<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5182900004351052895</id><updated>2026-02-14T13:53:03.713+05:00</updated><category term="Educational technology"/><category term="Information Technology"/><category term="Latest Technology"/><category term="Latest Technology News"/><category term="New Technologies"/><category term="New Technology"/><category term="Science &amp; Technology"/><category term="Technology"/><category term="Technology News"/><category term="What is Technology"/><category term="google"/><category term="white house"/><title type='text'>Technology Basement</title><subtitle type='html'>The latest news and updates about technology</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>305</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-5972669267683391642</id><published>2015-12-20T00:43:00.000+05:00</published><updated>2015-12-20T00:43:36.653+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="white house"/><title type='text'>Google Intoduced Virtual Reality tours for this holiday of White House</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/98U2jdk8OGI/0.jpg&quot; src=&quot;https://www.youtube.com/embed/98U2jdk8OGI?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/5972669267683391642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/5972669267683391642' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5972669267683391642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5972669267683391642'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2015/12/google-intoduced-virtual-reality-tours.html' title='Google Intoduced Virtual Reality tours for this holiday of White House'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/98U2jdk8OGI/default.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-3252406604812359717</id><published>2013-07-05T08:15:00.000+05:00</published><updated>2013-07-24T15:49:14.895+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Samsung is to spend $4.5 billion on R&amp;D</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVcsIQuZt5Pm_lEFrfNYhN-EQOrs7OEEjpk3mn8w7813QJ5bBtkJt3vu0GBoV51G2CJLZ2cbZznR5X_Al5SXKO7wuuzmJUXgdyD_FjAJjLXTVYtWhtQeeSLS8L3tnJVITbir_wAg2ZVvw/s618/samsung-sign-923.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVcsIQuZt5Pm_lEFrfNYhN-EQOrs7OEEjpk3mn8w7813QJ5bBtkJt3vu0GBoV51G2CJLZ2cbZznR5X_Al5SXKO7wuuzmJUXgdyD_FjAJjLXTVYtWhtQeeSLS8L3tnJVITbir_wAg2ZVvw/s400/samsung-sign-923.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;Research and development spending is absolutely crucial for leading technology companies that hope to stay on&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;top, and&amp;nbsp;&lt;/span&gt;Samsung&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;&amp;nbsp;is a company that isn’t afraid to spend when it comes to R&amp;amp;D. The company has stated in the past that it&amp;nbsp;&lt;/span&gt;planned to make some huge investments in marketing and R&amp;amp;D in an effort to keep rivals at bay&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;, and now&amp;nbsp;&lt;/span&gt;&lt;em style=&quot;font-family: inherit; font-size: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;The Korea Times&lt;/em&gt;reports&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;&amp;nbsp;that Samsung will spend roughly $4.5 billion over the next three years solely to build five new research and development centers in South Korea. “R&amp;amp;D is crucial to ensuring success in the rapidly-changing consumer electronics industry. Total investment will amount to 5 trillion won,” an unnamed Samsung executive told the paper. The exec said that one design center alone, which will be built in southern Seoul, will house nearly 10,000 Samsung designers, developers and other R&amp;amp;D workers. Samsung spent&amp;nbsp;approximately&amp;nbsp;$10.5 billion on R&amp;amp;D in 2012 alone, while top rival&amp;nbsp;&lt;/span&gt;Apple&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px;&quot;&gt;&amp;nbsp;spent about $3.4 billion.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/3252406604812359717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/3252406604812359717' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/3252406604812359717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/3252406604812359717'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/samsung-is-to-spend-45-billion-on-r.html' title='Samsung is to spend $4.5 billion on R&amp;D'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVcsIQuZt5Pm_lEFrfNYhN-EQOrs7OEEjpk3mn8w7813QJ5bBtkJt3vu0GBoV51G2CJLZ2cbZznR5X_Al5SXKO7wuuzmJUXgdyD_FjAJjLXTVYtWhtQeeSLS8L3tnJVITbir_wAg2ZVvw/s72-c/samsung-sign-923.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-7990792151945865368</id><published>2013-07-04T03:20:00.001+05:00</published><updated>2013-07-24T15:49:47.954+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>A massive protest have planned over web NSA spying revelations</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_xABBFVBLVsllBNv5GHR6Dx0hf4EF_DzRPtAr6_MrBz2DUgvbgvZwU_ZJHElYKQnDuULY3iUfxY6TRd7uhNB2svObExr34yA0Ug9Cort7MPc8td2r4V6nkEvFA4q5zIUrg_rktTFLTag/s464/NSA+Web.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_xABBFVBLVsllBNv5GHR6Dx0hf4EF_DzRPtAr6_MrBz2DUgvbgvZwU_ZJHElYKQnDuULY3iUfxY6TRd7uhNB2svObExr34yA0Ug9Cort7MPc8td2r4V6nkEvFA4q5zIUrg_rktTFLTag/s400/NSA+Web.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white; color: #505050; font-family: Arial, Helmet, Freesans, sans-serif; line-height: 16px; text-align: start;&quot;&gt;The NSA&#39;s actions were revealed by whistleblower Edward Snowden&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;introduction&quot; id=&quot;story_continues_1&quot; style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; font-weight: bold; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
Some of the web&#39;s biggest names have backed mass protests over internet surveillance carried out by the US National Security Agency (NSA).&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
The Restore the Fourth movement - referring to the US constitution&#39;s fourth amendment - said it wants to end &quot;unconstitutional surveillance&quot;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
Reddit, Mozilla and Wordpress are among the big web names backing the action, due to take place on Thursday.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
Almost 100 events have been planned across the US.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
An&amp;nbsp;&lt;a href=&quot;http://www.restorethefourth.net/&quot; style=&quot;color: #4a7194; font-weight: bold; line-height: 16px; text-decoration: none;&quot;&gt;interactive map&lt;/a&gt;&amp;nbsp;detailing their locations has been published.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
The site quotes a line from the fourth amendment which pledges &quot;the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures&quot;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
As well as the &quot;real-world&quot; protests, many influential websites plan to display messages of protest on their homepages on Thursday, co-ordinated by a group called the Internet Defence League (IDL).&lt;/div&gt;
&lt;span class=&quot;cross-head&quot; style=&quot;background-color: white; color: #505050; display: block; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.231em; font-weight: bold; line-height: 16px; margin: 0px 0px 16px; text-rendering: optimizelegibility;&quot;&gt;Petition&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
The action has taken inspiration from similar efforts that took place last year.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
Wikipedia, Google and others went &quot;dark&quot;, or put black boxes over parts of their pages, to show their disagreement with proposed anti-piracy measures being discussed by US lawmakers.&lt;/div&gt;
&lt;div class=&quot;story-feature wide &quot; style=&quot;background-color: white; clear: right; color: #505050; display: inline; float: right; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 13px; line-height: 16px; margin: 0px -160px 16px 16px; overflow: hidden; position: relative; width: 304px;&quot;&gt;
&lt;a class=&quot;hidden&quot; href=&quot;http://www.bbc.co.uk/news/technology-23160309#story_continues_2&quot; style=&quot;color: #4a7194; font-weight: bold; left: -5000px; position: absolute; text-decoration: none; top: -5000px;&quot;&gt;Continue reading the main story&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;border-bottom-color: rgb(216, 216, 216); border-bottom-style: solid; border-bottom-width: 1px; border-top-color: rgb(216, 216, 216); border-top-style: solid; border-top-width: 1px; font-size: 1.231em; margin: 0px 0px 8px; padding: 11px 0px 12px; text-rendering: optimizelegibility;&quot;&gt;
&lt;/h2&gt;
&lt;ul class=&quot;links-list&quot; style=&quot;border-top-color: rgb(232, 232, 232); border-top-style: solid; border-top-width: 1px; clear: both; list-style: none; margin: 0px 0px 16px; padding: 7px 0px 0px;&quot;&gt;&lt;br /&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div id=&quot;story_continues_2&quot; style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
In reaction to the revelations made by whistleblower Edward Snowden, Mozilla, maker of the widely used Firefox browser, launched stopwatching.us -&amp;nbsp;&lt;a href=&quot;https://optin.stopwatching.us/&quot; style=&quot;color: #4a7194; font-weight: bold; line-height: 16px; text-decoration: none;&quot;&gt;a petition calling for full disclosure&lt;/a&gt;&amp;nbsp;of the US&#39;s &quot;spying&quot; programmers.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
At the time of writing, the site had amassed 536,559 signatures. Dissident Chinese artist Ai Weiwei is listed as being among the petition&#39;s backers.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
The demand comes at a time when one top US intelligence official was forced to apologise for telling Congress in March that the NSA did not have a policy of gathering data on millions of Americans.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
National intelligence director James Clapper said in a letter to the Senate intelligence committee that his answer had been &quot;clearly erroneous&quot;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;&quot;&gt;
Source:&lt;a href=&quot;http://www.bbc.co.uk/&quot;&gt;BBC&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/7990792151945865368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/7990792151945865368' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7990792151945865368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7990792151945865368'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/a-massive-protest-have-planned-over-web.html' title='A massive protest have planned over web NSA spying revelations'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_xABBFVBLVsllBNv5GHR6Dx0hf4EF_DzRPtAr6_MrBz2DUgvbgvZwU_ZJHElYKQnDuULY3iUfxY6TRd7uhNB2svObExr34yA0Ug9Cort7MPc8td2r4V6nkEvFA4q5zIUrg_rktTFLTag/s72-c/NSA+Web.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-8612828507613599934</id><published>2013-07-04T01:59:00.002+05:00</published><updated>2013-07-24T15:50:04.201+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Twitter is going to use cookies for ad targeting</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikrlC_bEbHNQ8wKNXoBKpj4AMppBSGKK8X91TCDpbm0CjJqzWAzayJP3E2kgy-hIWDTA1a4XctRtqVEjuMVVO8z8vkgUaPcALF9bybv3_r8YDrFFwhINnC7ro3D805dh0R0FEwhSh5Xos/s235/tweet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;365&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikrlC_bEbHNQ8wKNXoBKpj4AMppBSGKK8X91TCDpbm0CjJqzWAzayJP3E2kgy-hIWDTA1a4XctRtqVEjuMVVO8z8vkgUaPcALF9bybv3_r8YDrFFwhINnC7ro3D805dh0R0FEwhSh5Xos/s400/tweet.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
Twitter is only the latest Web company to use cookies, which have been deployed for years by firms like&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;Google&lt;/span&gt;&amp;nbsp;Inc,&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; href=&quot;http://technology-base.blogspot.com/2013/07/the-biggest-data-breach-on-facebook-6.html&quot; style=&quot;color: #006e97; cursor: pointer; outline: none; text-decoration: none;&quot;&gt;Facebook&lt;/a&gt;&lt;/span&gt;&amp;nbsp;Inc, Amazon Inc and practically every other major website. These small files, placed on Web surfers&#39;&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; href=&quot;http://www.reuters.com/sectors/industries/overview?industryCode=104&amp;amp;lc=int_mb_1001&quot; style=&quot;color: #006e97; cursor: pointer; outline: none; text-decoration: none;&quot;&gt;computers&lt;/a&gt;&lt;/span&gt;, contain bits of information about the user, such as what other sites they have visited or where they are logging in from.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
In the case of Twitter, the company will further allow retailers to attach anonymous versions of their customers&#39; email addresses, known as hashes, to Twitter&#39;s&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;advertising&lt;/span&gt;&amp;nbsp;engine to individually target their customer base.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
Privately owned Twitter, valued at close to $10 billion by investors, has ramped up its&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;advertising&lt;/span&gt;&amp;nbsp;capabilities ahead of a widely expected initial public offering in 2014.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
Twitter&#39;s new feature, which is expected to raise advertising rates and revenues for the company, arrives in the midst of heightened public debate over the erosion of online privacy.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
In recent years both the European Union and the U.S. Federal Trade Commission have probed the extent of tracking technologies used by sites like&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;Facebook&lt;/span&gt;. Last year, European authorities began requiring websites to inform visitors that cookies were being placed on their&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;computers&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
Twitter noted in a blog post Wednesday that its use of cookies was &quot;how most other companies handle this practice, and we don&#39;t give advertisers any additional user information.&quot;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
