×
The Media

How Publishers Learned To Stop Worrying and Love Zite's Aggregator 22

waderoush writes "In March 2011, personalized-magazine startup Zite got a cease-and-desist letter from a group of 11 media giants outraged by the way Zite's popular iPad app 'misappropriated' their news articles. By August 2011, Zite had become part of CNN, which is owned by Time Warner, one of the organizations behind the C&D letter. Zite's brief clash with the media establishment, followed by its swift assimilation into the same establishment, is emblematic of a larger story unfolding in the media business: the grudging acknowledgement by publishers that readers want to access their content in new ways. In this article Zite CEO Mark Johnson explains how the startup mollified publishers (by presenting articles in 'Web view' mode rather than a stripped-down 'reader mode'), why CNN bought the company, and how it strives to make reading more enjoyable while still respecting publishers' business models."
Government

Government Should Ban Skinny Models To Curb Anorexia, Say Researchers 676

smoothjazz writes "Governments are justified to prevent very skinny models from walking the catwalk and ban photographs and advertisements suggesting that extreme thinness is attractive, according to a group of researchers who found that social and cultural environment influences on young women is largely responsible for the spread of chronic eating disorder."
Transportation

Car Hacking Concerns On the Rise 95

Pat Attack writes "I think most of the people who read Slashdot know that if it has circuitry, it can be hacked. Well, the good folks over at CNN have an article about the potential for your car to be hacked. This article lists the potential damage that could be done, proof of concept work, as well as a few scary scenarios. 'With vehicles taking up to three years to develop, [security strategist Brian Contos] says manufacturers will struggle to keep abreast of rapidly-evolving threats unless they organize regular software updates. Instead, he says, any installed technology should be given a so-called "white list" of permissible activities beyond which any procedures are blocked.' My mom reads CNN and is a Luddite. I expect to hear from her today. She'll probably tell me my new car with bluetooth is unsafe."
Sony

Sony To Delete Virtual Goods 171

New submitter dommer2029 writes "A few years back, Sony bought up a small company running an online collectible card game called Star Chamber: The Harbinger Saga. Two days ago, they announced that the servers will be shutting down on March 29, 2012. All of our virtual collectible cards? Poof. It's not surprising — the user base is small and dwindling — but it's proof that any server-based digital goods you 'own' can vanish on a corporation's whim."
Crime

In Theory And Practice, Why Internet-Based Voting Is a Bad Idea 218

A few countries, like Estonia, have gone for internet-based voting in national elections in a big way, and many others (like Ireland and Canada) have experimented with it. For Americans, with a presidential election approaching later this year, it's a timely issue: already, some states have come to allow at least certain forms of voting by internet. Proponents say online elections have compelling upsides, chief among them ease of participation. People who might not otherwise vote — in particular military personnel stationed abroad, but many others besides — are more and more reached by internet access. Online voting offers a way to keep the electoral process open to them. With online voting, too, there's no worry about conventional absentee ballots being lost or delayed in the postal system, either before reaching the voter or on the way back to be counted. The downsides, though, are daunting. According to RSA panelists David Jefferson and J. Alex Halderman, in fact, they're overwhelming. Speaking Thursday afternoon, the two laid out their case against e-voting.

(Read more for more, and look for a video interview with Halderman soon).
Privacy

Startup Wants To Peek Through Your Home's Wired Cameras 186

alphadogg writes "The little cameras in your home are multiplying. There are the ones you bought, perhaps your SLR or digital camera, but also those that just kind of show up in your current phone, your old phone, your laptop, your game console, and soon your TV and set-top box. Varun Arora, founder of startup GotoCamera in Singapore, wants you to turn them all on and let his company's algorithms analyze what they show, then sell the results as marketing data, in a sort of visual version of what Google and other firms do with search results and free email services."
Games

Video Games: Goods Or Services? 124

silentbrad points out an article about the gradual shift of video games from being 'goods' to being 'services.' They spoke with games lawyer Jas Purewal, who says the legal interpretation is murky: "If we're talking about boxed-product games, there's a good argument the physical boxed product is a 'good,' but we don't know definitively if the software on it, or more generally software which is digitally distributed, is a good or a service. In the absence of a definitive legal answer, software and games companies have generally treated software itself as a service – which means treating games like World of Warcraft as well as platforms like Steam or Xbox LIVE as a service." The article continues, "The free-to-play business model is particularly interesting, because the providers of the game willingly relinquish direct profits in exchange for greater control over how players receive the game, play it, and eventually pay for it. This control isn't necessarily a bad thing either. It can help companies to better understand what gamers want from their games, and done properly such services can benefit both gamers and publishers. Of course, the emphasis here is on the phrase 'done properly.' Such control can easily be abused."
Government

