Submerge can easily create hard-coded subtitled movies for your computer, mp3-player, cellphone or game console. It will merge your subtitle file with your movie and create a new file that is suited for your needs. It supports almost all text-based subtitle formats and you can export the movie for the most common devices with just one click. It also has a fullscreen player built-in, so you can watch the subtitled movie directly within Submerge
Archive for 2010/07/20
No one knows how much — if any — theft will be prevented by a premium VOD window. The risk of negatively impacting the pricing scheme, however, seems high and not unprecedented. I find it hard to believe studios really like rentals for a $1.
Please don’t say, “We need to give the consumer what he wants,” because the historical implication was, “or your competitor will provide it,” not “or the customer will steal it.” The proper response cannot be to cede to the thieves’ demands and earn less along the way.
If I were the studio execs, I would focus on catching and punishing thieves and look for less destructive opportunities to grow my business. Currently, the studios are enabling the digital transformation of exhibition. They should look for ways to further monetize the digital theatrical platform they are helping to create.
We all know about the frog in the frying pan: A frog cannot sense gradual changes in temperature. Put him into a frying pan and slowly turn up the heat, and he will cook before realizing he has to jump out. I have always hoped that the gradual decline in the length of the exhibition window has not been the slowly increasing heat. Studio execs, be careful before you cook us all, yourselves included.
Over 45,000 companies of all sizes use eXpurgate to check and categorize more than a billion e-mail messages every dayPosted: 2010/07/20 in Blocking, Education / Awareness, Filtering, Network Security, Stats / reports
eleven – E-mail security “Made in Germany”
eleven is a leading e-mail security provider based in Germany. Its eXpurgate technology, which is unique worldwide, offers a spam filter and e-mail categorization service that protects the user reliably from spam and phishing, detects potentially dangerous e-mail and can distinguish between individual messages and any kind of mass e-mail. eXpurgate also offers numerous virus protection options and a powerful e-mail firewall.
Over 45,000 companies of all sizes use eXpurgate to check and categorize more than a billion e-mail messages every day. Customers include Internet service providers and telecommunication carriers such as T-Online, O2, Vodafone and freenet as well as many well-known companies and public institutions, including Air Berlin, the Federal Association of German Banks, DATEV, the Free University of Berlin, Landesbank Berlin, Mazda, RTL, ThyssenKrupp and Tobit Software AG. For more information, visit our website at: http://www.eleven.de.
Search Guide is technology that addresses problems associated with common browser errors, such as when someone mistypes a website address. Rather than getting an error message, it suggests alternate search results. For example, if you typed in www.sandvone.com, it would suggest www.sandvine.com.
Internet service providers that use Search Guide receive revenue when their subscribers click on the sponsored links that appear alongside the alternate search results
“Should Adobe Reader need to perform an action that is not permitted in the sandboxed environment, such as writing to the user’s temporary folder or launching an attachment inside a PDF file using an external application (e.g. Microsoft Word), those requests are funneled through a “broker process,” which has a strict set of policies for what is allowed and disallowed to prevent access to dangerous functionality”
Google agreed…that it will respect China’s laws and regulations,” Zhang Feng, an official with China’s Ministry of Industry and Information Technology, told members of the press, according to an Agence France-Presse report. “That is to say, it will not provide any information that will endanger China’s national security, damage China’s national interests, instigate ethnic hatred, spread superstitious information, damage social stability, or (provide) pornography, violence or slanderous information.”
Rush’s bill applies to any “person” or business that stores personal information, including someone’s name, mailing address, e-mail address, and phone or tax number. That person must provide, if requested, “access to” information stored about others
Estonia’s plans for a national high speed broadband infrastructure have been given a green light by the European Commission
Yes, Google is an advertising company. But you can bet that its internal data suggests that even if an ad blocker is available for its browser, most netizens won’t bother to install it
…I imagine they [Pirate Bay] won’t pay much attention to this ruling either
…if BREIN wants to target users, it should target them individually
Biggest ever investment
Dutch ISP KPN is trying to cope with problems affecting their infrastructure. On Tuesday it turned out that a faulty cable might have been the cause of dropping DSL, phone and TV connections of KPN’s customers in major cities such as Rotterdam, The Hague, Utrecht, Zoetermeer and Amersfoort. Mobile connections are being affected too.
Folks in Utrecht will not have to pay for their parking tickets today: the vending machines that produce the tickets are connected to the internet too and thus currently offline. Even the gadgets that parking attendants use to verify the validity of the tickets are unable to connect to the network.
KPN’s mobile operator Hi has posted an alert on their Twitter account…for those who can read it.
Dutch language article: http://www.nu.nl/internet/2296310/grote-storing-treft-kpn-en-hi.html
Where you Point Your Mouse May Influence Google Search Rankings, Advertisement Placement, and OneboxesPosted: 2010/07/20 in Google, New Business Models
Information about where searchers hover their mouse pointers over different parts of search results, as well as advertisements and Google Onebox results, may be collected by the search engine to be used as ranking signals to determine in part how relevant those items may be seen by Google users in response to a search query
To recap: subscribers up, revenues up, bandwidth costs down, infrastructure costs down. This might seem like a textbook case of “viability”; what were execs like Britt and Hobbs talking about last year when data caps were held up as a necessary safeguard against doom?
It’s about bandwidth labor. TWC’s single biggest expense for Internet access is not network investment or bandwidth. It’s labor.
Congestion can happen even on networks with tremendous bandwidth, but consumption pricing doesn’t generally care about congestion (if it did, ISPs could exempt all traffic in the middle of the night, for instance, when congestion is generally absent).
So why the push for consumption pricing? Turner has his own theory.
“This is nothing more than greed,” he says. “The industry may be maturing, and therefore margins aren’t rapidly increasing the way they were.” Consumption pricing could be a way to boost margins. As for ISP complaints that heavy users cost them more money, those are just “excuses that they give.”
With the rise of Web sites built around material submitted by users, screeners have never been in greater demand. Some Internet firms have tried to get by with software that scans photos for, say, a large area of flesh tones, but nothing is a substitute for a discerning human eye.
- tech giants like Microsoft, Yahoo and MySpace, a division of the News Corporation, all outsource some amount of content review
- YouTube, a division of Google, is an exception. If a user indicates a video is inappropriate, software scans the image looking for warning signs of clips that are breaking the site’s rules or the law. Flagged videos are then sent for manual review by YouTube-employed content moderators who, because of the nature of the work, are given only yearlong contracts and access to counseling services, according to Victoria Grand, a YouTube spokeswoman.
- Facebook, the dominant social network with more than 500 million members around the world, has relied on its users to flag things like pornography or harassing messages. That material is reviewed by Facebook employees in Palo Alto, Calif., and in Dublin.
Internet companies are reluctant to discuss the particulars of content moderation, since they would rather not draw attention to the unpleasantness that their sites can attract
We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture.1 Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the public’s great equalizing force in the digital millennium, because it will serve as “a counterbalancing force and bulwark to defend digital liberties” against forces lobbying for stronger copyrights and increased technological controls.
Full report: http://jolt.richmond.edu/v16i4/article14.pdf