In a blog post on Wednesday, Twitter said it would give its users the option of disabling cookies by enabling a &quot;Do Not Track&quot; option in their browser. Many leading browsers such as Mozilla Firefox and Internet Explorer contain such options. Twitter users can also wholly opt out of ads tailored by outside data by opening their account settings, the company said.&lt;/div&gt;
&lt;span id=&quot;midArticle_2&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_3&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_4&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_5&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_6&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_7&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;span id=&quot;midArticle_8&quot; style=&quot;background-color: white; font-family: arial, helvetica, sans;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
The efforts by authorities, particularly in Europe, to clamp down on tracking technologies have spurred a furious backlash from the media and technology industries, which argue that cookies are critical to practically the whole $100 billion internet advertising market.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: arial, helvetica, sans; font-size: 14px; line-height: 1.6; margin-bottom: 10px; padding: 0px;&quot;&gt;
Via: &lt;a href=&quot;http://www.reuters.com/&quot;&gt;Reuters&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/8612828507613599934/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/8612828507613599934' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/8612828507613599934'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/8612828507613599934'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/twitter-is-going-to-use-cookies-for-ad.html' title='Twitter is going to use cookies for ad targeting'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikrlC_bEbHNQ8wKNXoBKpj4AMppBSGKK8X91TCDpbm0CjJqzWAzayJP3E2kgy-hIWDTA1a4XctRtqVEjuMVVO8z8vkgUaPcALF9bybv3_r8YDrFFwhINnC7ro3D805dh0R0FEwhSh5Xos/s72-c/tweet.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-777484376784986438</id><published>2013-07-04T01:04:00.001+05:00</published><updated>2013-07-24T15:50:37.480+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Samsung blames Apple wouldn’t have sold a single iPhone without stealing our technology</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAQiTpRWLw2P1okmmtetxxUOh_QEZk27GGFgK8PNdR2wwhV4SuneTY6OYFNW-2V4jXu8plefWCqsJ1lzE5aPb-xCMewFmRtHqaImSlvv4ACqKcB_aowH2wC7FLHrCSPy6qfrCwGhapGtc/s330/what-the-apple-vs-samsung-lawsuit-means-for-the-future-of-smartphone-design.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAQiTpRWLw2P1okmmtetxxUOh_QEZk27GGFgK8PNdR2wwhV4SuneTY6OYFNW-2V4jXu8plefWCqsJ1lzE5aPb-xCMewFmRtHqaImSlvv4ACqKcB_aowH2wC7FLHrCSPy6qfrCwGhapGtc/s400/what-the-apple-vs-samsung-lawsuit-means-for-the-future-of-smartphone-design.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
Another day, another&amp;nbsp;Apple&amp;nbsp;(AAPL) vs.&amp;nbsp;Samsung&amp;nbsp;(005930) trial. The two consumer electronics companies are preparing to do battle in San Jose, California next week, and now-public court documents shed light on the positions each firm is taking. On Tuesday,&amp;nbsp;Apple told Samsung exactly what it thinks its technology patents are worth&amp;nbsp;(spoiler: barely anything at all), and subsequent filings from Samsung reveal that the South Korea-based company has a few choice words for Apple as well.&lt;span id=&quot;more-150890&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
As&amp;nbsp;highlighted by&amp;nbsp;&lt;em style=&quot;font-family: inherit; font-size: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;The Wall Street Journal&lt;/em&gt;, Samsung’s trial brief pulls no punches in telling the court exactly where it stands regarding Apple’s repeated patent-related accusations. In short, Apple is the thief here, not Samsung. A few key excerpts (emphasis is ours):&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border-left-color: rgb(0, 128, 255); border-left-style: solid; border-left-width: 3px; color: rgb(142, 142, 142) !important; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px !important; line-height: 1.5em; margin: 0px; padding: 0px 0px 0px 17px;&quot;&gt;
&lt;div style=&quot;line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
Samsung has been researching and developing mobile telecommunications technology since at least as early as 1991 and invented much of the technology for today‘s smartphones.&lt;strong style=&quot;font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;Indeed, Apple, which sold its first iPhone nearly twenty years after Samsung started developing mobile phone technology, could not have sold a single iPhone without the benefit of Samsung‘s patented technology.&lt;/strong&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border-left-color: rgb(0, 128, 255); border-left-style: solid; border-left-width: 3px; color: rgb(142, 142, 142) !important; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px !important; line-height: 1.5em; margin: 0px; padding: 0px 0px 0px 17px;&quot;&gt;
&lt;div style=&quot;line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
For good measure,&amp;nbsp;&lt;strong style=&quot;font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;Apple seeks to exclude Samsung from the market, based on its complaints that Samsung has used the very same public domain design concepts that Apple borrowed from other competitors, including Sony, to develop the iPhone.&lt;/strong&gt;&amp;nbsp;Apple‘s own internal documents show this. In February 2006, before the claimed iPhone design was conceived of, Apple executive Tony Fadell circulated a news article that contained an interview of a Sony designer to Steve Jobs, Jonathan Ive and others. In the article, the Sony designer discussed Sony portable electronic device designs that lacked “excessive ornamentation” such as buttons, fit in the hand, were “square with a screen” and had “corners [which] have been rounded out.”&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border-left-color: rgb(0, 128, 255); border-left-style: solid; border-left-width: 3px; color: rgb(142, 142, 142) !important; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px !important; line-height: 1.5em; margin: 0px; padding: 0px 0px 0px 17px;&quot;&gt;
&lt;div style=&quot;line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
Contrary to the image it has cultivated in the popular press,&amp;nbsp;&lt;strong style=&quot;font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;Apple has admitted in internal documents that its strength is not in developing new technologies first, but in successfully commercializing them.&lt;/strong&gt;&amp;nbsp;. . . Also contrary to Apple‘s accusations, Samsung does not need or want to copy; rather, it strives to best the competition by developing multiple, unique products. Samsung internal documents from 2006, well before the iPhone was announced, show rectangular phones with rounded corners, large displays, flat front faces, and graphic interfaces with icons with grid layouts.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border-left-color: rgb(0, 128, 255); border-left-style: solid; border-left-width: 3px; color: rgb(142, 142, 142) !important; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px !important; line-height: 1.5em; margin: 0px; padding: 0px 0px 0px 17px;&quot;&gt;