Voting System Test Hack Elects Futurama's Bender To School Board 210

mr crypto writes with this quote from El Reg: "In 2010 the Washington DC election board announced it had set up an e-voting system for absentee ballots and was planning to use it in an election. However, to test the system, it invited the security community and members of the public to try and hack it three weeks before the election. 'It was too good an opportunity to pass up,' explained Professor Alex Halderman from the University of Michigan. 'How often do you get the chance to hack a government network without the possibility of going to jail?' With the help of two graduate students, Halderman started to examine the software. Despite it being a relatively clean Ruby on Rails build, they spotted a shell injection vulnerability within a few hours. They figured out a way of writing output to the images directory (PDF) on the compromised server, and of encrypting traffic so that the front-end intrusion detection system couldn't spot them. The team also managed to guess the login details for the terminal server used by the voting system. ... The team altered all the ballots on the system to vote for none of the nominated candidates. They then wrote in names of fictional IT systems as candidates, including Skynet and (Halderman's personal favorite) Bender for head of the DC school board."
Google

Google: Best Adaptation of a Novel To a Patent? 42

theodp writes "The USPTO's Thursday publication of Google's patent application for Inferring User Interests was nicely-timed, coinciding with what ZDNet called Google's privacy policy doomsday. The inventors include Google Sr. Staff Research Scientist Shumeet Baluja, the author of The Silicon Jungle, a cautionary tale of data mining's promise and peril, which Google's Vint Cerf found 'credible and scary.' No doubt some will feel the same about Beluja's patent filing, which lays out plans for mining 'user generated content, such as user interests, user blogs, postings by the user on her or other users' profiles (e.g., comments in a commentary section of a web page), a user's selection of hosted audio, images, and other files, and demographic information about the user, such as age, gender, address, etc.'"
Electronic Frontier Foundation

Video Why is the EFF at the RSA Security Conference? (Video) 34

Timothy asked Electronic Frontier Foundation (EFF) International Outreach Coordinator Maira Sutton that very question. Watch the video for her answer. It turns out that the EFF has lots of friends among RSA ("the most comprehensive forum in information security") attendees, and has some very good reasons to be there, in the midst of companies and government agencies that Timothy thinks might not only violate your privacy once in a while, but (gasp!) might even enjoy it.
Government

Open Ministry Crowdsources Laws In Finland 181

First time accepted submitter emakinen writes "The new Citizens' Initiative service started today in Finland. On the Open Ministry website, anyone can present an idea for a law or initiative. If the idea wins enough support, the ministry's volunteer workers will work on it and turn it into a presentable bill for the MPs to chew over. If 50,000 citizens of voting age agree on a bill Parliament has to take it up."
Government

RIAA CEO Hopes SOPA Protests Were a "One-Time Thing" 441

hapworth writes "After posting a controversial op-ed in The New York Times saying Wikipedia and Google 'misinformed' the public about SOPA and PIPA, Cary Sherman, CEO of the RIAA said in an interview yesterday that he hopes the SOPA protests were a 'one-time experience.' He also said that Wikipedia and Google users were duped into thinking SOPA was a bad bill because they assume "if it comes from these sources, it must be true." In another hilarious comment, Sherman blames the Internet for making it impossible for Congress to get out its side of the story, and for not spreading information with the same 'clarity and integrity' of broadcast journalists."
Your Rights Online

Is Stratfor a "Joke"? 211

daveschroeder writes with an opinion piece that seems to differ from the usual thinking on the Wikileaks release of Stratfor emails: "Max Fisher writes in The Atlantic: 'The corporate research firm has branded itself as a CIA-like "global intelligence" firm, but only Julian Assange and some over-paying clients are fooled. [...] The group's reputation among foreign policy writers, analysts, and practitioners is poor; they are considered a punchline more often than a source of valuable information or insight. [...] So why do Wikileaks and their hacker source Anonymous seem to consider Stratfor, which appears to do little more than combine banal corporate research with media-style freelance researcher arrangements, to be a cross between CIA and Illuminati? The answer is probably a combination of naivete and desperation.'"
China

