Label: See My Friends Records - SMF015 Format: Cassette EP Country: US Genre: Non-Music, Pop
And they defied the conventional wisdom of the time, that portals like Yahoo! DH reader Mahesh wrote Could you suggest a utility to view the video cache? Google has used a similar approach — immense computing power, heaps of data and statistics — to tackle other complex problems. FlipAlbum Standard v7. The web site TheDigitel Charleston is offering advertisers a free updating service, said Ken Hawkins, editor. Do note that Fix It is in Beta, could function erratically. But many members of the tell-all generation are rethinking what it means to live out loud.
Barbara S Peterson reports how airlines like Virgin, Delta and Lufthansa are wiring internet access on their planes to help people stay connected even while flying.
But it was not a face-to-face chat. Rather, it started as an exchange of Twitter posts at the boarding gate. When the plane landed, Jarvis recalled, the conversation resumed. Airlines and social media providers are scrambling to catch up. Business travelers can use these services to share cabs to the airport, swap advice or locate colleagues in the same city. Increasing availability of Wi-Fi at airports and on planes has made the travel networking possible.
More than 10 airlines in North America, including American, Delta and Southwest, are wiring their planes for Internet access, and major foreign airlines like Lufthansa are introducing new technology that will let customers connect on transoceanic flights.
In-flight calls are still forbidden on most flights, although several airlines, including Emirates, have been testing calling on shorter trips. As many as 1, commercial airliners in the United States will have Wi-Fi capability by the end of the year, according to Chris Babb, senior product manager of in-flight entertainment for Delta Air Lines.
And Virgin America, which has wired its entire plane fleet for the Internet, said about half of its passengers brought their laptops with them and 17 to 20 percent were online at any given time. On longer flights, about a third of passengers go online. Staying connected helps Some airline passengers may mourn the loss of their last remaining refuge from e-mail intrusions.
But the benefits of staying connected became clear several months ago during the eruption of the Icelandic volcano that grounded thousands of European flights. Facebook and Twitter set up sites for stranded travelers, who swapped ideas and offered rides to ferry terminals, and Twitter had its own thread. Based on anecdotal reports, the sites helped in getting information out quickly. For those with time at an airport, FlyerTalk.
Lufthansa said it consulted with FlyerTalk members in developing its own product to help customers tap into social networking from any location. The application works on iPhones and this fall will be available on BlackBerrys. A built-in GPS allows users to find fellow fliers who might be nearby. It also has a taxi-sharing feature that travelers can activate upon landing.
For those who want to connect, few airlines can match Virgin America for mingling opportunities. In addition to its Internet service, it offers seat-to-seat messaging via its seatback video screens. It has also teamed up with match.
But there is also the potential for spurned advances and hurt feelings. In the past, that person might have simply suffered in silence. A passenger once sent an e-mail message to the airline from his seat, saying that he was not pleased with the sandwich he had just eaten, she said. A customer service representative on the ground sent a message back to the plane, and shortly thereafter, she said, the passenger was served an acceptable substitute.
This can work against the airline, too, as Virgin discovered when a New York-bound flight was diverted and some passengers sent out messages venting annoyance with the delay. Jezebel is presently one of the fastest-growing site owing to its true, fearless comments on the glamour world, writes Jennifer Mascia. And Stewart is hardly the first media heavyweight the site has taken to task.
Jezebel also weighs in on the sexually predatory nature of the fashion business, skewers celebrities like Gwyneth Paltrow and Elle MacPherson, and chronicles the doctored photographs in fashion magazines in a regular feature called Photoshop of Horrors.
In contrast to magazines like InStyle and Vogue, which push expensive handbags, designer clothes, slimming undergarments and long-lasting lipstick. Those advertisers are appearing on a site that is certainly cutting, and frequently incendiary. Jezebel did not become one of the fastest-growing sites in the Gawker family without making a few enemies.
Coen continues to stand by the post. The difference between the raw photo and the final cover is jarring: The ensuing controversy received national attention, officially putting Jezebel on the map and attracting a devoted fan base, one that is not shy about posting comments about past traumas like rape and drug abuse.
Its features include: Web Video Downloader: Watch and Record a video, works with many audio and flash sites. Audio Recorder: With two different recording technologies record anything you hear, from any site, and convert them into MP3 files; File Converter: The 8.
FAQ at http: Demo at http: High-speed Internet connection required. GiMeSpace GiMeSpace, a virtual desktop scroller, can provide an extended desktop in the horizontal direction.
A small and simple program for Windows XP or later versions, GiMeSpace lets you expand the desktop without any limits. You can keep all your windows open next to each other and move between then by just moving your mouse to the left or to the right. To revert to a stationary desktop, simply right-click the GiMeSpace icon in the notification area, and choose Exit.
You can also click Collect Windows to return all open windows to the area of the original desktop. It can search and classify files, perform disk space utilisation analysis, and identify duplicate files to free-up wasted storage space.
FlexTk can scan drives or folders and view a report of how your storage space is utilised by file type. It can automatically categorise the files by general types e. The 4. The Pro edition has additional features like support for long file names, advanced data migration features, recoverable copy operations, and more.
DH suggested You could try CD Recovery Toolbox to restore information lost as a result of some mechanical damage of the disk. It can be downloaded at http: Aspiring to be the best, Apple comes out with a smarter version of iPhone with striking features like video chat and high resolution display, report Miguel Helft and Jenna Wortham.
Seeking to fend off intensifying competition from Google and others in the smartphone business, Apple introduced a new version of the iPhone on Monday that includes a front-facing camera for video chats. The iPhone 4 is faster and thinner than previous models, with a crisper display and a more angular look. It has a 5-megapixel camera and can shoot and edit high-definition video. While previous versions of the device continue to sell briskly, buyers have been faced with an increasingly large array of attractive smartphones.
The iPhone 4 should help Apple re-establish its leadership, some analysts said. Apple plans an aggressive international rollout after that; Jobs said the phone would be on sale in 88 countries by September. And Jobs did not introduce a new version of the Apple TV device or announce that the iPhone would be available on Verizon Wireless, despite speculation on technology blogs that he might do so. For now, however, chats can be conducted only with other iPhone 4 owners, and only over Wi-Fi networks.
Jobs said Apple would work with carriers to bring video chats to cellphone networks. At one point, Jobs showed an e-mail message from a developer who said that he had made more money in the first day of sales of his iPad application than in five years of selling Google ads on his Web site.
Ads system Jobs also said existing ads that appeared in applications on the iPad and the iPhone, many of which are sold by Google-owned AdMob, were not good because clicking on them took people out of the apps and onto the Web.
Analysts said the iPhone 4 should help Apple sustain its sales momentum, appealing both to new iPhone customers and to owners of the two-year-old iPhone 3G who were looking to upgrade. Military taps social networking skills. Christopher Drew describes how networking backstage equips the armed forces on the field with a sense of alertness that brings victory closer. As a teenager, Jamie Christopher would tap instant messages to make plans with friends, and later she became a Facebook regular.
Now a freckle-faced 25, a first lieutenant and an intelligence officer here, she is using her social networking skills to hunt insurgents and save American lives in Afghanistan. Hunched over monitors streaming live video from a drone, Lieutenant Christopher and a team of analysts recently popped in and out of several military chatrooms, reaching out more than 7, miles to warn Marines about roadside bombs and to track Taliban gunfire. The strike was aborted. Another message, referring to a Taliban compound, warned: Lieutenant Christopher and her crew might be fighting on distant keypads instead of ducking bullets, but they head into battle just the same every day.
The Marines say the analysts, who are mostly in their early to mids, paved the way for them to roll into Marja in southern Afghanistan earlier this year with minimal casualties. But there can be difficulties in operating from so far away. Late last month, military authorities in Afghanistan released a report chastising a Predator drone crew in an incident involving a helicopter attack that killed 23 civilians in February. Networking helps For the most part, though, the networking has been so productive that senior commanders are sidestepping some of the traditional military hierarchy and giving the analysts leeway in deciding how to use some spy planes.
The connections have been made possible by the growing fleet of remote-controlled planes, like the Predators and Reapers, which send a steady flow of battlefield video to intelligence centres across the globe.
The mechanics are simple in this age of satellite relays. Besides viewing video feeds, the analysts scan still images and enemy conversations. As they log the information into chatrooms, the analysts carry on a running dialogue with drone crews and commanders in the field, who receive the information on computers and then radio the most urgent bits to troops on patrol.
Marine intelligence officers say that during the Marja offensive in February, the analysts managed to stay a step ahead of the advance, sending alerts about or so possible roadside bombs. Gunnery Sgt Sean N Smothers was stationed here as a liaison to the analysts.
Sergeant Smothers said he and two Air Force officers rushed over and confirmed the existence of a roadside bomb. Nearby on a big screen map in the windowless room, they could see a Marine convoy approaching the site. The group started sending frantic chat messages to their Marine contacts in the area.
As they watched the video feed from a drone, they could see that their messages had been heard: During the cold war, it focused mostly on fixed targets like Soviet bases. But commanders in Afghanistan and Iraq have often complained that it is hard to get help from spy planes before insurgents slipped away. While Air Force analysts were once backroom technicians, the latest generation works in camouflage uniforms, complete with combat boots, on open floors, with four computer monitors on each desk.
The chatrooms are no-frills boxes on a computer screen with lines of rolling text, and crew leaders keep dozens of them open at once. They may look crude compared to Facebook, but Lieutenant Christopher said they were effective in building rapport. And some analysts pick up the phone to build closer bonds with soldiers they have never seen.
At the time, the analysts were blending data from the U-2s and the drones to watch the roads into Marja and fields where helicopters might land.
But as Sergeant Smothers looked over their shoulders, encouraging them to warn the Marines about even the most tentative threats, the analysts warmed up. As the operation unfolded, the analysts passed on leads that enabled the Marines to kill at least 15 insurgents planting bombs. Lieutenant Christopher, who loves to chat on Facebook with her family in Ohio, was so exhausted from overnight shifts during that period that she skipped Facebook and went right to sleep.
