Welcome to Microsoft's World Wide Web Server!
Where do you want to go today?
If your browser doesn't support images, we have a text menu as well.
Please read full and follow at:
If your browser doesn't support images, we have a text menu as well.
Is the battery in your smartphone being used to track your online activities? It might seem unlikely, but it's not quite as farfetched as you might first think. This is not a case of malware or hacking, but a built-in component of the HTML5 specification. Originally designed to help reduce power consumption, the Battery Status API makes it possible for websites and apps to monitor the battery level of laptops, tablets, and phones. A paper published by a team of security researchers suggests that this represents a huge privacy risk. Using little more than the amount of power remaining in your battery, it is possible for people to be identified and tracked online. As reported by The Guardian, a paper entitled The Leaking Battery by Belgian and French privacy and security experts say that the API can be used in device fingerprinting.
Read more of this story at Slashdot.
Using future versions of Firefox as a secure... Safe browser is over Those who don't want to see the ads can select an option to make then go away. The change to in-Firefox ads will hit the beta of the browser "soon," said Darren Herman, Mozilla's vice president of content service, in a Thursday blog post. Suggested Tiles will reach the stable branch of Firefox this summer.
Mozilla today announced an expansion and rebranding of its in-browser advertisements, now dubbed "Suggested Tiles," that will by default show in the new tab page of all Firefox users.
Those who don't want to see the ads can select an option to make then go away.
The change to in-Firefox ads will hit the beta of the browser "soon," said Darren Herman, Mozilla's vice president of content service, in a Thursday blog post. Suggested Tiles will reach the stable branch of Firefox this summer.
Conducting both surveys and EEG scans, Microsoft has published a study suggesting that the average attention span has fallen precipitously since the start of the century. While people could focus on a task for 12 seconds back in 2000, that figure dropped to 8 seconds in 2013 (about one second less than a goldfish). Reportedly, a lot of that reduction stems from a combination of smartphones and an avalanche of content. The study found also a sunny side: while presence of technology is hurting attention spans overall, it also appears to improve person's abilities to both multitask and concentrate in short bursts.
Read more of this story at Slashdot.
Computerworld: The man credited with creating Moore's Law can finally talk about it. "For the first twenty years I couldn't utter the term 'Moore's Law'," said Gordon Moore, the chairman emeritus of Intel on Monday night. "It was embarrassing. I finally got accustomed to it enough that I can say it with a straight face." Intel honored Moore at an event in San Francisco on Monday night for his famous axiom, which has helped guide the evolution of technology for 50 straight years. Even Moore himself appeared amazed at the implications.
"For the first twenty years I couldn't utter the term 'Moore's Law'," said Gordon Moore, the chairman emeritus of Intel on Monday night. "It was embarrassing. I finally got accustomed to it enough that I can say it with a straight face."
Intel honored Moore at an event in San Francisco on Monday night for his famous axiom, which has helped guide the evolution of technology for 50 straight years. Even Moore himself appeared amazed at the implications.
On the 51st birthday of the BASIC programing language, GE Reports decided it was finally time to give-credit-where-credit-was-long-overdue, reporting thatArnold Spielberg, the 98-year-old father of Hollywood director Steven Spielberg, helped revolutionize computing when he designed the GE-225 mainframe computer. The machine allowed a team of Dartmouth University students and researchers to develop BASIC, which quickly spread and ushered in the era of personal computers. BASIC helped kickstart many computing careers, include those of Bill Gates and Paul Allen, as well as Steve Wozniak and Steve Jobs.
Computerworld Google, Apple and Amazon.com spent record amounts in the first quarter attempting to influence U.S. politicians and policy. Google, which was already the biggest tech lobbyist in Washington, D.C., spent $5.47 million in the first three months of the year, according to a report filed with the Senate Office of Public Records. That made it the fifth biggest federal lobbyist across all industries during the quarter, according to an analysis by Maplight. Google has been steadily increasing the amount it spends to influence the course of policy and law on a range of issues. Since mid-2011, it has spent on average at least a million dollars each month in areas both central to its business, such as online advertising and security, and tangential to it, such as international tax reform and drone technology.