US, China Face Mutually Assured Destruction In Cyberwar 110

chicksdaddy writes with a tidbit from the RSA conference. From the article: "A panel of security and policy experts speaking at the RSA Conference in San Francisco on Wednesday said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk of an all-out cyberwar is remote, and that the U.S. still holds many of the cards. Rather than trying to deliver a knock-out cyberwar capability, the U.S. should embrace the Cold War notions of containment and mutually assured destruction with advanced nations like China and Russia. Tried and true methods to win security from cyberattacks include international diplomacy, multilateral agreements that clarify the parameters for peaceful and hostile cyberactions and — of course — a strong offensive capability."
Censorship

Photographing Police: Deletion Is Not Forever 482

Geoffrey.landis writes "The courts have now ruled that the public has the right to videotape the police in the performance of their duties. Of course, that doesn't stop the police from harassing people who do so — even journalists, who sometimes have their cameras confiscated. As it turns out, though, they're not always very knowledgeable about how deletion works. I would say that erasing, or attempting to erase, a video of police arresting somebody illegally (How can a journalist be charged with 'resisting arrest' when he was not being arrested for anything other than resisting arrest?) is a clear case of destruction of evidence by the officers. Destroying evidence is obstruction of justice. That's illegal. Why haven't these police officers been arrested?"
Education

Ann Arbor Schools Want $45M For Tech, Partly For Computers To Run Google Docs 248

An anonymous reader writes "The Ann Arbor Public Schools defended their request for a $45 million bond for new computers by claiming that Apple eMacs aren't good enough for their Advanced Journalism class. A teacher told reporters that new PCs are needed to run WordPress, Google Docs, and Adobe InDesign CS6. WordPress and Google Docs are server-based applications that can be accessed with nearly any web browser. InDesign CS6 has not been released yet and its system requirements are unknown. As a web developer, I am impressed by the online newspaper published by the journalism class, but I question the need for new hardware. The district previously claimed that the old computers couldn't run its standardized testing software, although they far surpass the vendor's specifications. Does modern education really require cutting-edge computers, or are schools screaming 'think of the children' to win over tech-illiterate voters?" Whatever the answer to that question, exaggerated system requirements aren't the only driving force; the $45 million bond sought would not be dedicated only to replacing journalism program computers, note; it would also be used to fund other infrastructure upgrades, including some lower-tech updates, like new sound amplifiers in the district's classrooms. Ann Arbor schools' web site says that the district has (as of 2010, at least) 16,440 students. What are tech outlays like in the public schools where you live?
Canada

US Shuts Down Canadian Gambling Site With Verisign's Help 354

First time accepted submitter ausrob writes "Domain seizures are nothing new, but this particular case is interesting. The Department of Homeland Security has seized a domain name registered outside of the U.S., by individuals who are not American citizens, and who registered with a Canadian registrar. From the article: 'The ramifications of this are no less than chilling and every single organization branded or operating under .com, .net, .org, .biz etc needs to ask themselves about their vulnerability to the whims of U.S. federal and state lawmakers (not exactly known their cluefulness nor even-handedness, especially with regard to matters of the internet).'"
Google

Google Privacy Policy Could Violate EU Law 135

judgecorp writes "Google's new unified privacy policy could violate EU law, according to objections. The French data regulator warns that the policy will infringe users' privacy by building a single online profile. Commission Nationale de L’informatique et Des Libertes (CNIL) has expressed “deep concerns” about the policy and its adherence to the European Data Protection Directive."
Your Rights Online

"Irish SOPA" Signed Into Law Despite Resistance 129

First time accepted submitter cupantae writes "Despite the protests of over 80,000 Irish people, Junior Minister Seán Sherlock has confirmed that the controversial statutory instrument that reinforces online copyright laws in Ireland has been signed into law. The statutory instrument will make it possible for copyright holders to seek court injunctions against companies such as internet service providers or social networks whose systems are hosting copyright-infringing material. This comes in the wake of the music industry bullying the Irish government."
Government

Wikileaks and Anonymous Join Forces Against US Intelligence Community 268

pigrabbitbear writes "The most recent bombshell of confidential documents dropped by infamous watchdog organization Wikileaks is already looking to have an enormous impact on our understanding of government security practices. Specifically, intimate details on the long-suspected fact that the U.S. has been paying a whole lot of money to have private corporations spy on citizens, activists and other groups and individuals on their ever-expanding, McCarthy-style naughty list. But perhaps more importantly, the docs demonstrate something very interesting about the nature of U.S. government intelligence: They haven't really got much of it."

Slashdot Top Deals