For years, the company has designed the servers, networking gear, and perhaps other hardware that helps drive its many web services. Google is pretty secretive about its hardware work — the company sees it as a competitive advantage — but at Google’s annual stockholder meeting Chief Financial Officer Patrick Pichette actually spelled it out. He called his company “probably” one of the world’s largest hardware makers.
Archive for 2012/06/22
Google is a web company, and it rakes in most of its money from online ad sales, but it has another identity that few people understand: It’s also a massive hardware makerPosted: 2012/06/22 in Education / Awareness, Google, New Business Models, Stats / reports, Tech Evolution
Google Maps Coordinate, a new tool designed to improve communication between businesses and their employees in the fieldPosted: 2012/06/22 in Education / Awareness, Google, New Business Models, Privacy / Data Protection, Stats / reports, Tech Evolution
Imagine you are a call center operator at an electric utility company. A call comes in reporting a downed powerline in one of the northern suburbs of your city, and an entire neighborhood is without power. You need to quickly dispatch one of your line repairers to the site, which is almost an hour away. To save time and get the power back up quickly, you want to know which line repairers are already in the area and send them the relevant information about the job.
As the number of mobile employees continues to grow, so does the need for a location sharing solution that works in real-time.
When a business signs up for Google Maps Coordinate, they get access to the Google Maps Coordinate web and mobile apps.
Employees in the field download the mobile app to their phone and then can:
- Share real-time location. Google Maps Coordinate is built on Google’s mapping and geolocation infrastructure so the app will send an accurate location, even if you’re indoors (Google Maps Coordinate integrates with Google Indoor Maps).
- Record data. Mobile teams often need to collect information while out in the field. Google Maps Coordinate allows the admin to customize the fields that the mobile team needs to capture and collect – from measurements to client contact details – directly in the app.
Meanwhile, a designated dispatcher back in the office can:
- Create teams. Add team members to a Google Maps Coordinate team and see their locations in the Google Maps Coordinate web and mobile app. For example, our electric utility company might create a special team for home electricians and another for line repairers.
- Manage jobs. Easily create jobs, precisely locate the job, assign the job to the nearest team member and notify them instantly. The next time there is a downed powerline, the operator at the utility company will have no problem identifying the closest team member and assigning them to investigate the issue.
- View past jobs and locations. Get the hard data you need to make strong business decisions. With Google Maps Coordinate, businesses can easily visualize the locations of all their jobs and teams, including current and past jobs. Businesses can assess where they should be assigning or hiring more workers and how to optimally place their teams.
Notions of privacy continue to evolve in response to the spread of new digital technologies and the continuous growth of the consumer societyPosted: 2012/06/22 in Education / Awareness, Privacy / Data Protection, Public Policy, Stats / reports
Two thirds of consumers surveyed agree that their definition of privacy is changing due to the internet and social media and four fifths agreed that disclosing personal information is an increasing part of modern life. Three quarters of the most connected, high-tech savvy consumers in the sample agree that being on social networks has changed their view of what is and is not private.
Digital media continues to expand the scale and depth of the interface between consumer and company
It wasn’t from an attack or from too many Euro 2012 football fans, Twitter’s crash came from a failure with an update of Twitter’s own infrastructure
- Email users send more than 204 million messages;
- Mobile Web receives 217 new users;
- Google receives over 2 million search queries;
- YouTube users upload 48 hours of new video;
- Facebook users share 684,000 bits of content;
- Twitter users send more than 100,000 tweets;
- Consumers spend $272,000 on Web shopping;
- Apple receives around 47,000 application downloads;
- Brands receive more than 34,000 Facebook ‘likes’;
- Tumblr blog owners publish 27,000 new posts;
- Instagram users share 3,600 new photos;
- Flickr users, on the other hand, add 3,125 new photos;
- Foursquare users perform 2,000 check-ins;
- WordPress users publish close to 350 new blog posts.
Whilst the mainstream medical profession deny the link between autism and the triple shot of measles, mumps and rubella, there have been many who have argued to the contrary. Statistics show the increases in autism correlate alarmingly with the introduction and uptake of the MMR vaccine. And Now in an Italian court, there has been a landmark ruling for a child whose parents claim that his autism was triggered by MMR.
The parents of Valentino Bocca have been awarded 112,000 Euro to be paid by the Italian ministry of health. They are now seeking a further 800,000 Euro in a civil case. The story is a tragic one, Valentino, developing normally, was given the shot at 14 months and started to suffer from diarrhea, lost interest in food and within a few days lost the ability to use his spoon. Worse was soon to come when he began to be restless at night, screaming in pain for hours. It was later found that he was suffering from a painful bowel condition that is common in autistic children. With an adjusted diet of no wheat or milk, he was able to sleep but the autism symptoms continued, and even at the age of nine, he still does not speak.
