the default protocol in its products.
  • Earlier Edward Snowden leaks had revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which RSA used in its Bsafe security tool and now Snowden has revealed that RSA received $10 million from NSA for keeping Encryption Weak. So, anyone who knows the right numbers used in Random number generator program, can decipher the resulting cryptotext easily.
John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

Leaked Snowden documents detail NSA's plans for 'millions' of malware attacks | The Verge - 0 views

  • A program known as TURBINE, first revealed last year, is meant to dramatically speed the process: one document says it will "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
  • The scaling process, according to Greenwald, started in 2004, when the NSA operated only 100 to 150 software implants. The number of implants used in the years between 2010 to 2012, by contrast, is described as numbering in the tens of thousands.
John Lemke

Is China About to Scoop the Google Lunar XPRIZE? : Discovery News - 0 views

  • A $30 million Google-backed competition to land a spacecraft on the moon may be about to be scooped. China’s Chang’e 3 probe successfully put itself into lunar orbit on Friday in preparation for an attempted touchdown around Dec. 14.
  •  
    "A $30 million Google-backed competition to land a spacecraft on the moon may be about to be scooped. China's Chang'e 3 probe successfully put itself into lunar orbit on Friday in preparation for an attempted touchdown around Dec. 14."
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

Microsoft's OneDrive For Business Throws Down Gauntlet For Box, Dropbox | TechCrunch - 0 views

  • be unshackled from its other services, and sold as a standalone cloud storage solution for corporate customers. 
  • Now, with OneDrive for Business — the new SkyDrive Pro — Microsoft is selling cloud storage directly to businesses, no other strings attached. If you don’t want to buy into an Office-as-a-service contract, you can still buy cloud storage from Microsoft.
  • Microsoft is offering a deep discount — 50 percent
  • ...1 more annotation...
  • Dropbox has raised $607 million. Box has raised $414 million. That’s more than a billion for just two players in the market.
John Lemke

RapidGator Wiped From Google by False DMCA Notices | TorrentFreak - 0 views

  • File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. “If it happens to us, it can happen to MediaFire or Dropbox tomorrow,” they state.
  • Thus far this has resulted in more than 200 million URLs being removed from Google’s search engine. While many of these takedown claims are legit, some are clearly false, censoring perfectly legitimate webpages from search results. File-hosting service RapidGator.net is one site that has fallen victim to such overbroad takedown requests. The file-hosting service has had nearly all its URLs de-listed, including its homepage, making the site hard to find through Google. Several other clearly non-infringing pages, including the FAQ, the news section, and even the copyright infringement policy, have also been wiped from Google by various takedown requests.
  • “Our robots.txt forbids search engines bots to index any file/* folder/ URLs. We only allow them to crawl our main page and the pages we have in a footer of the website. So most of the URLs for which Google gets DMCA notices are not listed in index by default,” RapidGator’s Dennis explains.
  •  
    Quoting the article: "File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. "If it happens to us, it can happen to MediaFire or Dropbox tomorrow," they state." This is, sooner or later, going to have to be addressed... It totally works against the concept of the cloud. I can not believe that more people are using the cloud for illegal uses than legit.
John Lemke

2 million Facebook, Gmail and Twitter passwords stolen in massive hack - Dec. 4, 2013 - 0 views

  • The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world,
  • The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
  • Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset.
  • ...1 more annotation...
  • But in a statement, ADP said that, "To [its] knowledge, none of ADP's clients has been adversely affected by the compromised credentials."
John Lemke

Hackers charged with stealing Xbox, 'Call of Duty,' and US Army secrets worth over $100... - 0 views

