Apple has a program under which manufacturers get a license to sell accessories for devices. Apple collects a royalty of 20 to 25 percent, said Shaw Wu, an analyst with Kaufman Bros. in San Francisco. “If you sell speakers for $100, Apple gets $20 to $25,’’ he said
Archive for July, 2010
Questions Surround Wikileaks Founder Assange
Assange and other activists briefly rented a house in Reykavik, which they turned into a bunker filled with computers. People used initials instead of names and took their direction from Assange, who worked in feverish bursts of energy in front of a computer screen.
Why WikiLeaks turned to the press
Around the time that the video was released, hubris among the WikiLeakers was thick. In the New Yorker piece, we hear from a friend and supporter of Assange’s, a Dutch hacker named Rop Gonggrijp, who smugly says that “we are not the press” and “the source is no longer dependent on finding a journalist who may or may not do something good with his document”.
Yet here we are, several months later, and Assange is acting very much like an old-fashioned source, seeking out journalists even as he uploads the raw source documents to the web.
When online state testing becomes mandatory in Florida in 2015, Chris Bress foresees school districts having their hands full simply trying to access the exams.
“If even only 50 percent of the schools statewide are testing at a time, that could be a million requests to [the Department of Education’s] server,” says Bress, executive director of learning through technology and media for Charlotte County Public Schools in Port Charlotte, FL. With so many schools fighting for a finite amount of bandwidth, trying to enter the same website at once, Bress says latency and access will be critical problems come testing season.
Although online testing won’t begin for another five years, Bress says the state is encouraging school districts to implement technology to help avert traffic jams when the time comes. “It’s going to become critical,” he says.
What bandwidth management software does is offer a window into the network, lending a real-time view of how traffic is moving about while calling attention to bottlenecks and bandwidth hogs. Armed with that information, IT staff can use the dashboard to perform a kind of bandwidth triage, “shaping,” in IT terms, bandwidth flow to make the best use of what’s available: blocking some sites, allowing total access to others, and “throttling”—enabling reduced bandwidth to—still others. That ensures proper delivery of essential web-based content while controlling the delivery of nonessential but permitted content, as determined by the district, such as social networking or gaming sites.
The metric likely will report a system’s throughput in bits per second while checking for a range of viruses and malware programs
Hong Kong’s Privacy Commissioner for Personal Data Roderick Woo said on Friday Google has agreed to erase all the Wi-Fi payload data collected in the city and the watchdog decided not to launch a formal investigation to the leading search engine
Consumers and customers it appears, want to be and are increasingly in charge of not only their interactions with firms but also with their data that these companies collect, witnessed by the blanket do not call, do-not-e-mail and now opt-in-focused privacy legislation
Cyber crime generally refers to criminal activity conducted via the Internet. The most serious among them include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure
A new study from In-Stat finds that wireless HD video-enabled products market looks prospective through 2014, with a robust triple-digit growth expected through four years
The latest independent survey of 1,000 workers from business ISP Star UK has found that 72% of British workers spend their lunch hour online and performing activities like shopping, banking, catching up with the latest sport or chatting to their friends on email or Facebook.
The research was conducted after Star noticed that the network bandwidth usage for business Internet traffic in their data centres was consistently peaking between 12:00 – 14:00hrs, which is normally when British workers should be enjoying their lunch breaks.
Oh, well. At least we’re not Belgian
Security shortcomings in Black Hat’s newly established streaming media service allowed a security consultant to hack into the system and see presentations for free
“Libel tourism threatens to undermine free speech in the US because, with the rise of the Internet and foreign courts’ liberal exercise of personal jurisdiction over Americans, foreign defamation law that lacks the constitutionally mandated speech-protective features of US law can be applied to publications that are substantially or entirely distributed in the US,”said Congressman Steve Cohen, who helped to write the law. “Our First Amendment rights are among the most fundamental principles laid out in the Constitution. It is vital we ensure that these rights are never undermined by foreign judgments.”
A futurologist has defended his controversial warning that “smart dust” is liable to become a future information stealing threat
Apparently, there are a flood of torrents where gamers can download purportedly pirated versions of SC2. While your less ethical gamer might cheer this news, you might be less pleased to find out that some of the SC2 torrents appear to bring along a side order of malware. One of the torrents, for example, touted as a custom game launcher, drops the Zbot keylogger Trojan—albeit a variant we can easily detect and remove.
While this isn’t exactly new, we’re finding that the incredible demand for this game is driving malware distributors to supply something that looks like what the gamers want. We’ll keep an eye on this trend, and update the post if necessary with more details as they become available.
And if you want a copy of the game, just go out and buy it. It may not be the most thrifty use of your money, but it’s the ethical thing to do, and the safest way to get a copy of the game.
What is this about? > 1750 people gaming against each other during 11 days, 24 hrs a day. From 30th July 2010 until 9th August 2010.
Tech infrastructure: 1,000 KVA, 40,000 liters of diesel fuel and a 500 Mbit Full duplex line powered by Ziggo. Every gaming sector has a core routing-switch with 2x or 3x10gigabit uplink. (HP ProCurve 5406 & HP ProCurve 6600-24G-4XG).
Field switches (HP ProCurve 2824, 2848, 2510-24G and the 100mbit HP ProCurve 2626 model) have been attached to the core routing switches enabling ‘campers’ to plug in their ethernet cables.
An HP ProCurve Wireless Edge Services Module combined with a number of HP ProCurve RadioPorts 210/230 provides wireless networking.
to temporarily stop licensing online games, ban advertisements of online games, and cut off from 11pm to 6am internet access to shops that offer public the use of PCs.
YouTube discusses copyright infringement, video identification, clearing rights
The United States should decide on rules for attacking other nations’ networks in advance of an actual cyberwar, which could include an international agreement not to disable banks and electrical grids, the former head of the CIA and National Security Agency said Thursday.
Hayden used the opportunity to challenge attendees of Black Hat–thousands of programmers, analysts, and security researchers–to devise ways to reshape the Internet’s security architecture.
“You guys made the cyberworld look like the north German plain–and then you bitch and moan because you get invaded,” he said. “We made it flat. We gave all advantages to the offense. The inherent geography in this domain plays to the offense. There’s almost nothing inherent in the domain that plays to the defense.”
You can already manage your Comcast DVR from your iPhone, but soon you’ll be able to do the same with BlackBerry and Android as well. No date announced, but it’s coming.
A couple caveats to these. Just because a company is on the list, doesn’t mean that it’s a sanctioned download by the company itself to grab the user information for some purpose. It could easily just be some dude at the company who wanted to download the torrent himself to check it out
First, it’s good to get more people realizing that HTML is already pretty damn good at creating app-style experiences, without having to create special compiled code and, second, it’s a really clever way to totally route around Apple as a gatekeeper (without requiring a jailbreak), and is a reminder that even on “closed” systems, openness will often find a way.
White House proposal would ease FBI access to records of Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation