четвртак, 5. децембар 2013.

If TV Characters Had OKCupid Profiles


It's not just you who can't get a date — even beloved characters from television are striking out when it comes to their love lives So, of course, the only option is to turn to everyone's favorite (and somewhat creepy) 21st-century dating site, OKCupid See also: 13 Sexting Lessons From Dr. Seuss The blog The Connectivist imagined if characters like Jesse Pinkman and Dwight Schrute had online profiles. Admit it — you'd be sending a private message their way BONUS: Artist Recreates TV Show Apartments With Intricate Floorplans Have something to add to this story? Share it in the comments.

8 Brands Rocking Snapchat


Mobile apps such as Twitter, Vine, Instagram and Snapchat are turning traditional media marketing upside down, challenging brands in increasingly new ways. Human interactions are key to brand loyalty and building a strong consumer base, and these mobile apps allow for two-way conversations. Snapchat, which launched in the iTunes App Store in September 2011, is popular with a much younger demographic than some marketing execs are used to, but it takes little or no cost to interact with customers by way of snaps. Compare that to other pricey forms of old-school advertising, and that’s a major plus.

Man Spends Night in Jail for Taking 5 Cents' Worth of Electricity


A man was arrested for charging his Nissan Leaf electric car at a Georgia middle school in November, according to a local ABC News report. Officers charged Kaveh Kamooneh with misdemeanor theft of what a local NBC station reported to be five cents' worth of electricity. The police officer checked with the middle school and determined that Kamooneh had not been given permission to charge his car with the school's electricity. He then spent just over half a day in jail before being released on $150 bail. "I'm waiting for them to arrest water drinkers and cell phone chargers," Kamooneh said, according to the news report.

'Fast and Furious' Pays Tribute to Paul Walker in Gut-Wrenching Video


The Fast and Furious franchise is celebrating the life of Paul Walker, who died Saturday in a car crash, with an emotional YouTube video set to Diddy and Skylar Grey's "Coming Home." Walker played undercover agent Brian O' Conner in the Fast and Furious films, which have earned $2.3 billion worldwide since 2001. The heartbreaking tribute is a reel of scenes. See also: Deciphering a Death: Paul Walker's Final Moments Play Out Online "The most important thing in life will always be the people in this room, right here, right now," Dominic Toretto, played by Vin Diesel, says in one scene. "Salute, mi familia."

Digital spy tech could face same regulation as weapons in international treaty


A consortium of international governments are working on an update to a nearly 18-year-old agreement in order to limit the export of various electronics security technologies. Citing sources familiar with the talks, The Financial Times says the UK government in particular wants to limit the movement of "complex surveillance and hacking software and cryptography," as part of the 1996 Wassenaar Arrangement. That agreement was established in mid-1996 to control arms exports between its 41 participating countries (including the US), and could now be expanded to further limit security technologies, just like guns. Enemies with easy access could use that technology One such concern are programs designed to scan for hidden or otherwise obfuscated computer code in data that's crossing a network. Enemies with easy access could use that technology to more easily pick up on rival intelligence and espionage efforts, creating a veritable arms race between nations. The move could affect companies that sell cyberspying software internationally. That list includes Milan-based tech security consultancy Hacking Team, which sells commercial hacking software to law enforcement agencies, as well as government intelligence agencies worldwide. Such companies have attracted attention for enabling spying on private citizens, though have seemingly operated within the confines of the law. The Wassenaar Agreement, for its part, was last updated in December 2012, with changes to export rules for arms and other technologies, as well as the addition of Mexico as a participating state.