And sometimes, she said, she ended up dreaming about what she had just seen in the war. Yahoo Inc. The Facebook link will need to be turned on by each Yahoo user. Other tools will empower people to automatically let their Facebook friends know what they are doing and saying on Yahoo services such as its photo-sharing site, Flickr.
The additional tie-ins follow through on a makeover that Yahoo announced late last year in an effort to make its website more compelling. Soluto Using a PC can truly be a deeply frustrating experience especially when computers become sluggish. Unless one is a power-user, the causes for the sluggishness would remain a mystery.
And, well, even if you are a power-user, it could take quite some time to pin-point the causes. And, Power of the crowd: The knowledgebase garnered and analysed by Soluto is also editable by the community. If you wish to use the wisdom of the crowd to optimise your PC and make it run and boot faster, download Soluto at www. The developers of SUPERAntiSpyware aver that the product focuses on detecting hard-to-remove spyware which other products often miss, or are unable to safely detect and remove.
Features include: SuperAntispyware also offers real-time protection from threats- prevents potentially harmful software from installing or re-installing! Reportedly in use by nearly 30 million users the 8. BleachBit BleachBit can quickly free disk space, remove hidden junk, and also ensure your privacy is protected by erasing cache, deleting cookies, clearing Internet history, removing unused localisations, shredding logs, and deleting temporary files.
BleachBit includes a growing list of cleaners, each one represents an application and is provided with options to make appropriate decisions. BleachBit also includes advanced features such as shredding files Shred files to hide their contents and prevent data recovery Shred any file such as a spreadsheet on your desktop to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.
Simple operation: You can download the latest BleachBit installation packages v0. DH reader Girish wrote: Please suggest a software to download songs while playing them online. It can be downloaded at www. I was sent a Word document where every line has a paragraph return at the end. Is there a way to remove all of them except the ones that actually marks the end of a paragraph?
The Replace function built into Microsoft Word comes in handy for situations like this. Click the mouse into the Replace With area and tap the space bar to indicate that you want to replace the paragraph line with a space. As an alternative to cutting and pasting hidden characters, you can also click the Special menu in the Replace box and select Paragraph Mark and Nonbreaking Space instead.
Once you have indicated what character you want to find and what character you want to replace it with, click the Replace button in the box to convert each paragraph mark into a space. Skip the double paragraph mark at the end of each intended paragraph. In the Find What line of the Replace box, paste in two paragraph marks. In the Replace With line, type in a nonsense string of characters like! This converts all the intended paragraph breaks to the nonsense string.
Next, go back to the Replace box and paste in a single paragraph mark into the Find What box. Type a space into the Replace With box. Click Replace All to convert all the hard line breaks onto spaces. Finally, return to the Replace box one more time. On the Find What line, type in the nonsense string —! Click the Replace All button to restore all the originally intended paragraph marks to the file.
Just select the text in the file, go to the Format menu and choose AutoFormat; click the Options button in the box to adjust the settings. Password Keeper FlyingBit Password Keeper is a secure organiser to store your passwords, serial numbers, and codes. As the info is kept in a special encrypted database it is virtually impossible for others to read information from it.
To ensure the security of database reliable encryption algorithms such as AES, Towfish and Blowfish are used. Supports various database encryption algorithms; automatically clears the clipboard; copies the value of a field with one mouse click; supports custom fields; stores notes; easy navigation with a tree-like list; works with removable media; and a simple and clear interface.
Jaangle Jaangle is a music player audio and video and an organiser with a difference! Known earlier as Teen Spirit, Jaangle can retrieve info from Internet such as lyrics, album reviews, artist biographies, and artist pictures. It can also maintain a history of the files you play, lets you review statistics and generate a personal hitlist based on the songs you listen to often.
Jaangle can aid in discovering tracks in your large music collection with features like auto-continue or by playing the music quiz. It provides an ID3v2 tagger and mass tagger and an easy to use renamer and mass renamer with preview. The 2. It can convert multiple files in multiple formats, at once.
But unlike its counterparts, the service allows its users to keep more of the information private. The service, which completed a test phase in February, has just 20, registered members — a drop in the bucket compared with Facebook. But Shimizu remains undaunted. Analysts and industry experts are quick to point out that Facebook has dealt with a number of user protests in its six-year history and emerged unscathed each time, continuing to add new users at a record clip.
For many users, the web site is an irreplaceable nexus of friends, relatives and colleagues online, making it difficult to abandon. A service that is in vogue one year can just as easily be out of style the next. It would take a lot of work to undermine what Facebook has achieved so far.
One measure is a Web site called QuitFacebookDay, which is calling for Facebook users to close their accounts en masse on May 31 and has attracted nearly 13, commitments so far. Another site, called FacebookProtest, which is asking disgruntled users to boycott the Web site on June 6 by not logging in, has drawn roughly 3, supporters.
In addition, a group on Facebook created to protest recent changes has swelled to more than 2. Matthew Milan, co-creator of QuitFacebookDay. Milan said that in lieu of Facebook, he planned to use Flickr for photo uploading and sharing, LinkedIn for business contacts and Twitter for news and updates.