Google, Apple and Amazon.com spent record amounts in the first quarter attempting to influence U.S. politicians and policy.
Google, which was already the biggest tech lobbyist in Washington, D.C., spent $5.47 million in the first three months of the year, according to a report filed with the Senate Office of Public Records.
That made it the fifth biggest federal lobbyist across all industries during the quarter, according to an analysis by Maplight.
Google has been steadily increasing the amount it spends to influence the course of policy and law on a range of issues. Since mid-2011, it has spent on average at least a million dollars each month in areas both central to its business, such as online advertising and security, and tangential to it, such as international tax reform and drone technology.
Computerworld: A vulnerability found in the late 1990s in Microsoft Windows can still be used to steal login credentials, according to a security advisory released Monday. A researcher with security vendor Cylance, Brian Wallace, found a new way to exploit a flaw originally found in 1997. Wallace wrote on Monday the flaw affects any PC, tablet or server running Windows and could compromise as many as 31 software programs. He wrote the flaw was not resolved long ago, but that "we hope that our research will compel Microsoft to reconsider the vulnerabilities." The vulnerability, called Redirect to SMB, can be exploited if an attacker can intercept communications with a Web server using a man-in-the-middle attack.
A researcher with security vendor Cylance, Brian Wallace, found a new way to exploit a flaw originally found in 1997. Wallace wrote on Monday the flaw affects any PC, tablet or server running Windows and could compromise as many as 31 software programs.
He wrote the flaw was not resolved long ago, but that "we hope that our research will compel Microsoft to reconsider the vulnerabilities."
The vulnerability, called Redirect to SMB, can be exploited if an attacker can intercept communications with a Web server using a man-in-the-middle attack.
Read more of this story at Slashdot.
Computerworld: Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which patched it in January. However, it's not clear if the fix closed all avenues for abuse. The application, called Dell System Detect, is offered for download when users click the "Detect Product" button on Dell's support site for the first time. It is meant to help the website automatically detect the user's product -- more specifically its Service Tag -- so that it can offer the corresponding drivers and resources.
A security researcher discovered the flaw in November and reported it to the PC manufacturer, which patched it in January. However, it's not clear if the fix closed all avenues for abuse.
The application, called Dell System Detect, is offered for download when users click the "Detect Product" button on Dell's support site for the first time. It is meant to help the website automatically detect the user's product -- more specifically its Service Tag -- so that it can offer the corresponding drivers and resources.
Please read on at:
Computerworld: More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them. Most of the routers have a "directory traversal" flaw in a firmware component called webproc.cgi that allows hackers to extract sensitive configuration data, including administrative credentials. The flaw isn't new and has been reported by multiple researchers since 2011 in various router models. Security researcher Kyle Lovett came across the flaw a few months ago in some ADSL routers he was analyzing in his spare time. He investigated further and unearthed hundreds of thousands of vulnerable devices from different manufacturers that had been distributed by ISPs to Internet subscribers in a dozen countries.
Most of the routers have a "directory traversal" flaw in a firmware component called webproc.cgi that allows hackers to extract sensitive configuration data, including administrative credentials. The flaw isn't new and has been reported by multiple researchers since 2011 in various router models.
Security researcher Kyle Lovett came across the flaw a few months ago in some ADSL routers he was analyzing in his spare time. He investigated further and unearthed hundreds of thousands of vulnerable devices from different manufacturers that had been distributed by ISPs to Internet subscribers in a dozen countries.
Computerworld Apple on Monday patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser. In a pair of accompanying advisories, Apple noted the FREAK fix as one of several in iOS 8.2 and OS X Yosemite, Mavericks and Mountain Lion. The OS X update was labeled 2015-002 to identify it as a multi-edition fix. "Secure Transport accepted short ephemeral RSA keys, usually used only in export-strength RSA cipher suites, on connections using full-strength RSA cipher suites," Apple stated in both advisories. "This issue, also known as FREAK, only affected connections to servers which support export-strength RSA cipher suites, and was addressed by removing support for ephemeral RSA keys."
Apple on Monday patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser.
In a pair of accompanying advisories, Apple noted the FREAK fix as one of several in iOS 8.2 and OS X Yosemite, Mavericks and Mountain Lion. The OS X update was labeled 2015-002 to identify it as a multi-edition fix.
"Secure Transport accepted short ephemeral RSA keys, usually used only in export-strength RSA cipher suites, on connections using full-strength RSA cipher suites," Apple stated in both advisories. "This issue, also known as FREAK, only affected connections to servers which support export-strength RSA cipher suites, and was addressed by removing support for ephemeral RSA keys."
The tool, dubbed Reconnect, was released last week by Egor Homakov, a researcher with security firm Sakurity. It takes advantage of a cross-site request forgery (CSRF) issue in Facebook Login, the service that allows users to log in on third-party sites using their Facebook accounts.
Homakov disclosed the issue publicly on his personal blog in January 2014, after Facebook declined to fix it because doing so would have broken compatibility with a large number of sites that used the service.
Bill Maris has $425 million to invest this year, and the freedom to invest it however he wants. He's looking for companies that will slow aging, reverse disease, and extend life. "If you ask me today, is it possible to live to be 500? The answer is yes," Bill Maris, president and managing partner of Google Ventures, said one January afternoon in Mountain View, California.
Google Ventures has close to $2 billion in assets under management, with stakes in more than 280 startups. Each year, Google gives Maris $300 million in new capital, and this year he'll have an extra $125 million to invest in a new European fund. That puts Google Ventures on a financial par with Silicon Valley's biggest venture firms, which typically put to work $300 million to $500 million a year. According to data compiled by CB Insights, a research firm that tracks venture capital activity, Google Ventures was the fourth-most-active venture firm in the U.S. last year, participating in 87 deals.
Google has spent hundreds of millions of dollars backing a research center, called Calico, to study how to reverse aging, and Google X is working on a pill that would insert nanoparticles into our bloodstream to detect disease and cancer mutations.
A five-year-old Microsoft patch for the .LNK vulnerability exploited by Stuxnetfailed to properly protect Windows machines, leaving them exposed to exploits since 2010. Microsoft today is expected to release a security bulletin, MS15-020, patching the vulnerability (CVE-2015-0096). It is unknown whether there have been public exploits of patched machines. The original LNK patch was released Aug. 2, 2010. "That patch didn't completely address the .LNK issue in the Windows shell, and there were weaknesses left behind that have been resolved in this patch," said Brian Gorenc, manager of vulnerability research with HP's Zero Day Initiative. Gorenc said the vulnerability works on Windows machines going back to Windows XP through Windows 8.1, and the proof of concept exploit developed by Heerklotz and tweaked by ZDI evades the validation checks put in place by the original Microsoft security bulletin, CVE-2010-2568.
Read more of this story at Slashdot.
Canonical, through John Zannos, VP Cloud Alliances, has proudly announced that the first ever Microsoft Azure hosted service will be powered by Ubuntu Linux. This piece of news comes from the Strata + Hadoop World Conference, which takes place this week in California. The fact of the matter is that the news came from Microsoft who announced the preview of Azure HDInsight (an Apache Hadoop-based hosted service) on Ubuntu clusters yesterday at the said event. This is definitely great news for Canonical, as their operating system is getting recognized for being extremely reliable when handling Big Data. Ubuntu is now the leading cloud and scale-out Linux-based operating system.
Read more of this story at Slashdot.
Watch John Sherman use a voice synthesizer to place the first computer-assisted pizza delivery order in history.
The post Tech Time Warp of the Week: Return to 1974, When a Computer Ordered a Pizza for the First Time appeared first on WIRED.
been using iOS 8 for several days and aside from a few gimmicks and add-ons that attempt to achieve parity with Android, my experience has been overwhelmingly unsatisfactory. My chief complaint is that the vast majority of my apps are slow to boot and noticeably sluggish in operation. I want to point out that all of these apps have been "upgraded" specifically for iOS 8 compatibility. Previous operating system upgrades have been relatively seamless, so I'm asking whether other slashdotters have experienced this degraded performance.
Read more of this story at Slashdot.
The Tianhe-2, also known as the Milky Way 2, is the creation of China's National University for Defense Technology. The device was built to "provide an open platform for research and education and provide high performance computing service for southern China," according to the University of Tennessee's Jack Dongarra. Dongarra helped compile a list of the Top 500 supercomputers in the world, and wrote a report on this latest machine.
The Tianhe-2 reportedly has a storage of 12.4 petabytes and memory of 1.4 PB. In case you're not familiar, a petabyte is the equivalent of 1,000 terabytes, or 1,000,000,000,000,000 bytes. Yes, that's five commas.
This new computer model of a brain has one million neurons and works just as fast as a live brain does.
There are other brain models, run on supercomputers, that are much bigger. IBM's SyNAPSE, for example, modeled 530 billion neurons last November. (That's more than the total number of neurons in humans' brains, which clock in at 86 billion neurons on average.) Such models are very slow, however. Some take a couple hours to simulate a second of brain activity. SyNAPSE works 1,500 times slower than real time.
The new artificial brain, called Neurogrid, is a lighter, cheaper version of supercomputer models. It's also much more energy efficient, using just 5 watts of electricity, compared to the 8 megawatts that Blue Gene/Q Sequoia, SyNAPSE's supercomputer, uses. Neurogrid's creators hope that others may use it to learn more about healthy brains and brains affected by diseases such as autism and schizophrenia, according to the U.S. National Science Foundation, which funded Neurogrid. Those are some of the same general goals that larger brain models try to achieve, but something like Neurogrid could make brain modeling more accessible to more labs
We were warned but, we just let it happen...
In the year 1984, Ingsoc (English Socialism), is the regnant ideology and pseudo-philosophy of Oceania, and Newspeak is its official language, of official documents.
The story of Winston Smith begins on 4 April 1984: "It was a bright cold day in April, and the clocks were striking thirteen"; yet he is uncertain of the true date, given the régime's continual rewriting and manipulation of history. His memories and his reading of the proscribed book, The Theory and Practice of Oligarchical Collectivism, by Emmanuel Goldstein, reveal that after the Second World War, the United Kingdom fell to civil war and then was absorbed into Oceania. Simultaneously, the USSR conquered mainland Europe and established the second superstate of Eurasia. The third superstate, Eastasia, comprises the regions of East Asia and Southeast Asia. The three superstates wage perpetual war for the remaining unconquered lands of the world, forming and breaking alliances as is convenient. From his childhood (1949–53), Winston remembers the Atomic Wars fought in Europe, western Russia, and North America. It is unclear to him what occurred first: the Party's victory in the civil war, the US annexation of the British Empire, or the war in which Colchester was bombed. However, his strengthening memories and the story of his family's dissolution suggest that the atomic bombings occurred first (the Smiths took refuge in a tube station), followed by civil war featuring "confused street fighting in London itself", and the societal postwar reorganisation, which the Party retrospectively calls "the Revolution".
Minipax supports Oceania's perpetual war.
The primary aim of modern warfare (in accordance with the principles of doublethink, this aim is simultaneously recognized and not recognized by the directing brains of the Inner Party) is to use up the products of the machine without raising the general standard of living. Ever since the end of the nineteenth century, the problem of what to do with the surplus of consumption goods has been latent in industrial society. At present, when few human beings even have enough to eat, this problem is obviously not urgent, and it might not have become so, even if no artificial processes of destruction had been at work.
The Ministry of Plenty rations and controls food, goods, and domestic production; every fiscal quarter, the Miniplenty publishes false claims of having raised the standard of living, when it has, in fact, reduced rations, availability, and production. The Minitrue substantiates the Miniplenty claims by revising historical records to report numbers supporting the current, "increased rations".
The Ministry of Truth controls information: news, entertainment, education, and the arts. Winston Smith works in the Minitrue RecDep (Records Department), "rectifying" historical records to concord with Big Brother's current pronouncements, thus everything the Party says is true.
Read more here... no really, read more (it's good for you :)
"Do you know what data the 1300+ tracking companies have on you? Privacy blogger Dan Tynan didn't until he had had enough of being stalked by grandpa-friendly Jitterbug phone ads. Tracking company BlueKai and its partners had compiled 471 separate pieces of data on him. Some surprisingly accurate, some not (hence the Jitterbug ad). But what's worse is that opting out of tracking is surprisingly hard. On the Network Advertising Initiative Opt Out Page you can ask the 98 member companies listed there to stop tracking you and on Evidon's Global Opt Out page you can give some 200 more the boot — but that's only about 300 companies out of 1300. And even if they all comply with your opt-out request, it doesn't mean that they'll stop collecting data on you, only that they'll stop serving you targeted ads."
Please read and follow "Tracking the Web Trackers" VIA @SlashDot
Blue [is] the codename for the first of a number of annual...updates to Windows 8 that is expected to hit late this summer. Supposedly Blue will [also] span...Windows Phone, Windows Server, Windows RT...SkyDrive and Outlook.com.
Blue is optimized for power efficiency. ...when sleeping an ultrabook would remain connected to Internet-based apps such as email and social networks, so it remains constantly up to date.
Please read full at:
Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays. Everything we do now involves computers, and computers produce data as a natural by-product. Everything is now being saved and correlated, and many big-data companies make money by building up intimate profiles of our lives from a variety of sources.
Facebook, for example, correlates your online behavior with your purchasing habits offline. And there's more. There's location data from your cell phone, there's a record of your movements from closed-circuit TVs.
This is ubiquitous surveillance: All of us being watched, all the time, and that data being stored forever. This is what a surveillance state looks like, and it's efficient beyond the wildest dreams of George Orwell.
The increasing amount of personal information that can been gleaned by computer programs that track how people use Facebook has been revealed by an extensive academic study.
Such programmes can discern undisclosed private information such as Facebook users' sexuality, drug-use habits and even whether their parents separated when they were young, according to the study by Cambridge university academics.
A security audit of a US critical infrastructure company last year revealed that its star developer had outsourced his own job to a Chinese subcontractor and was spending all his work time playing around on the internet.
The firm's telecommunications supplier Verizon was called in after the company set up a basic VPN system with two-factor authentication so staff could work at home. The VPN traffic logs showed a regular series of logins to the company's main server from Shenyang, China, using the credentials of the firm's top programmer, "Bob"
After getting permission to study Bob's computer habits, Verizon investigators found that he had hired a software consultancy in Shenyang to do his programming work for him, and had FedExed them his two-factor authentication token so they could log into his account. He was paying them a fifth of his six-figure salary to do the work and spent the rest of his time on other activities.
The analysis of his workstation found hundreds of PDF invoices from the Chinese contractors and determined that Bob's typical work day consisted of:
9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch
1:00 p.m. – Ebay time
2:00-ish p.m – Facebook updates, LinkedIn
4:30 p.m. – End-of-day update e-mail to management
5:00 p.m. – Go home
RT: Google is all but certain to ensure that all user data collected off- and online will be cloaked through safeguards that will allow for complete and total anonymity for customers. When on-the-Web interactions start mirroring real life activity, though, even a certain degree of privacy doesn't make Conversions API any less creepy. As Jim Edwards writes for Business Insider, "If you bought a T shirt at The Gap in the mall with your credit card, you could start seeing a lot more Gap ads online later, suggesting jeans that go with that shirt."
Of course, there is always the possibility that all of this information can be unencrypted and, in some cases, obtained by third-parties that you might not want prying into your personal business. Edwards notes in his report that Google does not explicitly note that intelligence used in Conversions API will be anonymized, but the blowback from not doing as much would sure be enough to start a colossal uproar. Meanwhile, however, all of the information being collected by Google — estimated to be on millions of servers around the globe — is being handed over to more than just advertising companies. Last month Google reported that the US government requested personal information from roughly 8,000 individual users during just the first few months of 2012.