The case featured three expert witnesses that concurred that “barring preexisting conditions there was a reasonable scientific probability that the MMR jab had triggered Valantino’s condition.” Judge Lucio Ardigo agreed that it was “conclusively established” that Valentino had suffered from an “autistic disorder associated with medium cognitive delay” and his illness, was linked to receiving the shot. The Italian shot has the same ingredients as the one used in the UK and US.
The Office of Fair Trading is concerned the social network’s $1 billion purchase of the photo-sharing site might restrict or cut off competitors.
The First Amendment has wandered far from its purposes when it is recruited to protect commercial automatons from regulatory scrutinyPosted: 2012/06/22 in Education / Awareness, Legislation, Public Policy, Stats / reports
Five Republican senators have introduced what’s been dubbed the “Data Security and Breach Notification Act of 2012,” as a way to compel corporations and other entities to disclose data breachesPosted: 2012/06/22 in Education / Awareness, Legislation, Network Security, Privacy / Data Protection, Public Policy, Stats / reports
Rop Gonggrijp – When Security Has Been Broken By Design, Governments And Corporations Are Gambling On Security. And The Gamble Is CheapPosted: 2012/06/22 in Education / Awareness, Network Security, Privacy / Data Protection, Public Policy, Stats / reports
“…unless you can hack it, it’s perfectly secure and wonderful…and a somewhat theoretical argument…or I would say fundamental argument, about why things are wrong a certain way and right another way, just simply doesn’t seem to cut it. So I think the only way to make an impression is to just hack it, break it, show that it’s broken…”
#HITB2012AMS Video: Day 1 Special Closing by Rop Gonggrijp
Submitted by l33tdawg on Wed, 2012-06-20 15:41
Rop Gonggrijp is the founder of the Dutch hacker magazine Hack-Tic and was believed to be a major security threat by authorities in The Netherlands as well as in the USA. In 1993, a number of people surrounding Hack-Tic including Gonggrijp founded XS4ALL. It was the first ISP that offered access to the Internet for private individuals in the Netherlands. Gonggrijp sold the company to the former enemy Dutch-Telecom KPN in 1997 and founded ITSX, a computer security evaluation company.
Gonggrijp has also been the main organizer of the Dutch series of hacker events held every four years. Originally organized by the cast of Hack-Tic, these events have continued to live to this day. Throughout the years, Rop has repeatedly shown his concerns about the increasing amount of information on individuals that government agencies and companies have access to. In 2006 he founded the organization “Wij vertrouwen stemcomputers niet” (“We do not trust voting computers”) which campaigns against the use of electronic voting systems without a Voter Verified Paper Audit Trail and which showed in October 2006 on Dutch television how an electronic voting machine from manufacturer Nedap could easily be hacked.
On May 16, 2008 the Dutch government decided that elections in the Netherlands will be held using paper ballots and red pencil only. A proposal to develop a new generation of voting computers was rejected.
Two of China’s top telecommunications companies may be selling subsidized gear in the United States, and legislation could be proposed to deal with any related national-security threatPosted: 2012/06/22 in Education / Awareness, Legislation, New Business Models, Public Policy, Stats / reports
The committee is investigating what some U.S. officials suspect are close ties between the Chinese government and each of the firms, Huawei Technologies Co Ltd and ZTE Corp.
The concern is whether any of their equipment or its software is designed to steal information or “establish the ability to do cyber attacks,” panel chairman Mike Rogers said.
Many believe that the gear is subsidized “so it can be multiple times cheaper than any local competitor,” Rogers told a conference hosted by Bloomberg Government, a subscription web site.
Boiling Cauldron Filled With US Govt, Israel, Microsoft, CIA, NSA, Flame, Duqu And Stuxnet. Only Ingredients Missing Are Google, Apple and Facebook
Court Upholds Google-NSA Relationship Secrecy
Department Of Justice Wants Court To Keep Google/NSA Partnership Secret
Is Microsoft Intentionally Disrupting Criminal Investigations Into Botnets? If So, Why?
Fox-IT Releases Highly Critical Report About Microsoft’s Botnet Takedown Attempts. Microsoft Actually May Have Made Matters Worse
Microsoft warns companies are put at risk by government cyber wars
Iran’s Intelligence Minister Heydar Moslehi said the country’s arch enemies the United States and Israel, along with Britain, had planned the attack.
“Based on obtained information, America and the Zionist regime (Israel) along with the MI6 planned an operation to launch a massive cyber attack against Iran’s facilities following the meeting between Iran and the P5+1 in Moscow,” Iran’s English-language Press TV quoted him as saying.
“They still seek to carry out the plan, but we have taken necessary measures,” he added, without elaborating.
