TECHNOLOGY: Mediasaurus

Friday, October 2, 2009

http://www.wired.com/wired/archive/1.04/mediasaurus.html

Mediasaurus
Today’s mass media is tomorrow’s fossil fuel. Michael Crichton is mad as hell, and he’s not going to take it anymore.
By Michael Crichton

*** begin quote ***

The extreme positions of the Crossfire Syndrome require extreme simplification – framing the debate in terms that ignore the real issues. For example, when I watch Crossfire, or Nightline, or MacNeil-Lehrer, I often think, wait a minute. The real issue isn’t term limits; it’s campaign finance reform. The real issue isn’t whether a gasoline tax is regressive, it’s national security – whether we’d prefer to go back to war in the Gulf instead of reducing oil consumption by taxing it more heavily, as every other nation does. The real issue isn’t whether the United States should have an industrial policy, it is whether the one we have – no policy is a policy – serves us well. The issue isn’t whether Mickey Kantor is a protectionist, it’s how should the US respond to its foreign competitors.

*** end quote ***

He hits the nail on the head. The media is just SO biased that it distracts from the data, info, knowledge, and wisdom from the “story”.

It’s a long article but it does highlight how bias and technology are making the “media” obsolete.

Interesting?

How do we capitalize on the replacement?

# # # # #


TECHNOLOGY: Protecting children on the internet

Thursday, October 1, 2009

If the Internet Service Providers had their heads screwed on straight, if the FCC or FTC was REALLY interested in protecting children, we could have rock solid “age” verification. No one can “prove” their age on the net now. But the ISPs could do it.

They “own” the customer relationship. They issue their paying customer a user id and password for their account. So immediately, we have a defined adult. (If a child steals their parent’s credit card to buy internet access, the parent will know it when the bills come in.) The ISPs are sure they are going to get paid.

They can then provide the mechanism for their Customer to define identiies for others. I’d suggest email addresses. If forced, and / or enabled by law, the ISPs could allow their Customer to define: Child, Tween, or Teen.

Then, a stylized form of communication between the Web Site Providers and the Internet Service Providers can occur.

The user, who may or may not be underage, registers at a website with their ISP email address. The WSP sends the request to the ISP. The ISP notifys the Credit Card Customer. Who agrees or disagrees. The ISP then communicates “Teen, Tween, or Child” to the ISP.

Problem solved!

# # # # #


SERVICE: Google Alerts become more usable

Wednesday, September 30, 2009

By using Google search with the site option, you can get your “favorite author” feed from sites that don’t directly support it.

Steps:

  • Get your Google search string the way you need it. Example: “Stossel site:wnd.com”
  • Get over to Google Alerts and set one up for email.
  • Save it.
  • Change the alert from email to feed.
  • Subscribe to it in Google Reader.
  • Enjoy

Pretty neat.

# # # # #


TECHNOLOGY: Cheap books everywhere when needed

Saturday, September 26, 2009

http://www.ft.com/cms/s/0/0c1302e2-a3eb-11de-9fed-00144feabdc0.html

Google to offer hard copies of books
Financial Times [UK]

*** begin quote ***

“After five years of scanning books electronically, Google is finally entering the print publishing business for the first time. Through an arrangement with a printing company announced yesterday, Google will offer 2m out-of-copyright books that can be picked up or shipped from libraries, universities and other spots around the world. It has struck the deal with On Demand Books, makers of the Espresso Book Machine, which can print a 300-page book in less than five minutes, complete with a cover and a bound edge.” (09/17/09)

*** end quote ***

As I know, Print On Demand makes it possible for ANYONE to publish a book!

We are truly entering the age of enlightenment.

It’s hard to imagine what this will mean to the third world countries. 8 bucks is a lot of money. But, it’s astounding to think what’s possible.

# # # # #


TECHNOLOGY: Email is worse than a postcard!

Saturday, September 26, 2009

http://www.americanthinker.com/blog/2009/09/whoa_nbc_producer_to_antiacorn.html

September 26, 2009
Whoa; NBC Producer to anti-ACORN group employee: ‘Bite me, Jew boy?’
Rick Moran

*** begin quote ***

When Stone received an email urging Congress to defund ACORN from Alex Rosenwald, director of media outreach for Americans for Limited Government, the following sentence came back to Rosenwald from Stone’s account: “Bite me, Jew Boy!”

