Archive for 2010/09/19
Warner Bros. exec Barry Meyer admits the obvious: their content won’t show up on Apple TV’s because the price wasn’t right
Globalization, a new priority this year, was ranked as the No. 10 concern on the survey. The top four areas, including IT and business alignment – a perennial concern of IT leaders – received extremely high ratings.
The British Phonographic Industry (BPI), a self-confessed representative voice of the UK recorded music business (Copyright Holders), reports that the number of legal digital music downloads over broadband internet connections in the UK has now surpassed the 500 Million mark.
2010 102.30m (to August)
2010 170m (estimated year end)
Labels have this bizarre theory of copyright that says that even if you have a music locker with entirely legal and authorized music, you still need to pay license fees to stream the music from the locker
“When someone has a really high ad click probability, they’re very hard to beat, so it’s not a really competitive auction,” McAfee told The Reg. “So that they don’t just win [every auction], we do squashing. This makes the auction more competitive.
“It’s like handicapping. We handicap the people with the high click probability.”
This, McAfee said, can increase Yahoo!’s revenues. “The bidders respond by bidding higher. The one who was destined to lose is now back in the race, so they bid higher trying to displace the number one, and the number one is trying to fend them off so they bid higher too.
“We can make the competition a bit more fierce using squashing, even on keywords where there’s not much bidding.”
Network provider O2 told customers this week that some iPad data allowances will be cut by up to two thirds from next month.
The news that a brace of current deals were for a promotional time period only caught many customers unawares, and some are switching telcos as a result.
“The overall likelihood of any particular entity being the subject of state espionage has probably never been higher, though paradoxically many of the vulnerabilities exploited both in cyber espionage and traditional espionage are relatively straightforward to plug if you are aware of them,” he said.