Talking to TorrentFreak, Megaupload lawyer Ira Rothken reiterated that the U.S. Department of Justice is not playing by the bookPosted: 2012/06/22 in Copyright, Education / Awareness, Enforcement, File Sharing, Illegal File Sharing, Litigation, Public Policy, Stats / reports
“The DOJ failed to follow the rules which requires a foreign corporation to have an office in the United States as a condition of service of an indictment,” Rothken said.
“Megaupload Ltd is a Hong Kong corporation and has never had an office in the United States. The rules on service of an indictment are designed in part to respect foreign sovereignty,” Rothken adds.
Internet service providers (ISPs) and copyright holders in Denmark have agreed on a framework that would see all ISPs in the country block access to copyright-infringing content if one of the providers is ordered to do so by a court.
“Telecommunications industry and rights-holders have entered into an agreement about the procedure in cases involving blocking access to illegal services on the Internet. The parties have indicated that they will formalize this in the form of a written Code of Conduct” , “The agreement assumes that all telecommunications companies will respect the final decision of the courts that a telecommunications company block customers’ access to an illegal service.”
“This means that holders only need to take legal action against a telecom company, then the other carriers follow the decision. This is an automated process where the rights holders need only contact one organization / one telephone company, which will then make sure to communicate this decision to the other telcos. Additionally, the parties indicated that they will try to spread the concept to other relevant parties such as linking to the offending services”
In the UK the government has said that a new code of practice setting out new anti-piracy measures and procedures is expected to be published later this month.
Neo-Nazis operating in the UK have reportedly used YouTube’s advertising revenue-sharing system to gobble up payments from companies that include BT, O2 and Virgin MediaPosted: 2012/06/22 in Education / Awareness, Google, New Business Models, Online advertising, Public Policy, Stats / reports
None of the telcos were aware that the right-wing extremists who had posted the videos on Google’s website were exploiting the search giant’s Adsense network, which allows YouTube members who upload non-copyrighted vids onto the service to slurp up a portion of the advertising bucks.
The payments have apparently helped neo-Nazi groups to generate funding after they posted videos on the site that are often marked by YouTube as “potentially offensive or inappropriate” material.
The Sydney Morning Herald reported that Google had since taken down the videos after been alerted to the fact that the extremists were benefiting from the ads displayed on the content.
It’s unlikely, however, that Google will be able to effectively police such videos, and anyway, the extremists aren’t breaking any of the company’s Ts&Cs; the company allows any YouTube member to benefit from its revenue-sharing service as long as the material is original and not violating someone else’s copyright.
Texas Attorney General Greg Abbott filed a civil lawsuit against Google for its refusal to hand over 14,500 documentsPosted: 2012/06/22 in Education / Awareness, Google, Litigation, Public Policy, Stats / reports
While Google has produced a significant volume of documents in response to the CIDs, Google has withheld a large volume of documents based on assertion of the attorney-client privilege and has claimed that certain documents that were produced are, in fact, privileged, and should be destroyed or returned to Google. Google has not met its burden of demonstrating that the privilege is applicable to many of the documents in question.
All documents pertain to an antitrust investigation that the Texas AG brought against Google in 2010. The suit alleges that the company manipulated search results specifically in areas of shopping, local businesses, and travel therefore violating state and federal antitrust laws. In February 2011, Abbott demanded Google turn over documents for the case. It appears the suit filed today relates to these same documents.
Merlin’s thousands of independent labels and by extension their artists, are pretty happy with what Spotify is paying them – and happier still about big increases in those payoutsPosted: 2012/06/22 in Education / Awareness, New Business Models, Stats / reports
Spotify’s payouts to Merlin’s 10,000-plus indie labels rose 250 percent from the year ending March 2011, to the year ending March 2012, according to Merlin. More importantly, the revenue per user (RPU) “has grown significantly alongside the overall revenue growth and is currently the highest it has been since the launch of the service. We see consistent, ongoing growth on revenue per user, revenue per stream, and the total revenue the service brings.”
Artists can actually make more money from a single fan who streams an album over the course of their lifetime than they would from the same fan if he or she had purchased the album – an effect that will become more pronounced over time.
Yes, for music that has real staying power, CDs and downloads are the real ripoffs – a fact that may have been obscured by all of those physical format shifts from vinyl to 8-tracks to cassettes to CDs, but a fact nonetheless. Every play gets paid for on streaming services, even the ones that happen 50 years after a song is released.
If there is an entitled generation that wants things immediately and free, now you have a Spotify free tier [on mobile], which at least brings them into a legitimate environment where every time they play or stream that song, the artist is getting a payment, and they’re building a relationship with that service.
When they [get older] and get a job, there might be a bit more disposable income and less time to sit there dragging music from The Pirate Bay, and want that level of immediacy and convenience, and be willing to pay for it.
In its early days, reddit was built on lies. Sure, lots of code, but some lies