"This is the sixth time we've released this data, and one trend has become clear: Government surveillance is on the rise," Google admitted with their report.
Please continue reading at:http://rt.com/usa/news/google-internet-online-offline-500/
But what is new in recent months is the growing speed and accuracy of deep-learning programs, often called artificial neural networks or just "neural nets" for their resemblance to the neural connections in the brain.
"There has been a number of stunning new results with deep-learning methods," said Yann LeCun, a computer scientist at New York University who did pioneering research in handwriting recognition at Bell Laboratories. "The kind of jump we are seeing in the accuracy of these systems is very rare indeed."
Artificial intelligence researchers are acutely aware of the dangers of being overly optimistic. Their field has long been plagued by outbursts of misplaced enthusiasm followed by equally striking declines.
In the 1960s, some computer scientists believed that a workable artificial intelligence system was just 10 years away. In the 1980s, a wave of commercial start-ups collapsed, leading to what some people called the "A.I. winter."
Slashdot- Professor Gerald "Jerry" Crabtree of Stanford's Crabtree Laboratorypublished a paper (PDF) that has appeared in two parts in Trends in Genetics. The paper opens with a very controversial suggestion: 'I would be willing to wager that if an average citizen from Athens of 1000 BC were to appear suddenly among us, he or she would be among the brightest and most intellectually alive of our colleagues and companions.' From there, Crabtree speculates we're on the decline of human intelligence and we have been for at least a couple millennia. His argument suggests agriculture and, following from that, cities, have allowed us to break free of some environmental forces on competitive genetic mutations — a la Mike Judge's theory. However, the conclusion of the paper urges humans to keep calm and carry on, as any attempt to fix this genetic trend would almost certainly be futile and disturbing."Please read full and follow at:http://science.slashdot.org/story/12/11/13/191217/study-claims-human-intelligence-peaked-two-to-six-millennia-ago
That's right; the exploits aren't reported to the companies affected, but are instead sold so that: VUPEN customers can protect themselves (while their competitors are left vulnerable), they can be abused for spying purposes, and they can be used to create malware. This is why, if you read the tweet above again, you'll note that this latest victory was only possible thanks to multiple already-existing 0-days that VUPEN found and did not disclose publicly. If it had, it would not be able to sell them, nor would it be able to hack Windows 8, as Microsoft would have already patched the flaws long ago.
Windows 8 is "a dramatic departure from existing PC paradigms" and may not stop the declining growth in PC sales, warns a just-released IDC report. The reports adds that PC sales will be only up a fraction of a percent in 2012 over 2011.
"This will be a growing problem very quickly," said Bob Paul, CEO of Compuware, a business software firm that gets 40% of its revenue from its mainframe division.
Compuware estimates that as many as 40% of the world's mainframe programmers will be retiring in the near future.
The looming shortage has forced mainframe companies such as Compuware, IBM and CA Technologies to step up their talent-development efforts. But in a world with 3D graphics, video streaming and all kinds of social media, getting young people interested in a career in mainframes is a tough sell.
"It is not as sexy as developing new mobile apps," Paul acknowledged. "But if you want a secure and highly valued career, this is a great place to go."
shortformblog: A somewhat different take on the thing we reblogged earlier, but it shows two very interesting things: First, Tumblr and Pinterest are timesucks in equal measure, and second, nobody's actually hanging around Google+ once they sign up.
Short answer... Yes, IT will end up being hurt by Windows 8
ghacks - When Windows 8 launches the app store will likely be fairly barren, and it will take many months, if not years for Windows to catch up with the number of apps available in the iPad and Android markets. This ultimately can hurt sales of the platform as people might choose an Android or Apple device over Windows because there's more they can do with it, they'll probably not even be able to run their existing desktop software on it so what will be the point in getting one?