*** and ***

   But Stone’s response email-provided to POLITICO-did not have any anti-Semitic comment. In fact, it had just one line: “Take me off this list!” (There are also subtle differences, including number of dashes, between the two emails).

   “Somebody, on the other end, I’m assuming, took the return stamp from the email and then put in this hateful message,” Capus said. “I don’t know who did it. It’s outrageous to suspect that somebody from NBC News would do it.”

*** end quote ***

I always rant that email should be secured. It’s the vendors, the ISPs, and the technology community that has to do it. We can’t leave it to the users.

Like IPv6, the technology industry has been sitting on its hands for decades. FIgure it out boys and girls!

(Or should that be girls and boys. Do girls come before boys? Or is always alpha order?)

We have had the capability to do encryption for stuff for eons. PGP can encrypt messages. At the very least it can give you a hash of the message that proves if it’s been tampered with!

Then we’d completely avoid these little distractions about “who did it”.

Time has come for the technology folks to get their act together.

# # # # #


TECHNOLOGY: Google advertising Chrome on TV?

Saturday, September 26, 2009

Just saw a Google ad for Chrome on GSN TV today now!

Huh?

# # # # #


SOFTWARE: MAC OSX 10.6.1 MAIL loses its mind

Monday, September 21, 2009

It begins reloading all mail again.

Argh!

# # # # #


SERVICE: Google password change forced

Friday, September 18, 2009

Google forced me to change a password based on “suspicious activity”.

It gave me no further information.

Google doesn’t enforce three strikes and your out so what use is a password!

# # # # #

And, next time into GMAIL it asked to verify a secondary email address.

Perhaps, three strikes and you’re out is coming.

# # # # #


TECHNOLOGY: OLPC has roll out problems — no leadership!

Thursday, September 17, 2009

http://radian.org/notebook/sic-transit-gloria-laptopi

*** begin quote ***

Date: Sat, 05 Sep 2009 05:46:36 +0800
From: jidanni
Subject: OLPC: Sic Transit Gloria Laptopi

…there was no one hired to work on deployment while I was at OLPC, with Uruguay’s and Peru’s combined 360,000-laptop rollout in progress. I was parachuted in as the sole OLPC person to deal with Uruguay, and sent to Peru at the last minute. And I’m really good at thinking on my feet, but what the sh*t do I know about deployment? Right around that time, Walter was demoted and theoretically made the “director of deployment,” a position where he directed his expansive team of — himself. Then he left, and get this: now the company has half a million laptops in the wild, with no one even pretending to be officially in charge of deployment. “I quit,” Walter told me on the phone after leaving, “because I can’t continue to work on a lie.”

*** end quote ***

How can you have a roll out without leadership?
# # # # #


SERVICE: Cloud Computing has risks

Sunday, September 13, 2009

http://www.techcrunch.com/2009/09/10/yeah-ok-so-facebook-punkd-us/#comment-2977957

Yeah Ok, So Facebook Punk’d Us by Michael Arrington on September 10, 2009

*** begin quote ***

Today that changed. They punk’d us, and we fell for it. Hard.

*** end quote ***

With all due respect to some good clean fun, it does make a “teachable moment”.

(1) Cloud computing is not without its risks. You can’t run “production quality” “books and records” type applications on services that you don’t control.

(2) Not everything is as it appears on the internet. The bad guys have the ability to hide behind a “web front”, stand in the middle of your conversation, and read all your traffic.

(3) Without end to end encryption, nothing is private. Every packet is a post card.

(4) In the desire for a scoop, confirm that others have seen the phenom you’re scooping about. Nothing is ever as good or as bad as it is reported on the internet.

(5) TANSTAFL! Every once in while, someone plays a practical on you. It’s the cost of doing business.

Hmmm!

# # # # #


SERVICE: Amazon updates their sales process

Friday, September 11, 2009

AMAZON changes it’s sales process

*** begin quote ***

Dear Seller,

You recently signed up for Charge When Ship in your Seller Account.

With Charge When Ship:

* When you ship an order, you confirm the shipment, and provide shipping information in Manage Orders. If you have a Pro Merchant Subscription you can also use text-file feeds for this.

* We charge the buyer after you confirm a shipment, rather than when the order was placed, providing a better buyer experience.

* To keep buyers informed about their shipments, we display the shipping information in the buyer’s Amazon account, and we also send the buyer an e-mail notification with all the shipping information.

* You can cancel an order, if necessary, instead of confirming the shipment, and then we will not charge the buyer at all and you will not have to issue a refund.

We think you will find managing your orders is easier and more efficient with Charge When Ship. If you have questions, contact us using the “By e-mail” or “By phone” button in the Seller Support box found on the right side of seller Help pages.

Thank you for selling on Amazon.com

===========================================================

IMPORTANT REMINDER

===========================================================

For each order you ship, you must confirm shipment within 30 days of the date the order was placed. Any order that has not been confirmed as shipped will be automatically cancelled after 30 days. This means we will not charge the customer and you will not be paid for the order.

—————————————-

HOW TO CONFIRM SHIPMENTS

—————————————-

You can confirm shipments easily in Manage Orders:

1. In your Seller Account, under the “Manage Your Orders” heading, click “View your orders” to find the order you want to confirm.

2. Click the “Confirm shipment” button next to the order (or below the order if you are looking at an order detail page).

3. Select the Ship Date and Carrier (such as USPS) from the drop-down lists.

4. Enter the Shipping Service (such as Ground) and the Tracking ID, if any (supplied by the carrier).

5. Click the “Confirm shipment” button.

For information on using a Shipping Confirmation feed to confirm shipment of multiple orders at once, follow this path in Amazon.com Help:

Selling at Amazon.com > Confirming Shipment > How to Confirm Shipment of Multiple Orders at the Same Time

———————————-

HOW TO CANCEL ORDERS

———————————-

If you are unable to ship an order, you can cancel it easily in Manage Orders:

1. In your Seller Account, under the “Manage Your Orders” heading, click “View your orders” to find the order you want to cancel.

2. Click the “Cancel order” button next to the order (or below the order if you are looking at an order detail page).

3. Select the appropriate reason, and then click Submit.

For information on cancelling orders using an Order Cancellation feed, follow this path in Amazon.com Help:

Selling at Amazon.com > Confirming Shipment > How to Cancel Orders

# # # # #


SOFTWARE: Apple’s calendar is an “island”

Friday, September 11, 2009

Not that outlook is much better, but you can import to it.

iCal is supposed to, but try to figure out the format.

Hmmm!

# # # # #


TECHNOLOGY: We’re at war against foreign powers and criminals

Wednesday, September 9, 2009

http://www.newsfactor.com/story.xhtml?story_id=0020002HDYSG&page=1

World War 3.0: 10 Critical Trends for Cybersecurity
September 2, 2009 7:22AM

*** begin quote ***

The Internet, private networks, VPNs, and a host of other technologies are quickly weaving the planet into a single, massively complex “infosphere.” These connections cannot be severed without overwhelming damage to companies and even economies. Yet, they represent unprecedented vulnerabilities to espionage and covert attack.

*** end quote ***

Bottom line: We care complacent. We’d better deploy IPv6 for its improved security now. Next, we better start encrypting everything in sight.

# # # # #


SOFTWARE: Snow Leopard, ILife09, and IWork09

Monday, September 7, 2009

RE: SNOW LEOPARD

Mine went smooth. Don’t believe the estimates it spouts. I got the PACK with Snow, iwork09, and ilife09. Took about an hour each. Only surprise was TextExpander and Scrivner needed a refresh. Only grip is that it left iwork08 and iwork09 behind. Other that that it was a non-event.

# # # # #


SERVICE: BLUEHOST problem; but whose?

Saturday, September 5, 2009

#DEN-45763-514


*** begin quote ***

Unfortunately, your server is still under a DDoS attack and will move extremely slowly (if at all). As soon as the attack discontinues or is otherwise resolved, the server will function normally again. A DDoS attack is essentially a terrorist attack on the server, usually done by a hacker getting viruses in thousands of computers and having them send as many connections as possible, as quickly as possible, to the box.

We are working to reduce the effect of the attack and find out which account is being targeted. At that point we will have to ask that account to find a new host. Unfortunately, we can’t know which account is being attacked without extensive steps, as the IP Address on the server is Shared.

DDoS attacks can last anywhere from hours to days.

Your data is safe. Just currently inaccessible.

If you’d like to learn more about this kind of terrorist attack, check

*** end quote ***


SOFTWARE: FASTDIAL lost all my settings

Friday, September 4, 2009

Argh!