Applebee's installing 100,000 tablets to take orders and kill boredom


Do you love going out for jalapeño poppers but hate the human interaction it always requires? Applebee's apparently knows the feeling: the middling restaurant chain is adding tablets to its tables and bar areas to let you order your food and pay the check without having to track down your server. There will even be games for times when you're eating alone, or with someone who makes you wish you were eating alone. Tools will let you share what you're eating with Facebook buddies The plan involves the purchase of 100,000 tablets from food service tablet maker Presto, which include a standard credit card reader as well as NFC to link up to mobile wallet apps. These are going out to 1,800 Applebee's locations in the US by the end of 2014. The company also says it plans to add other features like streaming music, video, and even tools that will let you share what you're eating with Facebook buddies. Applebee's is the latest big food chain to implement tablets for ordering, and picking up the bill. Chili's announced plans to install touchscreen ordering and entertainment devices in the majority of its 1,266 US locations back in September using technology from Presto rival Ziosk. Parent company DineEquity might bring the technology to IHOP locations too. The move to tablets in some chains has caused friction given the threat it poses to replacing human servers, though Applebee's told Businessweek it plans to keep the same number of people working at those locations — at least for now.

Microsoft labels US government a ‘persistent threat' in plan to cut off NSA spying


Microsoft is unveiling an aggressive plan today to combat government surveillance. Brad Smith, Microsoft’s general counsel, says the software giant shares the concerns of its own customers about government surveillance of the internet, and is planning to address them with improved encryption, legal protections, and source code transparency. In a detailed blog post, Smith labels government snooping an "advanced persistent threat," a term generally used to describe teams of hackers that coordinate cyberattacks for foreign governments. Microsoft’s response follows recent revelations that the NSA has been secretly collecting private user data from various tech giants. The Washington Post revealed details of a program, known as MUSCULAR, that the NSA uses to tap into networks owned by Google, Yahoo, and Microsoft to obtain user information. Documents released by former NSA contractor Edward Snowden revealed a number of Microsoft-owned services have been targeted by the NSA, allegations Microsoft says it’s "especially alarmed" at. Server-to-server encryption planned for end of 2014 The NSA’s methods of targeting weaknesses in encryption between servers and data centers have forced Google and Yahoo to step up their own efforts to prevent NSA snooping. Microsoft is following a similar path, promising to pursue an engineering effort across the firm to strengthen its encryption processes. Smith notes that all of Microsoft’s "key platform, productivity and communications services" will encrypt customer data with strong 2048-bit encryption as it moves between data centers. While Smith doesn’t provide a full list of Microsoft’s key services, Outlook.com, Office 365, SkyDrive, and Windows Azure are all used as examples. Skype is the notable exception from the small list of examples, despite allegations that the communications service had been integrated into an NSA PRISM surveillance program previously. Microsoft says it will also encrypt data moving between its servers and customers by default. The server-to-server and customer encryption plans will both be in place fully by the end of 2014, and Microsoft is also working with competitors to ensure data travelling between services, such as email communications, is protected in future. Some services, such as Office 365 and Outlook.com, already encrypt data travelling between Microsoft and customers, and Microsoft is also encrypting Windows Azure storage as it’s moved between servers as well as most Office 365 workloads. "In other areas we’re accelerating plans to provide encryption," says Smith. While Microsoft’s promises to encrypt data seem like an obvious oversight in hindsight, technology firms have avoided such protections previously due to their complexity and performance impact on server operations. Microsoft will challenge gag orders in court Microsoft is also tackling NSA snooping with new legal protections. Smith says Microsoft is "committed to notifying business and government customers if we receive legal orders related to their data." While gag orders prohibit Microsoft from doing this on occasions, Smith notes the company will challenge them in court. "We’ve done this successfully in the past, and we will continue to do so in the future to preserve our ability to alert customers when governments seek to obtain their data." Microsoft is also pushing for government agencies to obtain data directly from its business customers, rather than securing it through requests to access it through the various cloud services the firm operates. While Microsoft has just opened a new Cybercrime Center to allow third-party security researches to work alongside its employees, the software maker is also opening "transparency centers" that will allow foreign governments to inspect the software code Microsoft produces. The centers will be opened in Europe, the Americas, and Asia, allowing third parties to confirm there are no back doors in Microsoft’s software source code. "We all want to live in a world that is safe and secure, but we also want to live in a country that is protected by the Constitution," explains Smith. "We want to ensure that important questions about government access are decided by courts rather than dictated by technological might."