Google is announcing today that it's working together with Microsoft on a new YouTube application for Windows Phone. Following a fight with Microsoft over its unauthorized YouTube app, the pair appear to have resolved some of their differences. Google demanded that Microsoft should remove its app by May 22nd, but Microsoft issued an update to address some of Google's concerns earlier this week. Google says "Microsoft and YouTube are working together to update the new YouTube for Windows Phone app to enable compliance with YouTube's API terms of service, including enabling ads, in the coming weeks."
Google Inc. is deep into a multipronged effort to build and help run wireless networks in emerging markets as part of a plan to connect a billion or more new people to the Internet. These wireless networks would serve areas such as sub-Saharan Africa and Southeast Asia to dwellers outside of major cities where wired Internet connections aren't available, said people familiar with the strategy. The networks also could be used to improve Internet speeds in urban centers, these people said. They're looking at all sorts of different technologies to achieve this: satellites through blimps to microcells that broadcast a 3G signal perhaps half a mile. There will be a certain amount of mix and match depending upon the precise circumstances of the area to be covered.
Only six of the remaining original 1976 "Apple 1" computers still work, and one has a new owner. At an auction in Germany Saturday, an anonymous telephone bidder purchased the computer for a record-breaking price of $671,000. The computer had been estimated to be worth between $259,000-$388,000. Apple Computer Company, now called Apple Inc., was established in 1976. The first order was for 50 computers, assembled in a garage by Steve Jobs and Steve Wozniack.
Iranian hackers launched attacks as part of a campaign against the country's oil and gas industry, according to current and former U.S. government officials. Iranian hackers have amped up a campaign of cyber-attacks against America's energy industry, according to a report from The Wall Street Journal. Citing current and former U.S. officials speaking under the blanket of anonymity, the Journal reported that Iranian hackers accessed control system software that could have allowed them to manipulate oil or gas pipelines. The attacks raise the stakes in cyber-space between the U.S. and Iran, which has been accused by U.S. officials of being behind a spate of distributed denial-of-service attacks (DDoS) against U.S. banks stretching back to 2012.
Combining two security products can improve detection rates of attacks, but generally less than predicted, research finds. Security companies tend to use the same threat data to construct their defenses against the latest attacks, a practice that causes different security products to fail to catch specific attacks more often than expected, according to a report released by security information firm NSS Labs. In tests over the past 18 months, the company evaluated 37 intrusion-prevention systems, antivirus programs and next-generation firewalls and found that none of them stopped every exploit in the company's testing pool. While 19 out of the 606 combinations of two security products were able to stop all the exploits, combining two products tended to not produce the level of improvement expected, Stefan Frei, research director at NSS Labs, told eWEEK.
An old-school Volkswagen Karmann Ghia is a beauty, but there's nothing old about the engineers-in-training who rebuilt it into an electric car. "And it runs really nice," Cornel Foster, a Minddrive student, said. They have made it cruise like it never could back in 1967. What drives the car is far from traditional energy. It's actually run on social fuel. It starts with a tweet. The tweet sends a signal into a little box in the car that lets it know that it has social fuel and can start running. "Social media being used to power a car that they built is just so perfect," Linda Buchner, the president of Minddrive, said. Every tweet, Facebook like and Instagram share and follow gets routed through a server. If the vehicle doesn't have enough social media buzz, a little black box cuts power to the electric engine. Kids and mentors from the Minddrive program are preparing to drive their creation from Kansas City to Washington, DC, to lobby lawmakers for more hands-on education. The Social Fuel Tour will make stops in several cities; Springfield, IL, Indianapolis, IN, Akron, OH, and Pittsburgh, PA, as they make their way to our nation's capital.
In what would be a major coup for Intel, the chip maker has reportedly cut a deal with Samsung to put its new power-sipping Atom processor in the Samsung Galaxy Tab 3. The forthcoming Samsung tablet will have a "Clover Trail" Intel Atom chip, Venture Beat reported Saturday. Intel's Clover Trail line of Atom chips were introduced last fall. At the time, Intel said the processor line was targeted at low-powered Windows 8 devices that combined the functions of a tablet and laptop. However, the Samsung tablet using the Intel chip will be running Google's mobile operating system Android, according to Venture Beat.
Should owners of intellectual property be allowed to attack anyone they suspect of pirating their goodies? That's a question that was raised last week by the Commission on the Theft of American Intellectual Property. While the commission's observation's about IP thieving by China grabbed most of the headlines when it released its 90-page report last week, buried in the document was a disturbing analysis of the merits of offensive cyber operations by rights holders that, if given legal life, could do some serious harm to the digital lives of many consumers. The commission-made up of former U.S. government officials and military men-is interested in protecting corporate and government networks from IP thieves, but some of their action points, if they became legal, could easily be used by groups like the RIAA and MPAA to bully consumers.
TV Plc (ITV), owner of the U.K.'s biggest commercial TV station, suffered a Twitter account hack today with postings attributed to the "Syrian Electronic Army," a name also used last week when The Financial Times's social media accounts were infiltrated with links to war atrocity videos. The @itvlondon account on Twitter Inc. posted six messages. One said "Francois Hollande to double aid to rebels, including a complementary French flag with every aid package," with a picture of a white flag against a blue, cloudy sky. Another post said "Twitter finally defeats the #Syria-n electronic army,' with a link to an Independent newspaper article. That was followed by another message, which read "Just kidding. The Syrian Electronic Army was here. #SEA via @Official_SEA12."
Sony has responded to the legions of PlayStation fans who took to Twitter, upset over rumours that the company is considering adding DRM to control the sale and trade of used PS4 games. Reports this weekend had suggested Sony may follow Microsoft's rumoured plans for the Xbox One to attach a licensing fee to used games, enabling it to take a cut of resold titles. Using the hashtag #NoDRMPS4 on Twitter and through a thread on the NeoGAF forum PS loyalists quickly registered their displeasure. Responses quickly came in from the Sony camp, including SCEA producer Nick Accordino, who wrote: "Humbled by the outpouring of passionate PlayStation fans and their willingness to talk to us directly. Please know that we hear you." Head of Hardware Marketing at Sony PlayStation, John Koller, added: "This is why I love PlayStation fans- the passion bucket overflows."
email from listeners:
Ralph from Seattle asks "Will Windows 8 be good enough to use for business when Windows Blue comes out?"