And, I don’t know where it kept them.

Argh!

And I didn’t keep a list of them.

Argh!

# # # # #


TECHNOLOGY: Google doesn’t index comments

Thursday, September 3, 2009

Interesting. Google, the be all and end all of internet search, does NOT index comments. Very interesting.

Leaves an opening for a competitor.

# # # # #


LINKEDIN: Scammer sighted on LinkedIn

Saturday, August 29, 2009

OVER ON Vincent Wright’s MyLinkedinPowerForum

*** begin quote ***

I googled him and found out that in addition of being a LI member (http://www.linkedin.com/pub/mr-isaac-howells/13/7b1/35 and http://www.linkedin.com/pub/isaac-howells/12/b23/944 where you will notice that the same person works in two different African countries and has no connections), I also found out the Spanish based version of http://www.fraudwatchers.org/forums/index.php where warnings have been issued about this person being part of a worldwide fraud attempt.

*** end quote ***

The scammers “DO” social networking too. Forewarned is forearmed!
# # # # #


TECHNOLOGY: Google Books and The Internet Archive

Friday, August 28, 2009

http://www.techcrunch.com/2009/08/22/nsfw-say-what-you-like-about-the-google-books-kool-aid-but-it-tastes-much-better-than-microsofts-sour-grapes/#comment-2942625

Say what you like about the Google Books Kool-Aid, but it tastes much better than Microsoft’s sour grapes
by Paul Carr on August 22, 2009

*** begin quote ***

But one aspect of the settlement wasn’t so uncontroversial, and that was the issue of so-called ‘orphan works’ – books which are still in copyright but where the identity of the copyright owner is, for one reason or another, unclear. As part of the settlement, the book industry agreed that, with certain restrictions, Google could scan orphan works without being held liable for breach of copyright claims if the rights owner subsequently came forward. In return Google agreed to create an independent (and open to all) rights registry letting authors of orphaned stake their copyright claim.
At first glance, the deal over orphaned works seems as reasonable as the rest of the settlement – these are books for which no-one is being paid and which otherwise would be hidden away in libraries and second hand bookstores. But still Google’s competitors are crying foul.
The Internet Archive is particularly annoyed, arguing that they too are scanning millions of books for the public good, but without any blanket copyright protection for orphaned works. And so, through a group they call Open Content Alliance, they hope to pressure the Department of Justice to extend the terms of the settlement to everyone, not just Google.
For the other companies joining the Alliance – including Microsoft, Yahoo and Amazon – there are more obvious and nakedly commercial reasons to oppose the settlement. But that doesn’t make their objections less valid. Back in April, Erick Schonfeld wrote a passionate – and compelling – argument for the immunity to apply to everyone so that Google wouldn’t have a monopoly position where they could effectively charge whatever they like for downloading digital copies of orphaned works.
*** end quote ***

It would seem we need a law change. If you even believe in “imaginary property”. (It seems absurd to call what the congress critters pass “a law”. Now the Law of Gravity; that’s a LAW!)

When a book goes OOP (Out Of Print), or is otherwise “hidden” from the public, it should enter the public domain. Wasn’t the purpose of copyright law to encourage sharing of “intellectual (imaginary) property”? When that sharing ceases, shouldn’t the protection?

Seems only fair to me.

# # # # #


TECHNOLOGY: Cloud computing held hostage to politics

Tuesday, August 25, 2009

http://www.techcrunch.com/2009/08/21/flickr-v-free-speech-where-is-the-courage/

Flickr v. Free Speech. Where Is The Courage?
by Michael Arrington on August 21, 2009

*** begin quote ***

Flickr really stepped in it this time. And they’ve sparked a free speech and copyright fascism debate that is unlikely to cool down any time soon.

*** and ***

People are angry over the takedown. There are lots of pictures mocking President Bush on a Time Magazine cover on Flickr that haven’t been removed. And of the Heath Ledger Joker character.

*** end quote ***

The “big government socialists” — regardless of party — hide their prejudices in law. We can’t trust “big business”; any more than we can trust “big gooferment”. They are in a symbiotic relationship. Both are big parasites on the poor serf just trying to make a life. Business serves us; companies I’m not so sure of. When they get big or when their liability is limited, that’s when the trouble begins.

Expecting free speech isn’t in their vocabulary.

Cloud computing gives “them” power over content.