Perhaps in an effort to tamp the growing chorus of complaints, the company has announced plans to simplify its complex menu of privacy controls, which currently includes more than options. Businesses are turning to computer generated display ads over paper ones, reports Anee Eisenberg. New software called PlaceLocal builds display ads automatically, scouring the Internet for references to a neighborhood restaurant, a grocery store or another local business.
Then it combines the photographs it finds with reviews, customer comments and other text into a customised online ad for the business. The program, developed by PaperG, an advertising technology company in New Haven, Connecticut, is aimed in part at small businesses just beginning to advertise on the web sites of local newspapers or television stations, said Victor Wong, its chief executive.
She tried the program to see how well it could create a display ad for a local Tribeca restaurant — a job usually done by hand at the paper. Then PlaceLocal takes over, gathering basics like telephone number, hours of business, maps and directions, and adding positive comments extracted from local blogs.
Samples of ads may be seen at www. The company has also signed up the McClatchy newspaper chain and will soon be on some of its web sites, he said. Sales representatives at the media companies who have signed up with PaperG often use PlaceLocal to build sample ads they show to small businesses, said Wong. PaperG takes a percentage of this fee, he said. In the future, small businesses will also be able to create their ads by going directly to the PaperG Web site, Lee said.
Shaina Park, a sales representative at Time Out New York who handles Web and print advertising by local bars and restaurants, is using PlaceLocal to sell ads. That can translate into lower charges, Park said. Normally Time Out New York requires companies to submit their own ads that adhere to the specifications of the site. The program can pan over photographs in the ad, zooming in to show off images of a restaurant or real estate listing, Wong said.
Even if the business has no web site, the program can usually turn up a wealth of information on it to include in the ad. For a local company that bakes dog biscuits, the program might find comments from pleased shoppers that have appeared online, rotating different quotes in the ads as they run.
Gaby Benalil, who lives in Albuquerque, recently signed up at the web site of a local TV station, KOAT, to advertise her new business offering cello and vocal performance lessons. Computers are not only creating ads; they are also adding new information to them automatically.
The web site TheDigitel Charleston is offering advertisers a free updating service, said Ken Hawkins, editor. If a customer, like a pizza shop, decides to run a special, the customer can send the revision from a blog or Facebook page, or from Twitter. Ads that are easily updated this way will have an advantage, Rothenberg said.
When the whistle-blower site WikiLeaks released a classified video taken in showing an American Apache helicopter crew killing 12 civilians in Iraq, including two Reuters journalists, it rang a bell with Hayden Hewitt. Videos taken from Apache helicopters can indeed be as stylistically consistent as dollar bills: But in this case, Hewitt meant there was something familiar about that exact WikiLeaks video, which documented 38 minutes of flying above Baghdad punctuated by gun bursts that ended in carnage, including the deaths of the two journalists, whose cameras were mistaken as weapons.
A number of trusted, longtime visitors to LiveLeak distinctly recalled seeing it about a year earlier, he said. If you want to see the horror of war, you do not need to look far. There are sites aplenty showing the carnage, and much of the material is filmed, edited and uploaded by soldiers recording their own experiences.
That is why I like to say this is the first YouTube war. What can be found on sites like YouTube and LiveLeak reflects the lives of soldiers in a war zone, from boredom to the highest drama.
And then there are videos of deadly firefights and aerial bombings. A small personal database program TreePad lets storage of notes, emails, texts, hyperlinks, etc, into one or multiple databases.
To find a previously created or imported article, you can either browse the tree, or use the internal search engine. TreePad lets you store all your notes, emails, texts, hyperlinks, etc. Its Windows Explorer like interface helps to edit, store, browse, search and retrieve data easily. It provides detailed information about the battery, such as wear-level, capacities, consumption, manufacturer, CPU and HDD temperature reading in degrees Celsius or Fahrenheit. And, when the laptop stops running on batteries, the theme is re-enabled and the stopped services are restored.
BatteryCare can update itself too and consumes only a mere 0. Requires Microsoft. NET Framework Version 2. The easy to use GnuCash lets you to track bank accounts, stocks, income and expenses. As quick and intuitive to use as a checkbook register, it is based on professional accounting principles to ensure balanced books and accurate reports. Feature Highlights include: GnuCash Stable release 2. An FAQ can be found at http: Growing up: At YouTube, adolescence begins at five.
Brad Stone traces the challenging journey of YouTube as it moves into its fifth successful year. Early this year, the most popular YouTube video of all time — a clip of a British toddler gleefully biting the finger of his older brother — was supplanted by a brash newcomer.
YouTube, a subsidiary of the search giant Google, is growing up. Once known primarily for skateboard-riding cats, dancing geeks and a variety of cute-baby high jinks, YouTube now features a smorgasbord of more professional video that is drawing ever larger and more engaged audiences. On Monday, YouTube will celebrate its fifth birthday by announcing it has passed two billion video views a day; YouTube said it reached the one billion mark in October.
Hurley, 33, said YouTube was increasingly focused on showing users what their friends had watched, as a way of helping people navigate the tens of thousands of hours of video uploaded to the site every day. Many analysts say YouTube could break even this year for the first time, after five years of large losses generated by its high bandwidth and storage costs. YouTube has faced a fight in another regard as well: Novel ventures In January, YouTube introduced a movie rental store, though its only offerings are from independent film companies and Bollywood studios.
YouTube already has the second most popular search engine in the world, according to comScore. The company plans to introduce Google TV, a software platform for the television that it is developing with Sony, Intel and Logitech, according to people briefed on its plans who were not authorised to talk about them publicly. YouTube is expected to play a prominent role in bringing a variety of video to the Google TV platform, and Hurley contended that the rise of Web video on the television was inevitable.
Finally, Hurley tipped his entrepreneurial hat to a chaotic, controversial and suddenly popular site that resembles the YouTube of five years ago: The site, created by an year-old from Moscow, Andrey Ternovskiy, allows people around the world to engage in random, instantaneous one-on-one conversations. The service is available for treatment of eight common ailments or conditions: How it works Residents of the state who believe they have one of these ailments can register at Zipnosis.
At this point, those patients with chronic ailments like heart disease will be screened out from the online service and directed to come in for an appointment. Those patients who pass the initial screening then pick which of the eight common ailments they believe they are suffering from and answer a series of questions about their symptoms.
This information is then passed along to the doctor in the form of a clinical note. From 8 a. Monday through Saturday, doctors at Park Nicollet Health Services will then respond to patients within an hour.
Patients are notified via e-mail or text message that the response is ready to be viewed through the Web. If the patient appeared to have the condition, the doctor would respond with diagnosis and treatment information. For patients, the service means no more having to wait in waiting rooms just to get a prescription when they know exactly what they have. John Misa, chief of primary care at Park Nichollet, said the service not only makes care more convenient for patients, but also may help the practice earn more revenue.
Having additional free capacity will also be important when the health care bill starts to take effect and more patients come in for care. In addition, the clinic can have those doctors who are free at the moment respond to the online queries.
But the online world outside of Facebook is already a very open and connected place. Densely interlinked Web pages, blogs, news articles and Tweets are all visible to anyone and everyone.
Instead of contributing to this interconnected, open Web world, the growing popularity of Facebook is draining it of attention, energy and posts that are in public view. Every link found on the open Web, inviting a user to click and go somewhere else, is in essence a recommendation from the person who authored the page, posted it or broadcast it in a Tweet.
The engines trace backward to who linked to the recommender, then who linked to the recommender of the recommender, and so on. The trend is clear, she said — Facebook is displacing these other forms of online publication. Facebook and Twitter. But the two are fundamentally different. By contrast, most Twitter users elect to use the service to address the general public.
Facebook has redefined the way its users go about obtaining information. And she sees it as replacing the search-engine model. Yet there is a cost: Members now spend more than billion minutes a month on Facebook. The links on the trillion Web addresses found by Google, and within the billions of Tweets that have followed, form an incomparably vast, truly worldwide, web of recommendations, supplied by fellow humans.
The New York Times. Tell-all generation learns to keep things offline. Recent privacy issues on the social networking sites have made youth more cautious while using them, reports Laura M Holson. Min Liu, a year-old liberal arts student at the New School in New York City, got a Facebook account at 17 and chronicled her college life in detail, from rooftop drinks with friends to dancing at a downtown club.
Recently, though, she has had second thoughts. Concerned about her career prospects, she asked a friend to take down a photograph of her drinking and wearing a tight dress. When the woman overseeing her internship asked to join her Facebook circle, Liu agreed, but limited access to her Facebook page.
The conventional wisdom suggests that everyone under 30 is comfortable revealing every facet of their lives online, from their favorite pizza to most frequent sexual partners. But many members of the tell-all generation are rethinking what it means to live out loud.
They are more diligent than older adults, however, in trying to protect themselves. In a new study to be released this month, the Pew Internet Project has found that people in their 20s exert more control over their digital reputations than older adults, more vigorously deleting unwanted posts and limiting information about themselves. Sam Jackson, a junior at Yale who started a blog when he was 15 and who has been an intern at Google, said he had learned not to trust any social network to keep his information private.
In its telephone survey of 1, people, the Berkeley Center for Law and Technology at the University of California found that 88 percent of the to year-olds it surveyed last July said there should be a law that requires Web sites to delete stored information. And 62 percent said they wanted a law that gave people the right to know everything a Web site knows about them. That mistrust is translating into action. In the Pew study, to be released shortly, researchers interviewed 2, adults late last summer and found that people ages 18 to 29 were more apt to monitor privacy settings than older adults are, and they more often delete comments or remove their names from photos so they cannot be identified.
Younger teenagers were not included in these studies, and they may not have the same privacy concerns. But at the same time, companies like Facebook have a financial incentive to get friends to share as much as possible. Because the more personal the information that Facebook collects, the more valuable the site is to advertisers. Two weeks ago, Senator Charles E Schumer, Democrat of New York, petitioned the Federal Trade Commission to review the privacy policies of social networks to make sure consumers are not being deliberately confused or misled.