  • Four hackers have been jointly charged with conspiracies to commit computer fraud, copyright infringement, wire fraud, mail fraud, identity theft, and theft of trade secrets. Individually, they have been charged with counts of aggravated identity theft, unauthorized computer access, copyright infringement, and wire fraud.
  • The defendants, aged between 18 and 28, are believed to have stolen more than $100 million in intellectual property and other proprietary data from the likes of Microsoft Corporation, Epic Games, Valve, and even the US Army. This includes pre-release versions of Gears of War 3 and Call of Duty: Modern Warfare 3, Apache helicopter simulation software developed for the US army, and information about the Xbox One console. Two of the suspects have pleaded guilty, one of which is 22-year old David Pokora. His plea represents what may be the first conviction of a foreign-based individual for hacking into US businesses to steal trade secret information.
  • 18-count superseding indictment
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

World's Largest Solar Array Set to Crank Out 290 Megawatts of Sunshine Power - Scientif... - 0 views

  • Agua Caliente, the largest photovoltaic solar power facility in the world, was completed last week in Arizona.
  • ive million solar panels that span the equivalent of two Central Parks in the desert between Yuma and Phoenix. It generates 290 megawatts of power—enough electricity to fuel 230,000 homes in neighboring California at peak capacity.
  • The project, which cost a total of $1.8 billion to construct, received a million-dollar loan from the Loan Programs Office. Under its “SunShot” initiative (so-named in the spirit of president John F. Kennedy’s “moon shot” program), the DoE provides guaranteed loans to unproved ventures in solar power in the hopes of promoting innovation and making the technology more cost-effective.* Although Agua Caliente (owned by U.S. energy giant NRG Energy and partner MidAmerican Solar) is now the largest photovoltaic solar facility in the world, it probably will not hold that distinction for long. Other massive solar panel facilities, such as Antelope Valley Solar Ranch One in California’s Mojave Desert, are rapidly springing up across the Southwest.
  • ...1 more annotation...
  • The energy contained in just one hour of sunlight could power the world for a year, if only it could be harnessed.
John Lemke

The Land Walker: the world's first 340cm bipedal exoskeleton - 0 views

  •  
    Japanese machinery and robotics manufacturer Sakakibara-Kikai has released the first genuine bi-pedal exoskeleton - a landmark event and one which is certain to attract a lot of attention for the company. Mechanatrons and BattleMechs have long been the subject of scifi books, comics and movies with the promise of cyborg technology popularised by the smash sixties television series "The Six Million Dollar Man." We've previously seen some celebrated exoskeletons in films such as Alien (Sigourney Weaver's Ripley takes out the Queen alien in an exoskeleton), Star Wars (the AT-ST Imperial Scout Walker) and RoboCop (the ED209), but until now, the nearest thing we've seen in the metal was the 3.5 metre superhero exoskeleton Enryu from Tmsuk in Japan. Sakakibara-Kikai's Land Walker is just a tad shorter than Enryu at 3.4 metres, weighs 1000kg and shuffles along at 1.5kmh. Enryu is a lot faster than Land Walker but uses caterpillar-like tracks rather than legs to perform its chores - the strapping 3.5 metre Enryu will be called upon to rush into burning buildings, lift heavy objects and rescue people.
John Lemke

Fraudsters break all records in Japan relief ripoffs - Boing Boing - 0 views

  •  
    Fraudster scumbags have beaten all records in setting up fake Japan relief pages, fielding more than 1.7 million malware pages, 419 scams trading on the Japanese disasters, 50+ fake domains with "Japan tsunami" or "Japan earthquake" in their URLs. MacWorld recommends donating via the Red Cross, or other established charities that you're familiar with.
John Lemke

So What Can The Music Industry Do Now? | Techdirt - 0 views

  • The past was, and the future is going to be, much more about performance. In this new world, recordings often function as more as ads for concerts than as money-makers themselves. (And sometimes are bundled with concert tickets, as Madonna's latest album was.) As a result, copying looks a lot less fearsome. A copied ad is just as effective--and maybe much more so--than the original.
  • Just ask pop singer Colbie Caillat. Caillet's music career began in 2005 when a friend posted several of her home-recorded songs to MySpace. One song, Bubbly, began to get word of mouth among MySpace users, and within a couple of months went viral. Soon Colbie Caillat was the No. 1 unsigned artist on MySpace. Two years after posting Bubbly, Caillet had more than 200,000 MySpace friends, and her songs had been played more than 22 million times. Caillet had built a global fan base while never leaving her Malibu home. In 2007, Universal Records released her debut album, Coco, which peaked at No. 5 on the Billboard charts and reached platinum status.
  • The problem of piracy in music is, of course, very different from the problem in comedy. Stand-up comics worry most about a rival, not a fan, copying their jokes. Still, the reduction of consumer copying of music via norms may be possible, and will become more imaginable if the music industry experiences ever-greater fragmentation and communication. There is already an interesting example of norms playing a substantial role in controlling copying in music. In the culture of jambands, we see the fans themselves taking action to deter pirates. What are jambands? In a fascinating 2006 paper, legal scholar Mark Schultz studied the unique culture of a group of bands that belong to a musical genre, pioneered by the Grateful Dead, characterized by long-form improvisation, extensive touring, recreational drug use, and dedicated fans. Although acts like Phish, Blues Traveler, and the Dave Mathews Band vary in their styles, they are all recognizably inspired by the progenitors of jam music, the Dead. But the Dead's influence is not only musical. Most jambands adhere to a particular relationship with their fans that also was forged by the Dead.
  • ...1 more annotation...
  • it turns out that by killing the single, the record labels made the Internet piracy problem, when it arrived, even worse. One of the major attractions of filesharing was that it brought back singles. Consumers wanted the one or two songs on the album that they liked, and not the ten they didn't.
John Lemke

Little red lawsuit: Prince sues 22 people for pirating his songs | The Verge - 0 views

  • The case, filed as Prince v. Chodera in the Northern District of California, reads, "The Defendants in this case engage in massive infringement and bootlegging of Prince's material." Only two defendants are named in the suit, however — the rest are listed as John Does, though eight do have the distinction of being regarded by their online handles. Nevertheless, Prince, based on "information and belief," alleges that each of the individuals worked together on Facebook and Blogger to conduct infringing activity, and lists extensively the mirror sites and blogs each used to distribute copies of his work. He has thus demanded $1 million with interest in damages from each of the defendants, along with a permanent injunction to prevent all of them from doing further harm.
John Lemke

Feathered dinosaur death site is an "animal Pompeii" | Ars Technica - 0 views

  • The fossils of the Jehol Biota are from the Early Cretaceous period, about 130 million years ago, and they comprise a wide variety of animals and plants. So far, about 60 species of plants, 1,000 species of invertebrates, and 140 species of vertebrates have been found in the Jehol Biota.
  • One of the most remarkable discoveries to arise from these fossils came in 2010, when Michael Benton of the University of Bristol found color-banding preserved in dinosaur fossils. These stripes of light and dark are similar to stripes in modern birds, and they provided further evidence that dinosaurs evolved into birds. Benton also found that these fossils had intact mealnosomes—organelles that make pigments. This discovery allowed paleontologists to tell the colors of dinosaurs' feathers for the first time.
John Lemke

Iron Maiden makes millions of dollars by playing live for pirates | The Verge - 0 views

  •  
    The only thing the article got wrong is that they are not "pirates"... they are fans.
John Lemke

NSA collects nearly 5 billion cellphone location records per day | Ars Technica - 0 views

  • The Washington Post added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world.
  • This gigantic data collection feeds a database that stores information on "hundreds of millions of devices," according to the documents obtained by
  • 27 terabytes
  • ...1 more annotation...
  • The paper spoke with an intelligence lawyer who continued to emphasize that this program focuses beyond the US, which seems to prevent the data from falling under the Fourth Amendment (unreasonable search and seizures).
1 - 20 of 27 Next ›
Showing 20 items per page