# # # # #


TECHNOLOGY: Why do I have to …

Thursday, August 20, 2009

… put in “state” from a pick list and zip code?

Do the programmers ever think about the user interface?

# # # # #


TECHNOLOGY : Lawrence Lessig on the Google Book Search Settlement – “Settlements: Static goods, dynamic bads”

Sunday, August 9, 2009

MediaBerkman : Lawrence Lessig on the Google Book Search Settlement – “Settlements: Static goods, dynamic bads”.

# – # – #

Prof Larry is one of those folks I consider a “internet conscience”. When he speaks, I listen. He’s usually right; usually thought provoking.Besides what else do you have to ddo on a dreary Sunday morning?

# # # # #


TECHNOLOGY: Stories from the Enola Gay

Saturday, August 8, 2009

http://www.mentalfloss.com/blogs/archives/23208

Dropping the Bomb: Stories from the Enola Gay
  from mental_floss Blog by Ransom Riggs

*** begin quote ***

Ms. Akiko Takakura, who was less than 1,000 feet from Ground Zero in Hiroshima when the bomb was dropped

Many people on the street were killed almost instantly. The fingertips of those dead bodies caught fire and the fire gradually spread over their entire bodies from their fingers. A light gray liquid dripped down their hands, scorching their fingers. I, I was so shocked to know that fingers and bodies could be burned and deformed like that. I just couldn’t believe it. It was horrible. And looking at it, it was more than painful for me to think how the fingers were burned, hands and fingers that would hold babies or turn pages, they just, they just burned away.

For a few years after the A-bomb was dropped, I was terribly afraid of fire. I wasn’t even able to get close to fire because all my senses remembered how fearful and horrible the fire was, how hot the blaze was, and how hard it was to breathe the hot air. It was really hard to breathe. Maybe because the fire burned all the oxygen, I don’t know. I could not open my eyes enough because of the smoke, which was everywhere. Not only me but everyone felt the same. And my parts were covered with holes.

*** end quote ***

It is hard to imagine one human could do this to another. It takes a gooferment to be so heartless.

# # # # #


TECHNOLOGY: MSFT patents?

Thursday, August 6, 2009

http://yro.slashdot.org/story/09/08/06/2322209/Microsoft-Patents-XML-Word-Processing-Documents?from=rss

Your Rights Online: Microsoft Patents XML Word Processing Documents on Thursday August 06, @07:37PM
Posted by timothy on Thursday August 06, @07:37PM
from the no-problems-there-nothing-to-worry-about dept.

*** begin quote ***

On Tuesday, Microsoft was granted U.S. Patent No.7,571,169 for its ‘invention’ of the Word-processing document stored in a single XML …

*** and ***

the biggest question raised by this patent is: How in the world was it granted in light of the 40-year history of document markup languages?

*** end quote ***

What kind of “barbara streisand” is this?

# # # # #


SERVICE: Voice out from text

Thursday, August 6, 2009

http://tts.imtranslator.net/566L

Free Text to Speech software online for English

# – # – #

Entertaining?

# # # # #


TECHNOLOGY: Cloud Computing; who controls what?

Saturday, August 1, 2009

http://abcnews.go.com/International/Story?id=8181453&page=2

Big Brother Is Watching Your Blackberry
With Every High-Tech Gadget We Buy, We Give up a Little More of our Privacy
By CHRISTIAN STOCKER
July 27, 2009

*** begin quote ***

A dramatic example of Zittrain’s thesis occurred recently in the United Arab Emirates. Wired magazine and The Register reported how the local Internet provider, Etisalat, sent out a software update to around 145,000 of their Blackberry customers. However, thanks to a software glitch that caused the battery power in all the affected Blackberrys to be drained, it was discovered that the software update also included surveillance software.

The spying part of the software was switched off — but all it needed was a command from the Internet server and the Blackberrys would send e-mail and text messages in an encrypted form to an unknown recipient. IT experts believe the intended recipient was local security forces. To date, Etisalat has not made a statement in response to the allegations. The company’s sole response has been a curt press release stating that the reason for the update was simply “to improve the service quality.”

*** end quote ***

Clearly, we must be very circumspect about “cloud computing”. We don’t control the applications, the data, and in some case not even the local hardware.

No, no thanks, when I buy my copy of George Orwell, you don’t get to take it away from me.

Argh!

# # # # #