&lt;div style=&quot;line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
Apple relied heavily on Samsung‘s technology to enter the telecommunications space, and it continues to use Samsung‘s technology to this day in its iPhone and iPad products. For example, Samsung supplies the flash memory, main memory, and application processor for the iPhone. . . .&amp;nbsp;&amp;nbsp;&lt;strong style=&quot;font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit;&quot;&gt;But Apple also uses patented Samsung technology that it has not paid for.&lt;/strong&gt;&amp;nbsp;This includes standards-essential technology required for Apple‘s products to interact with products from other manufacturers, and several device features that Samsung developed for use in its products.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
It’s clear that we’re in for yet another action-packed adventure when the trial kicks off next week.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;PT Serif&#39;, Times, serif; font-size: 15px; line-height: 25px; margin-bottom: 25px; padding: 0px;&quot;&gt;
Via: &lt;a href=&quot;http://bgr.com/&quot;&gt;Bgr&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/777484376784986438/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/777484376784986438' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/777484376784986438'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/777484376784986438'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/samsung-blames-apple-wouldnt-have-sold.html' title='Samsung blames Apple wouldn’t have sold a single iPhone without stealing our technology'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAQiTpRWLw2P1okmmtetxxUOh_QEZk27GGFgK8PNdR2wwhV4SuneTY6OYFNW-2V4jXu8plefWCqsJ1lzE5aPb-xCMewFmRtHqaImSlvv4ACqKcB_aowH2wC7FLHrCSPy6qfrCwGhapGtc/s72-c/what-the-apple-vs-samsung-lawsuit-means-for-the-future-of-smartphone-design.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-4714235543360662191</id><published>2013-07-04T00:51:00.002+05:00</published><updated>2013-07-24T15:51:00.132+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Samsung sell 20 million s4 units</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Samsung&#39;s Galaxy S4 is still selling extremely well, a new report out of Korea claims.&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Samsung has sold 20 million&amp;nbsp;Galaxy S4&amp;nbsp;units worldwide since that device&#39;s launch two months ago, Korea-based news outlet Yonhap News is reporting (&lt;a href=&quot;http://translate.google.com/translate?hl=en&amp;amp;sl=auto&amp;amp;tl=en&amp;amp;u=http%3A%2F%2Fwww.yonhapnews.co.kr%2Fbulletin%2F2013%2F07%2F03%2F0200000000AKR20130703068300017.HTML&quot; style=&quot;border: 0px; color: #2964bf; cursor: pointer; font-family: inherit; font-size: inherit; font-style: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Translate Page&lt;/a&gt;). That&#39;s roughly 1.7 times faster than sales of the Galaxy S3 (that&#39;s global channel sales, not sales to consumers) at the same point in that device&#39;s life cycle.&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;
Samsung has yet to confirm that it has sold 20 million units. The company will hold its earnings call later this week, and could announce the sales milestone at that time.&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimsD6tv09prLla7fcN5cA5MDoaSnIYUuVn8bGy7H456pzxBGYRrv-DZ7B83WVSoahOeKozHaLpdQhgYJ1jCLMoDQQsZyclKw82BRk4hE9Uk2517KAbSHkZO-AhD9I9KQFn0uvzwNaU6Vg/s610/35627724-Samsung-Galaxy-S4-1_610x435.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;285&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimsD6tv09prLla7fcN5cA5MDoaSnIYUuVn8bGy7H456pzxBGYRrv-DZ7B83WVSoahOeKozHaLpdQhgYJ1jCLMoDQQsZyclKw82BRk4hE9Uk2517KAbSHkZO-AhD9I9KQFn0uvzwNaU6Vg/s400/35627724-Samsung-Galaxy-S4-1_610x435.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.984375px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
(Source:&amp;nbsp;&lt;a href=&quot;http://www.engadget.com/2013/07/03/samsung-korea-20-million-gs4-sales/&quot; style=&quot;border: 0px; color: #2964bf; cursor: pointer; font-family: inherit; font-size: inherit; font-style: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Engadget&lt;/a&gt;)&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/4714235543360662191/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/4714235543360662191' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4714235543360662191'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4714235543360662191'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/samsung-sell-20-million-s4-units.html' title='Samsung sell 20 million s4 units'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimsD6tv09prLla7fcN5cA5MDoaSnIYUuVn8bGy7H456pzxBGYRrv-DZ7B83WVSoahOeKozHaLpdQhgYJ1jCLMoDQQsZyclKw82BRk4hE9Uk2517KAbSHkZO-AhD9I9KQFn0uvzwNaU6Vg/s72-c/35627724-Samsung-Galaxy-S4-1_610x435.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-6923150868550993091</id><published>2013-07-03T23:11:00.000+05:00</published><updated>2013-07-24T15:51:20.637+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Does Microsoft Helps NSA Hacker?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihZ2yHDDQwUAoZLH0eGdeVmZJeUYbwq2TobqfG0d4xGM5R8t0KT5JCSoR2uqNXuUk7lOFfpL9TcaQ6RwHRLdGcn8YoL8VIRpSN06X6QeI5TZV9XOSuKjc1GHlAmgICgwNSar3566x2Sgs/s284/Hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihZ2yHDDQwUAoZLH0eGdeVmZJeUYbwq2TobqfG0d4xGM5R8t0KT5JCSoR2uqNXuUk7lOFfpL9TcaQ6RwHRLdGcn8YoL8VIRpSN06X6QeI5TZV9XOSuKjc1GHlAmgICgwNSar3566x2Sgs/s400/Hacker.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.&lt;/div&gt;
&lt;script src=&quot;http://player.ooyala.com/player.js?embedCode=VkOWllYzqlc2VBkKRqUik0nWzSb66cr1&amp;amp;playerBrandingId=8a7a9c84ac2f4e8398ebe50c07eb2f9d&amp;amp;width=620&amp;amp;deepLinkEmbedCode=VkOWllYzqlc2VBkKRqUik0nWzSb66cr1&amp;amp;height=349&amp;amp;thruParam_bloomberg-ui[popOutButtonVisible]=FALSE&quot;&gt;&lt;/script&gt;

&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 15px; line-height: 1.6em;&quot;&gt;These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; line-height: 1.6em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 15px; line-height: 1.6em;&quot;&gt;Google Inc (GOOG)&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; line-height: 1.6em;&quot;&gt;. and other Internet companies under court order.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Many of these same Internet and telecommunications companies voluntarily provide U.S. intelligence organizations with additional data, such as equipment specifications, that don’t involve private communications of their customers, the four people said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Along with the NSA, the&amp;nbsp;Central Intelligence Agency (0112917D), the&amp;nbsp;Federal Bureau&amp;nbsp;of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Microsoft Bugs&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Redmond, Washington-based&amp;nbsp;Microsoft (MSFT)&amp;nbsp;and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