But in many cases, young adults are teaching one another about privacy. Besides, what if her sister became a celebrity? Timely alert Andrew Klemperer, a year-old at Georgetown University, said it was a classmate who warned him about the implications of recent Facebook change.
Now he is more diligent in monitoring privacy settings and apt to warn others, too. That was the experience of Kanupriya Tewari, a year-old pre-med student at Tufts University. Recently she sought to limit the information a friend could see on Facebook but found the process cumbersome. She gave up because she had chemistry homework to do, but vowed to figure it out after finals. Jordan Wing is a devoted user of Google products like Gmail, the Chrome browser and Google Docs, the Web-based word processing program.
A few weeks ago, Wing, a high school student from Spokane, Wash. Google is not expected to unveil the highly anticipated Chrome OS until the end of the year, and the software is expected to run, at first, only on the class of low-cost PCs called netbooks. But Wing, along with a growing number of other Google fans, did not want to wait. These people are downloading home-brewed versions of the operating system derived from the esoteric source code, which Google releases under the name Chromium.
Google is developing the Chrome system as an open-source project and periodically releases the Chromium code online, to let other Web developers contribute to the project. Several resourceful users have taken those undistilled vats of source code and done something Google says it never expected: It will not only be its entry into the market for operating systems, long dominated by its archrival Microsoft, but also a new computing paradigm.
The Chrome operating system is designed to allow computers to boot up to the Web within seconds, onto a home screen that looks like that of a Web browser. Some analysts are skeptical that regular folks will flock to devices that place such severe limits on their computing activities. But that time is not here yet, he said: Working versions of Chromium have appeared across the Web and have been downloaded more than a million times.
He has spent countless evenings and weekends configuring Chromium to work on various kinds of computers, including the Macintosh, and added features that Google has not gotten to yet, like support for the Java programming language. He explained that his work on Chromium began partly as a way to demonstrate his computing skills and possibly open doors in the technology industry.
Since last fall, a small but vibrant community has formed around his work, encouraging him with ideas and supporting his efforts by providing money for servers and other programming tools. He says he looks forward to the day when low-powered but fully functional computers running Chrome can help lead to a new wave of telecommuting. All of the activity around these prenatal incarnations of Chrome is something of a double-edged sword for Google.
The company wants developers and other companies to work beside its engineers, developing their own versions of the operating system. But Google says it did not anticipate that regular people would start using Chromium — and evaluating it — before it was ready for prime time.
Nevertheless, the Google executive in charge of Chrome OS took pains to express support for the Google fans trying Chromium and for their presumptive band leader, McLoughlin. The bug allowed anyone to force another user to follow them on Twitter, giving the site its first setback in several months. Twitter alerted its users of the bug several hours later with a notice on a company blog. It can detect, block and quarantine Spyware and Adware in real time.
The developers aver that STOPzilla! Lunascape Lunascape is a triple engine browser, for web designers and developers. With it you can choose the right engine to overcome web-browser compatibility issues, long loading times, and messed up websites display. You need only 2 clicks to change your engine! Customizable - more than features can be customised; choice of display on toolbars, the look of of your browser can be changed in a snap - about skin designs to choose from and create your own too.
It has been downloaded over 15 million times, available globally in 11 languages. File Finder Locate32 is a file finder which works by indexing all your files on your hard disk drive and provides almost instant access to them.
It can be used to find files from your hard drives and other locations. Locate32 uses databases to store information about directory structures and uses these databases in its searches. The use of these databases provides very fast searching speed. The software includes a dialog based application as well as console programs which can be used to both update and access databases. You can download Locate32 for your OS at http: The developer invites enthusiastic persons who are willing to help with this project.
You can get in touch with him at http: Jenna Wortham tells how Betaworks that started as a vision grew to create a wave in the tech market with its Web tools like Bit. In , before most people knew what a tweet was, Iain Dodsworth, a programmer in London, cobbled together a software tool that reorganized his jumbled Twitter stream into neat columns.
He named it TweetDeck. Within a few months, it gained the kind of momentum most entrepreneurs only dream about. Tech bloggers praised it, and users flocked to it. Ashton Kutcher posted a video online showing him and his wife, Demi Moore, using the service. Betaworks, a New York City technology firm known for its eye for emerging Web services.
The company has guided some entrepreneurs to lucrative sales and helped others raise cash from notable New York and Silicon Valley investment firms. Such incubators are familiar in more established tech hubs. Google Maps grew faster because it allowed other companies to add information to a map or use the service in other tools.
At a recent meeting at Betaworks, about three dozen employees of Betaworks and its portfolio of companies crowded into a room, trading feedback, updates and the occasional good-natured zinger about their various products.
Betaworks has developed some Web tools from scratch, like Bit. But the company is looking for entrepreneurs who have more than a vision. Betaworks, he said, will focus on five to 10 companies a year. The New York Times Company invested in that round of financing. Betaworks leaves a mark Investors rely on the keen eye of Betaworks to provide a window into the next wave of promising Web companies, said Jim Robinson, a partner at RRE Ventures, a technology investment firm.