It is crucial however that Windows 8 tablets take off in a big way and sell in the millions, the reason for this is that Microsoft have re-engineered Windows directly around tablets, effectively betting the entire platform on the success of these devices that will probably only ever form 10% of the whole computing market.
The remaining 90% is largely constituted of IT Pros and businesses, many of whom are already taking a dim view of Microsoft's new direction for Windows or who are, at the very least, concerned about what it means for them. If the new Windows 8 tablets don't take off and sell in huge volumes it will essentially be seen as one huge slap in the face for the IT Pro community who will have had their precious desktop working environment decimated in the name of a product gamble.
The failure of Windows tablets to sell could see these IT Pros turning on Microsoft in huge numbers and perhaps even looking for an alternative (I've even considered a dual-booting iMac as my next PC for the first time ever!) This means that Microsoft simply cannot afford to get Windows tablets wrong. As the whole structure of Windows is being re-engineered around them, no matter how friendly they might say Metro will be on desktops and laptops, it is too big a gamble to get it wrong.
Please read more from by Mike Halsey at http://www.ghacks.net/2012/01/08/windows-8-tablets-make-it-pros-hate-microsoft/
Throughout the history of the Internet, there has been an evolution of web standards. Due to these transformations, today, "the number of devices connected to the Internet exceeds the number of people on Earth." Vitamin Talent has collaborated with Eric Meyer and Jeffrey Zeldman, founders of An Event Apart, to create this fantastic infographic detailing the changes of web standards during the lifetime of the Internet.
We live in very troubled times. Unemployment is higher than it has been in a generation and job numbers continue to be dismal; the stock market turbulently boils, destroying billions in wealth; and entire continents look to the rest of the world for bailouts. Still, there are pockets of economic hope. After a very positive October, video game sales continued to increase in November. During the week following Thanksgiving, XBox had its biggest week of hardware sales ever, moving nearly one million consoles.
Yet, in this period of bullish video game sales, there is some decidedly bad news. There is one game that is leaving a black eye on the gaming industry and single-handedly keeping us in a recession. Released one month ago, The Elder Scrolls V: Skyrim has done more to damage our economy than a committee of congressmen with a wallet full of US Treasury credit cards and a case of whiskey.
I know what you're thinking: it's the second-best selling game in the world right now. In the first 48 hours that Skyrim was available, 3.5 million copies were sold, a number that has continued to grow. How can a game that will generate millions possibly be bad for the economy?
The answer is quite simple: Skyrim is incredible. The game's world is so big and there are so many quests to complete that those millions of dollars in sales are being nullified by players' lost productivity and lack of economic participation in the real world.
do you think you found this page "random chance"? Hardly
Not possible on the internet...
The 57 Million blogs maintained on the internet and that number doubles in size approximately every 230 days.
So, about 100,000 new weblogs are created each day...
In the December 2006 survey we received responses from 105,244,649 Web sites with content...
While Al Gore has done a lot to promote his books & movies... he did not create and does not maintain the internet, these guys do ;-)
Why "Who Maintains the Internet Matters"... Here’s a little something to think about while the UN makes the case for greater international control of the internet turning a large class of people into social misfits, deviants and criminals and terrorists...
Who maintains YOUR internet? - Hoz
SITE DISCLAIMER: The blog provides information of a general and public nature regarding national or other developments. None of the information contained herein is intended as legal advice or opinions relative to specific matters, facts, situations or issues. Additional facts, information or future developments may affect the subjects addressed in this blog. You should consult with an expert about your particular circumstances before acting on any of this information because it may not be applicable to your situation. This blog contains information and links to sites which are not owned or maintained by myself. I am not responsible for the content, linked sites, and the views expressed on linked sites do not necessarily reflect my views or opinions. The information contained herein is provided for personal, non-commercial, educational, entertainment and informational purposes only and does not constitute a guarantee of information or facts. I makes no claims, expressed, implied, or statutory regarding the accuracy, timeliness, completeness, or correctness of any material contained herein. Since the conditions of use are outside my control, the individual visitor is entirely responsible for determining the appropriateness and applicability of all information contained herein.