Betaworks first invested in the company in December and continued helping to develop it. Betaworks created Bit. During several weeks in February, iDefense tracked an effort to sell log-in data for 1.
The case points to a significant expansion in the illicit market for social networking accounts from Eastern Europe to the United States, he said. The company attempted to purchase accounts as part of its investigation into the incident, said a spokesman, Barry Schnitt. However, it previously said that it did not purchase any of the accounts as part of its study because that would violate its corporate policy. They then use the accounts to send spam, distribute malicious programs and run identity and other fraud.
Why Facebook is vulnerable Facebook accounts are attractive because of the higher level of trust on the site than exists in the broader Internet. People are required to use their real names and tend to connect primarily with people they know. Other friends smelled a fraud and warned Sheldon, who quickly reported the problem to Facebook. She does not know how her password was stolen. IDefense did not see the accounts themselves, but the inclusion of many accounts with small numbers of friends suggests the seller could have created fake accounts, perhaps using an automated tool, and sent out blind friend requests.
Many users are eager to amass friends and accept friend requests from people they do not know, even though Facebook discourages it. Facebook equipped well Facebook says it has sophisticated systems to defeat fake accounts, including tools for flagging them when they are created so they can be investigated.
Facebook also monitors for unusual activity that is associated with fake accounts, like many friend requests in a short period of time and high rates of friend requests that are ignored.
It also investigates reports of suspicious users. The relatively low asking prices for the Facebook accounts points to the fact that Facebook accounts do not translate into instant profit. Shoppers no longer enjoy privacy. Cameras that can follow you from the minute you enter a store to the moment you hit the checkout counter, recording every T-shirt you touch, every mannequin you ogle, every time you blow your nose or stop to tie your shoelaces is what is called behavioral tracking Web coupons embedded with bar codes that can identify, and alert retailers to, the search terms you used to find them and, in some cases, even your Facebook information and your name.
Mobile marketers that can find you near a store clothing rack, and send ads to your cellphone based on your past preferences and behavior. To be sure, such retail innovations help companies identify their most profitable client segments, better predict the deals shoppers will pursue, fine-tune customer service down to a person and foster brand loyalty.
But these and other surveillance techniques are also reminders that advances in data collection are far outpacing personal data protection. The commission has brought several dozen complaints against companies about possibly deceptive or unfair data collection and nearly 30 complaints over data security issues.
In , the commission proposed new guidelines for Web advertising that is tailored to user behavior. Corporations can choose to follow them — or not.
Mike Zaneis, vice president for public policy at the Interactive Advertising Bureau, a trade association based in Manhattan, says the advertising industry is not generally collecting personally identifiable data. He says consumers can use an industry program if they want to opt out of some behavior-based ads.
As for mobile marketing consumers are always asked if they want to opt in to ads related to their cellphone location. As contradictory as it might sound, we need new strategies for transparent consumer surveillance. In a country where we have a comprehensive federal law — the Fair Credit Reporting Act — giving us the right to obtain and correct financial data collected about us, no general federal statute requires behavioral data marketers to show us our files, says Rich.
By early fall, the F T C plans to propose comprehensive new privacy guidelines intended to provide greater tools for transparency and better consumer control of personal information, Rich says. In the course of the film, the detectives even obtain a copy of the birth certificate of his daughter, then 18 months old. No more exasperation or wringing of hands while facing such a kind of situation, thanks to Stalled Printer Repair.
It is a small, and portable application designed to list the stalled print jobs and clear the printer spool of all the stuck jobs. The other features are: Portable Application - does not need to be installed and does not write to the registry; Replaces the Manual Process, very useful to stop the printing too, just include it in the start menu.
It facilitates three variations of visual display: Switcher can be brought into play by a user-defined hotkey or via mouse movement or a combination. Just type in a keyword or a part of a keyword in order to filter the displayed options and hone in on the program or window that you wish to focus.
The other features include: Panchang is currently is available for most Nokia devices with touch support. To know more visit http: To download visit Ovi Store at http: Panchang has been rated with 4 stars out of 5 on Ovi website, and was downloaded 16, times, during last month. DH reader Prahlad Desai wrote: Please suggest a utility to hide all desktop icons DH suggested: The KB DeskSweeper v2.
Some operations appear fairly sophisticated and involve brokers and middlemen, he added. Their friends tell their friends, who tell their friends. And the pay is not great when compared to more traditional data-entry jobs.
Still, it appears to be attractive enough to lure young people in developing countries where even 50 cents an hour is considered a decent wage. It is not a lot of money, he acknowledged, but it requires little effort and can help supplement their pocket money.
Shaon, who agreed to speak to a reporter only over an Internet chat, said he gets the work on Web sites and is paid through Internet money transfer services. He does not know the identities of the people paying him, nor does he have any interest in finding out. Three shifts of workers allow the operation to hum 24 hours a day, seven days a week. Some sites, for instance, might also send confirmation codes as text messages to cellphones, which then have to be entered into a separate verification page before new e-mail accounts are activated.
The executive, Dileep Paveri, said his firm had stopped offering the service because it was not very profitable. They lose their interest. Fix It: This new Microsoft service provides a set of online and offline tools to fix common PC problems, automatically.
It occupies minimal space in the handset memory, works in real time. You can try it out for your phone and platform at http: The KB Advanced Uninstaller v1. Do note that Fix It is in Beta, could function erratically. For the first time, marketers spent more in on Internet advertising than in magazines, according to a report from ZenithOptimedia, which said online ad spending would rapidly close ground on newspapers.
The loss in ad spending across all media was an even steeper The Interactive Advertising Bureau and PricewaterhouseCoopers reported that search ads posted a slight rise from , comprising 47 percent of all Internet ad spending.
Display ad spending rose a similar amount, while digital video ads climbed 38 percent. Revenues for online classifieds and e-mail advertising plummeted. John Markoff tells the Google hacking story. Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said.
Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services.
The intruders do not appear to have stolen passwords of Gmail users, and the company quickly started making significant changes to the security of its networks after the intrusions. But the theft leaves open the possibility, however faint, that the intruders may find weaknesses that Google might not even be aware of, independent computer experts said. Ultimately, the intruders were able to gain control of a software repository used by the development team.
The details surrounding the theft of the software have been a closely guarded secret by the company. In March, after difficult discussions with the Chinese government, Google said it would move its mainland Chinese-language Web site and begin rerouting search queries to its Hong Kong-based site.
Google continues to use the Gaia system, now known as Single Sign-On. Hours after announcing the intrusions, Google said it would activate a new layer of encryption for Gmail service. The company also tightened the security of its data centers and further secured the communications links between its services and the computers of its users.
Several technical experts said that because Google had quickly learned of the theft of the software, it was unclear what the consequences of the theft had been. When Google first announced the thefts, the company said it had evidence that the intrusions had come from China. The attacks have been traced to computers at two campuses in China, but investigators acknowledge that the true origin may have been concealed, a quintessential problem of cyberattacks.
Similarities and differences Several people involved in the investigation of break-ins at more than two dozen other technology firms said that while there were similarities between the attacks on the companies, there were also significant differences, like the use of different types of software in intrusions. They then transferred the stolen software to computers owned by Rackspace, a Texas company that offers Web-hosting services, which had no knowledge of the transaction. It is not known where the software was sent from there.
The intruders had access to an internal Google corporate directory known as Moma, which holds information about the work activities of each Google employee, and they may have used it to find specific employees. Tech companies are on cloud nine.
This year, Netflix made what looked like a peculiar choice: But the online retailer, based in Seattle, has lately gained traction with a considerably more ambitious effort: The idea, though typically expressed in ways larded with jargon, is actually rather simple.
The concept of renting computing power goes back decades, to the days when companies would share space on a single mainframe with big spinning tape drives. The technology industry has matured to the point where there is now an emerging mass market for this rental model. Led by Amazon, most cloud services have largely been aimed at start-ups, like the legion of Facebook and iPhone applications developers who found they could rent a first-class computing infrastructure on the fly.
Now cloud providers are trying to bring these types of flexible services to the more conservative and lucrative world of large corporations. Although most large companies have taken their first cautious steps into the cloud, many are anxious about data failures and slow delivery of data over a network.
To alleviate those concerns, Google held a daylong conference last week called Atmosphere at its Mountain View, Calif. Companies have also used Amazon as a backup system, either to handle sudden spikes in computing demand or to keep information in a secondary spot in case of a disaster.
For that to happen, Amazon and other cloud providers will have to convince big business. Thinking deep Almost every big company is cautiously testing the waters these days. Paul, Minn. When given a clean slate, many new companies have chosen a full embrace of the cloud model, figuring the technology industry has matured to the point were these types of services make basic business sense.
For example, Arista Networks, a five-year-old company that makes networking equipment, runs its sales software with a cloud software company called NetSuite, its corporate e-mail on Google Apps, and other Web infrastructure with Amazon.
Instead it sequentially scans through the files on the hard drive and looks inside the contents of each one of them. Though Agent Ransack is quite fast for an unindexed search program, it is slow compared to the index-based ones like Everything Search. Got it. Explore music. Time by L. Paisley Shirt Records. Bill Roe. Rob Yazzie. Jacob Daneman. E Steele. Ben Hubbird. Thomas Hyland. Julien Riou. Linley Kissick. Capes and Fog.
John Beckinsale. Joe Duffy. Hockey Dad Records. Chef LeClam. One-Dimensional Man. Tadej Strok. Dora Cardinal. Lisa A. V F LeFevre. Thomas Gamble.
Ned Norland. Cameron Johnson. Includes unlimited streaming of L. Tape of L.
Autumn Leaves - Duke Ellington And His Orchestra - Ellington Indigos (Vinyl, LP, Album), Crunch (2) - The Laurel EP (Vinyl), Money Power Fame Respect - Total Abuse - Total Abuse (CD, Album), Summer Junkies - Im Gonna Love You / To Be With You (Vinyl)