In an e-mailed statement, Shaw said there are “several programs” through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Willing Cooperation&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.’s major spy agencies, the people familiar with those programs said.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
‘Thank Them’&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Cooperation between nine U.S. Internet companies and the NSA’s Special Source Operations unit came to light along with a secret program called Prism. According to a slide deck provided by Snowden, the program gathers e-mails, videos, and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
U.S. intelligence agencies have grown far more dependent on such arrangements as the flow of much of the world’s information has grown exponentially through switches, cables and othernetwork equipment&amp;nbsp;maintained by U.S. companies.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Equipment Specs&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Typically, a key executive at a company and a small number of technical people cooperate with different agencies and sometimes multiple units within an agency, according to the four people who described the arrangements.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Committing Officer&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious&amp;nbsp;Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
McAfee’s Data&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
McAfee (MFE)’s data and analysis doesn’t include information on individuals, said Michael Fey, the company’s worldwide chief technology officer.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
“We do not share any type of personal information with our government agency partners,” Fey said in an e-mailed statement. “McAfee’s function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
China’s Military&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Following an attack on his company by Chinese hackers in 2010,&amp;nbsp;Sergey Brin, Google’s co-founder, was provided with highly sensitive government intelligence linking the attack to a specific unit of the&amp;nbsp;People’s Liberation Army,&amp;nbsp;China’s military, according to one of the people, who is familiar with the government’s investigation. Brin was given a temporary classified clearance to sit in on the briefing, the person said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
According to information provided by Snowden, Google, owner of the world’s most popular search engine, had at that point been a Prism participant for more than a year.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Google CEO&amp;nbsp;Larry Page&amp;nbsp;said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Snowden’s disclosures and that the&amp;nbsp;Mountain View, California-based company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. He said Google provides user data to governments “only in accordance with the law.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Leslie Miller, a spokeswoman for Google, didn’t provide an immediate response June 13.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the&amp;nbsp;Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Metadata&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for&amp;nbsp;Telstra Corp (TLS)., one of&amp;nbsp;Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
According to Snowden’s information, Blarney’s purpose is “to gain access and exploit foreign intelligence,” the Post said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
It’s unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge’s order.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Less Scrutiny&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Stewart Baker, former general counsel for the NSA, said if metadata involved communications between two foreign computers that just happened to be crossing a U.S. fiber optic cable “then the likelihood is it would demand less legal scrutiny than when communications are being extracted one by one.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Lawmakers who oversee U.S. intelligence agencies may not understand the significance of some of the metadata being collected, said Jacob Olcott, a former cybersecurity assistant for Senator John D. Rockefeller IV of&amp;nbsp;West Virginia, the Democratic chairman of the Senate Commerce Committee.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
“That’s what makes this issue of oversight so challenging,” said Olcott, now a principal at Good Harbor Security Risk Management in&amp;nbsp;Washington. “You have a situation where the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
While companies are offered powerful inducements to cooperate with U.S. intelligence, many executives are motivated by patriotism or a sense they are defending national security, the people familiar with the trusted partner programs said.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Einstein 3&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems’ architecture or equipment schematics so the agencies can analyze potential vulnerabilities.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
“It’s natural behavior for governments to want to know about the country’s critical infrastructure,” said Chisholm, chief security officer at&amp;nbsp;Irvine, California-based Cylance Inc.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn’t authorized to discuss the matter.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border: 0px; font-family: Arial; font-size: 18px; line-height: 1.3em; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
AT&amp;amp;T, Verizon&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Before they agreed to install the system on their networks, some of the five major Internet companies --&amp;nbsp;AT&amp;amp;T Inc. (T),&amp;nbsp;Verizon Communications Inc (VZ).,&amp;nbsp;Sprint Nextel Corp. (S),&amp;nbsp;Level 3 Communications Inc (LVLT). and&amp;nbsp;CenturyLink Inc (CTL). -- asked for guarantees that they wouldn’t be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn’t meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Mark Siegel, a spokesman for Dallas-based AT&amp;amp;T, the nation’s biggest phone carrier, declined to comment. Edward McFadden, a spokesman for New York-based Verizon, the second-largest phone company, declined to comment.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Scott Sloat, a spokesman for&amp;nbsp;Overland Park, Kansas-based Sprint, and Monica Martinez, a spokeswoman for Broomfield, Colorado-based Level 3, didn’t immediately respond to requests for comment.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Linda Johnson, a spokeswoman for Centurylink, formerly Qwest Corp., said her Monroe, Louisiana-based company participates in the Enhanced Cybersecurity Services program and the Intrusion Prevention Security Services program, which includes Einstein 3. Both programs are managed by the U.S. Department of&amp;nbsp;Homeland Security.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Beyond that, she said, “CenturyLink does not comment on matters pertaining to national security.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
To contact the reporter on this story: Michael Riley in Washington at&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial; font-size: 15px; line-height: 1.6em; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;
Source: &lt;a href=&quot;http://www.bloomberg.com/&quot;&gt;Bloomberg&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/6923150868550993091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/6923150868550993091' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/6923150868550993091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/6923150868550993091'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/does-microsoft-helps-nsa-hacker.html' title='Does Microsoft Helps NSA Hacker?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihZ2yHDDQwUAoZLH0eGdeVmZJeUYbwq2TobqfG0d4xGM5R8t0KT5JCSoR2uqNXuUk7lOFfpL9TcaQ6RwHRLdGcn8YoL8VIRpSN06X6QeI5TZV9XOSuKjc1GHlAmgICgwNSar3566x2Sgs/s72-c/Hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-513211815832279735</id><published>2013-07-03T22:06:00.000+05:00</published><updated>2013-07-24T15:51:47.040+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>The biggest data breach on Facebook, 6 million user’s contact info exposed</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3j8GGeVp3gFmuOJp_9FtrMPD1sfOx-cxm1hrfMRo7hAgLwsZXhzX8mfc0qVo57hrSAXwUatyRG9NllF3Wk5tu3zoCUrrXGPDx-7TJ6eN5ZVau9AxJOSXo8oP2eBPjMpNnO3yTCF-elpA/s705/unnamed.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3j8GGeVp3gFmuOJp_9FtrMPD1sfOx-cxm1hrfMRo7hAgLwsZXhzX8mfc0qVo57hrSAXwUatyRG9NllF3Wk5tu3zoCUrrXGPDx-7TJ6eN5ZVau9AxJOSXo8oP2eBPjMpNnO3yTCF-elpA/s400/unnamed.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
Facebook&amp;nbsp;accidentally shared 6 million users&#39; email addresses or telephone numbers due to a software bug, the company announced Friday.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
The breach was caused by an unfortunate combination of Facebook&#39;s &quot;People You May Know&quot; and &quot;Download Your Information&quot; features. &quot;People You May Know&quot; offers friend suggestions based in part on other users&#39; uploaded contact lists or address books; &quot;Download Your Information&quot; offers a downloadable version of your Facebook Timeline archive.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
When some users downloaded their Facebook archives with &quot;Download Your Information,&quot; the archive included contact information for second-tier connections with whom Facebook thought those users might want to connect but who hadn&#39;t yet received or approved a friend request from that user. Translation: Data breach.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
Facebook says for every email address or phone number lost in the breach, each individual piece of information was included in an archive download &quot;only once or twice.&quot; Facebook has no evidence there was any malicious exploitation of the bug before it was found and the service was deactivated.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class=&quot;see-also&quot; style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px;&quot;&gt;
A security researcher found the bug and reported it to Facebook, which shared details about it on its&amp;nbsp;Facebook Security page, posted in full below. Facebook says it&#39;s notifying government regulators to the problem.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
All affected Facebook users will be notified via email. Have you received an e-mail about the data breach from Facebook? Are you concerned about the breach? Tell us in the comments.&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border-left-color: rgb(221, 221, 221); border-left-width: 4px; border-style: none none none solid; color: #777777; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin: 0px 0px 0px 36px; padding: 0px 0px 0px 12px;&quot;&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
At Facebook, we take people’s privacy seriously, and we strive to protect people’s information to the very best of our ability. We implement many safeguards, hire the brightest engineers and train them to ensure we have only high-quality code behind the scenes of your Facebook experiences. We even have teams that focus exclusively on preventing and fixing privacy-related technical issues before they affect you.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
Even with a strong team, no company can ensure 100% prevention of bugs, and in rare cases we don’t discover a problem until it has already affected a person’s account. This is one of the reasons we also have a White Hat program to collaborate with external security researchers and help us ensure that we maintain the highest security standards for our users.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
We recently received a report to our White Hat program regarding a bug that may have allowed some of a person’s contact information (email or phone number) to be accessed by people who either had some contact information about that person or some connection to them.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
Describing what caused the bug can get pretty technical, but we want to explain how it happened. When people upload their contact lists or address books to Facebook, we try to match that data with the contact information of other people on Facebook in order to generate friend recommendations. For example, we don’t want to recommend that people invite contacts to join Facebook if those contacts are already on Facebook; instead, we want to recommend that they invite those contacts to be their friends on Facebook.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
Because of the bug, some of the information used to make friend recommendations and reduce the number of invitations we send was inadvertently stored in association with people’s contact information as part of their account on Facebook. As a result, if a person went to download an archive of their Facebook account through our Download Your Information (DYI) tool, they may have been provided with additional email addresses or telephone numbers for their contacts or people with whom they have some connection. This contact information was provided by other people on Facebook and was not necessarily accurate, but was inadvertently included with the contacts of the person using the DYI tool.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
After review and confirmation of the bug by our security team, we immediately disabled the DYI tool to fix the problem and were able to turn the tool back on the next day once we were satisfied that the problem had been fixed.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
We&#39;ve concluded that approximately 6 million Facebook users had email addresses or telephone numbers shared. There were other email addresses or telephone numbers included in the downloads, but they were not connected to any Facebook users or even names of individuals. For almost all of the email addresses or telephone numbers impacted, each individual email address or telephone number was only included in a download once or twice. This means, in almost all cases, an email address or telephone number was only exposed to one person. Additionally, no other types of personal or financial information were included and only people on Facebook – not developers or advertisers – have access to the DYI tool.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
We currently have no evidence that this bug has been exploited maliciously and we have not received complaints from users or seen anomalous behavior on the tool or site to suggest wrongdoing. Although the practical impact of this bug is likely to be minimal since any email address or phone number that was shared was shared with people who already had some of that contact information anyway, or who had some connection to one another, it&#39;s still something we&#39;re upset and embarrassed by, and we&#39;ll work doubly hard to make sure nothing like this happens again. Your trust is the most important asset we have, and we are committed to improving our safety procedures and keeping your information safe and secure.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
We have already notified our regulators in the US, Canada and Europe, and we are in the process of notifying affected users via email.&lt;/div&gt;
&lt;div style=&quot;font-size: 1.5rem; line-height: 1.2; margin-bottom: 1.5em; margin-top: 0.75em;&quot;&gt;
We appreciate the security researcher&#39;s report to our White Hat program, and have paid out a bug bounty to thank him for his efforts.&lt;/div&gt;
&lt;/blockquote&gt;
Courtesy: &lt;a href=&quot;http://mashable.com/&quot;&gt;Mashable&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/513211815832279735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/513211815832279735' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/513211815832279735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/513211815832279735'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2013/07/the-biggest-data-breach-on-facebook-6.html' title='The biggest data breach on Facebook, 6 million user’s contact info exposed'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3j8GGeVp3gFmuOJp_9FtrMPD1sfOx-cxm1hrfMRo7hAgLwsZXhzX8mfc0qVo57hrSAXwUatyRG9NllF3Wk5tu3zoCUrrXGPDx-7TJ6eN5ZVau9AxJOSXo8oP2eBPjMpNnO3yTCF-elpA/s72-c/unnamed.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-6437728666327612577</id><published>2010-06-14T00:14:00.001+05:00</published><updated>2013-07-24T15:52:17.981+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>$25 Million Superyacht Will Come With Complimentary Matching Supercar</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5EbNNPD_Y8z3EK528JpNFXn5uK2yHJeYXnf4oan_9lVUf_Qr5Cy3k3s6MeeNS8gS_Zg_jYoNQueMfBeUDq08tOUZOHixJ8h5nvytD-wjuO7X6xjQh9CDzwZnisfbzQNhbwPzjsaf8RCeS/s1600/yacht-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5EbNNPD_Y8z3EK528JpNFXn5uK2yHJeYXnf4oan_9lVUf_Qr5Cy3k3s6MeeNS8gS_Zg_jYoNQueMfBeUDq08tOUZOHixJ8h5nvytD-wjuO7X6xjQh9CDzwZnisfbzQNhbwPzjsaf8RCeS/s400/yacht-1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Beating the Bugatti Veyron  hands down for exclusivity, the  supercar has 880bhp from its twin-turbo  V12 engine and a claimed top  speed of 234mph. Only six will be built,  each capable of hitting 60mph  from rest in 3.2 seconds. &lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;But what about the design, yo?!&lt;/span&gt; &lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Designer, Sweden-based  33-year-old Eduard Gray, told CNN  that he took inspiration from the  lines and curves of sports car, the  Ferrari Testa Rossa.  &lt;br /&gt;
&quot;We have really tried to achieve a strong harmony in our design -- so   that the car looks like it was literally born inside the hull of the   yacht,&quot; he said.&lt;br /&gt;
But ultimately, he said, he wanted to  design &quot;something you want to  be seen in -- the sexiest damn boat in  the harbor!&quot;&lt;/span&gt; &lt;/blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Sorry  Eduard, but I think we can all agree the sexiest damn boat in  the  harbor&lt;i&gt; is my dinghy.  &lt;/i&gt;  Just sayin: seats one comfortably,  comes  half-mast.  Ooh -- did I mention the pirate flag?  There&#39;s a  pirate  flag.  Plus a compass.&lt;br /&gt;
Hit the jump for a bunch more pictures  of the yacht you&#39;ll never own  (unless you really are rich in which case  I wasn&#39;t joking about the HJ).   &lt;/span&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNTw4EWJUq0SCuVuAjhcK5A78MfdAeQ4PbHan6zIX6aMNUwnvlt5vIpvDcNwpHrhfQ56Xx5FGqDwbBRwQVKxvT0DXZknSlN08B4qPLKTMq3h9MZWRLFgPE79NC6aXdeLAsp4IaQy4PY423/s1600/yacht-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNTw4EWJUq0SCuVuAjhcK5A78MfdAeQ4PbHan6zIX6aMNUwnvlt5vIpvDcNwpHrhfQ56Xx5FGqDwbBRwQVKxvT0DXZknSlN08B4qPLKTMq3h9MZWRLFgPE79NC6aXdeLAsp4IaQy4PY423/s400/yacht-2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRJwFBCvbBZr8ZyVoyVq2h7s6d7V7Yz9DakKgXKzVTDz-h5BYtzaGvkTM_L5Q3V6jJcT87aGuXAgLmFWluJ9C2RuRdmyQ6oBN5OuL2CuVqyOxcTt1i0gx4c63b5kVHpB5ObPhBbvZgGDK5/s1600/yacht-3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRJwFBCvbBZr8ZyVoyVq2h7s6d7V7Yz9DakKgXKzVTDz-h5BYtzaGvkTM_L5Q3V6jJcT87aGuXAgLmFWluJ9C2RuRdmyQ6oBN5OuL2CuVqyOxcTt1i0gx4c63b5kVHpB5ObPhBbvZgGDK5/s320/yacht-3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSRfNB5WUEXI9dBv1bOccoVEV9vZMzvto7rLTdjvkgswuJ_xep7b9wzprnBCo4IbDUxAAREBg41dM3Xj4qzQEVP8kOagMUGVEfN9DyForg9S5Kt9YyrQd_S7RrCMaBSVc8pmxPW4npaaB_/s1600/yacht-6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSRfNB5WUEXI9dBv1bOccoVEV9vZMzvto7rLTdjvkgswuJ_xep7b9wzprnBCo4IbDUxAAREBg41dM3Xj4qzQEVP8kOagMUGVEfN9DyForg9S5Kt9YyrQd_S7RrCMaBSVc8pmxPW4npaaB_/s400/yacht-6.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8NUvwmi6ScaXVgPQNpZ2hA0brq46lasg5ZX5PbMRh-VCU-qQucztAbaIwUEajDSvDjfEi40HnzVi5QgNAJnhRJp_8-y1DtVdlpkOSWw-CL3wGYtq2TdTyEqRYf62EGtbGc70f6vSXj6s7/s1600/yacht-5-6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8NUvwmi6ScaXVgPQNpZ2hA0brq46lasg5ZX5PbMRh-VCU-qQucztAbaIwUEajDSvDjfEi40HnzVi5QgNAJnhRJp_8-y1DtVdlpkOSWw-CL3wGYtq2TdTyEqRYf62EGtbGc70f6vSXj6s7/s400/yacht-5-6.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBK5uBHR5F2XPdqoe7zaG9x5wPys8ZG6Sb-WWRD1xTtO0MUPir8Da-TsZwYX07YO8sQ2bHr9_Q4XdVp2ZPPkMsQn-zl8QdVVz6N3-6_laPRMaTCvOzgRhXHt_c1ZQZd97nIJ1K6Q1TseGZ/s1600/yacht-5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBK5uBHR5F2XPdqoe7zaG9x5wPys8ZG6Sb-WWRD1xTtO0MUPir8Da-TsZwYX07YO8sQ2bHr9_Q4XdVp2ZPPkMsQn-zl8QdVVz6N3-6_laPRMaTCvOzgRhXHt_c1ZQZd97nIJ1K6Q1TseGZ/s400/yacht-5.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmq4r6Y6RzGC6J0dr5dIEHk0ucsymIrqQDmrYJKE3lkhJkOBXa9KsBo2YW-q9O6XXIlCLhYsxpssb3T_AkpPZQBxrGIni5chiTXdIdxQA-YrmD3iy2NHVOoVoeze45vocj9OQF1Jf2Y3IB/s1600/yacht-4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmq4r6Y6RzGC6J0dr5dIEHk0ucsymIrqQDmrYJKE3lkhJkOBXa9KsBo2YW-q9O6XXIlCLhYsxpssb3T_AkpPZQBxrGIni5chiTXdIdxQA-YrmD3iy2NHVOoVoeze45vocj9OQF1Jf2Y3IB/s400/yacht-4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnL_ldJETye3sSPqCdQVagFqyn_fstZ7veEq_eERSs6FDx89hHNTHbJnpdQsk5hrbxLwlwqmnf0qDo02lE1tDaE8IBKDVjBBrwntEQJ6loXqO5ovUxctxjz235BGHoIkqJXLifxTfRNYYE/s1600/yacht-7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnL_ldJETye3sSPqCdQVagFqyn_fstZ7veEq_eERSs6FDx89hHNTHbJnpdQsk5hrbxLwlwqmnf0qDo02lE1tDaE8IBKDVjBBrwntEQJ6loXqO5ovUxctxjz235BGHoIkqJXLifxTfRNYYE/s400/yacht-7.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/6437728666327612577/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/6437728666327612577' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/6437728666327612577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/6437728666327612577'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/06/25-million-superyacht-will-come-with.html' title='$25 Million Superyacht Will Come With Complimentary Matching Supercar'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5EbNNPD_Y8z3EK528JpNFXn5uK2yHJeYXnf4oan_9lVUf_Qr5Cy3k3s6MeeNS8gS_Zg_jYoNQueMfBeUDq08tOUZOHixJ8h5nvytD-wjuO7X6xjQh9CDzwZnisfbzQNhbwPzjsaf8RCeS/s72-c/yacht-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-8755207280453681120</id><published>2010-04-24T13:05:00.000+05:00</published><updated>2013-07-24T15:52:40.753+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>How internet flow comes to your PC</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2Js031p_jCL_RkGat_LTjAR7XQRSxyHdcjrWttfZ15gp8HMwJO_T_UPMhAF2HBe6vJpt9xySJ6s7XSXpL_yWMf00E6IsqDqL1GtZVhkrGHIJXeyswb-v7bWx_QeGkBxLt-qavJ-wcdw/s1600/ATT00001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2Js031p_jCL_RkGat_LTjAR7XQRSxyHdcjrWttfZ15gp8HMwJO_T_UPMhAF2HBe6vJpt9xySJ6s7XSXpL_yWMf00E6IsqDqL1GtZVhkrGHIJXeyswb-v7bWx_QeGkBxLt-qavJ-wcdw/s320/ATT00001.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCh8OOOp30xPR8p0sNM-XX_xFmPB71CQNASXMv9dQUiyCAu0C3-TkNu9fKAKvOCMWM5ay6E-l-nVHcLvvdr4iIdiovKpAUYvUSMJGHM32MdiP135_NY6enx-izlNtAKcYhhNaNoYHDZCM/s1600/ATT00002.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCh8OOOp30xPR8p0sNM-XX_xFmPB71CQNASXMv9dQUiyCAu0C3-TkNu9fKAKvOCMWM5ay6E-l-nVHcLvvdr4iIdiovKpAUYvUSMJGHM32MdiP135_NY6enx-izlNtAKcYhhNaNoYHDZCM/s320/ATT00002.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHbir7ryqIpu1QQSauRJSgeeKKRP43Nar0Io_GR_2TWxqGYvKACnLGJIGBFRL8Nl75UNYImbRLkgIqZMYk3bjrI-dMPoJVyI4YzAiqrD_6-mfgTkwdaxuXxyyVtY7AsXzRi9i49YYJbVs/s1600/ATT00003.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHbir7ryqIpu1QQSauRJSgeeKKRP43Nar0Io_GR_2TWxqGYvKACnLGJIGBFRL8Nl75UNYImbRLkgIqZMYk3bjrI-dMPoJVyI4YzAiqrD_6-mfgTkwdaxuXxyyVtY7AsXzRi9i49YYJbVs/s320/ATT00003.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdkt0uENdDxL0RrLuJTs1BLWiEohfBNcezA4gIGei-gue_vIy4z3GMYwis-hAux1KqNlK4q51HUVtJ2sZm1Rr_E5GVN3gzCCABWEcTjqEFE-dePtOOvmcVdHH24OSzE7mw5a3zLICWPTQ/s1600/ATT00004.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdkt0uENdDxL0RrLuJTs1BLWiEohfBNcezA4gIGei-gue_vIy4z3GMYwis-hAux1KqNlK4q51HUVtJ2sZm1Rr_E5GVN3gzCCABWEcTjqEFE-dePtOOvmcVdHH24OSzE7mw5a3zLICWPTQ/s320/ATT00004.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizWIA2pPVLKjorfmCrQJujRde7JGOVmxLMtj1Xok3cF02LiJP5Y_osF3vnmWcBXQR2fmtc_mwe5wPRDoXzDDT8PFWGOUo0dgnDAfRhbKpfdLNVkSEHgkhSlJV8gpX0KeldLZFXWl8OjHk/s1600/ATT00005.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizWIA2pPVLKjorfmCrQJujRde7JGOVmxLMtj1Xok3cF02LiJP5Y_osF3vnmWcBXQR2fmtc_mwe5wPRDoXzDDT8PFWGOUo0dgnDAfRhbKpfdLNVkSEHgkhSlJV8gpX0KeldLZFXWl8OjHk/s320/ATT00005.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-7NTj23e8bIL37QNlmRaMD6_CDxCfBICuzMK7v7gYfEBnRHC8iH-xvUF-D0mRjzM7H9NbFlynF7zIMx1k7sNADWApdROn2Trv_cPl-Zin0RbmfQ_RpLqG0UcfNjeOotlUQoVGu-RcZmM/s1600/ATT00006.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-7NTj23e8bIL37QNlmRaMD6_CDxCfBICuzMK7v7gYfEBnRHC8iH-xvUF-D0mRjzM7H9NbFlynF7zIMx1k7sNADWApdROn2Trv_cPl-Zin0RbmfQ_RpLqG0UcfNjeOotlUQoVGu-RcZmM/s320/ATT00006.jpg&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKWsYz47Ia_lBPVLUrHnAQRqPqpDhY1XP-h42pEVA7NUmdGYV6YsADgZRcdFwK0OJLQzqHLAiCZv_v0tYzonDzaB07a5mfDtFGR_QyTf9QnhGQi7mDf7xvm1eg0WYqsFm9Qe3ETPSz_eE/s1600/ATT00007.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKWsYz47Ia_lBPVLUrHnAQRqPqpDhY1XP-h42pEVA7NUmdGYV6YsADgZRcdFwK0OJLQzqHLAiCZv_v0tYzonDzaB07a5mfDtFGR_QyTf9QnhGQi7mDf7xvm1eg0WYqsFm9Qe3ETPSz_eE/s320/ATT00007.jpg&quot; width=&quot;248&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-COIX5NTlWJOfUisujsBMeezjOlPHXp7jotztA-05FnjjP0Ap4Iepbinc26I5MvxY6qRWc-YKJd-CwFmE_B__0gaGtrU9G4X-tAOkT7KTyHXIilxOIuu_xa7sw9SGjf-7Shik6qY3DO0/s1600/ATT00008.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-COIX5NTlWJOfUisujsBMeezjOlPHXp7jotztA-05FnjjP0Ap4Iepbinc26I5MvxY6qRWc-YKJd-CwFmE_B__0gaGtrU9G4X-tAOkT7KTyHXIilxOIuu_xa7sw9SGjf-7Shik6qY3DO0/s320/ATT00008.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZgwNcXwbfJa-LcVt9mbgSXji8_HPp6KPdxA9w5Xj0vaFQOpkjzKxczd1Gx9y1V6-K3wm56k80PnPOjgArSapqkUfy076CwVy7lbhz31YkkJdcqs4YdC0lzm7Bx4C6gojLyNlfTfkO2bo/s1600/ATT00009.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZgwNcXwbfJa-LcVt9mbgSXji8_HPp6KPdxA9w5Xj0vaFQOpkjzKxczd1Gx9y1V6-K3wm56k80PnPOjgArSapqkUfy076CwVy7lbhz31YkkJdcqs4YdC0lzm7Bx4C6gojLyNlfTfkO2bo/s320/ATT00009.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisV4-4dhFfO__q-wWIWo5jGFkoQKUNg4PpTNm3WnMVJXXQylZ8s6Djq_5E6yRmGD_HoQG2uScbrY_SZoRGl7LVJnLpnV90KHKaV3druGQ9s0ifPxGW2_09dZVjrG1oLgpHGq19fNKwmaw/s1600/ATT00010.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisV4-4dhFfO__q-wWIWo5jGFkoQKUNg4PpTNm3WnMVJXXQylZ8s6Djq_5E6yRmGD_HoQG2uScbrY_SZoRGl7LVJnLpnV90KHKaV3druGQ9s0ifPxGW2_09dZVjrG1oLgpHGq19fNKwmaw/s320/ATT00010.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwquuyVwzcILlwYkXLTd3IS9OHEJP4aDsLIfU0R1ON22FmDHrvjpwsKRJRLzw7AHi5HqaguFeMNak_wHJWu2iDggXMhoGJdUvLKB48pZ3LnVOYuZYsn6E1orba5L0cw3lLMuyVXvwg7pw/s1600/ATT00011.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwquuyVwzcILlwYkXLTd3IS9OHEJP4aDsLIfU0R1ON22FmDHrvjpwsKRJRLzw7AHi5HqaguFeMNak_wHJWu2iDggXMhoGJdUvLKB48pZ3LnVOYuZYsn6E1orba5L0cw3lLMuyVXvwg7pw/s320/ATT00011.jpg&quot; width=&quot;207&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV9S01-L43HguJjE3Ogoj_e56yUVX2k64cjJqrMeEs9K5wLOIIzre7XZWaJCJZAi8GYsS_8FMTmoEULar6mL_BxUwedUXWawSeSiqMauQubMGUMxroa1JPCkgaORTNUs_HjFlvr9nh3JI/s1600/ATT00012.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV9S01-L43HguJjE3Ogoj_e56yUVX2k64cjJqrMeEs9K5wLOIIzre7XZWaJCJZAi8GYsS_8FMTmoEULar6mL_BxUwedUXWawSeSiqMauQubMGUMxroa1JPCkgaORTNUs_HjFlvr9nh3JI/s320/ATT00012.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYZck-EDx6HT9MJ3LpWH0SRuyQ0b1hYTMkOH_AvdFab1fDf-b3VE_P6gTQJTDm0DTc4kFDYEwgP30aT9VvhPTbVP5xpiaVUT0Z_Grhzu33c8M8PuIXC5PMDiRNGd8ur1_IT8ki8AXz4Xg/s1600/ATT00013.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;173&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYZck-EDx6HT9MJ3LpWH0SRuyQ0b1hYTMkOH_AvdFab1fDf-b3VE_P6gTQJTDm0DTc4kFDYEwgP30aT9VvhPTbVP5xpiaVUT0Z_Grhzu33c8M8PuIXC5PMDiRNGd8ur1_IT8ki8AXz4Xg/s320/ATT00013.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPur0cJWMozcHIAVSetNL2EGgFP2jOciSJQYzE8P4ovD5QvUg7yhfcFkYP1I8m5qFHDCzwuHqnaFKNeAMlriFr7L3DSthj-JL8S0Ghi8hwIVM5Iosiog68V2PjPmtYREcd7VmvbGryxgo/s1600/ATT00014.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPur0cJWMozcHIAVSetNL2EGgFP2jOciSJQYzE8P4ovD5QvUg7yhfcFkYP1I8m5qFHDCzwuHqnaFKNeAMlriFr7L3DSthj-JL8S0Ghi8hwIVM5Iosiog68V2PjPmtYREcd7VmvbGryxgo/s320/ATT00014.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd2QXCVu06NuQIES4hpGWPgTZFrlSaERZaZQEaiiMm9U6tpWImNxYMtdtC9-oq0JR_0cy8yFuTYmTPsNDWCQEXjVvoSM8I3MT1R6T16ypeuNMdjkXsutVmAgEDJimPU_Qewtl5nZwqwVw/s1600/ATT00015.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;118&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd2QXCVu06NuQIES4hpGWPgTZFrlSaERZaZQEaiiMm9U6tpWImNxYMtdtC9-oq0JR_0cy8yFuTYmTPsNDWCQEXjVvoSM8I3MT1R6T16ypeuNMdjkXsutVmAgEDJimPU_Qewtl5nZwqwVw/s320/ATT00015.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiFKubbLXpjYvnpAZ2jcJuJggqhx0JuZD7z5vfj4g5VVc5-ZaA_a4r8lsmZz70joL7wRRh8Trc2Mm0q157BEYJipib6JaJ9zK9iDHJF4pYnGE36TZgkBHhz8e4Q5p0DrQJZ2u4ZQIB6xQ/s1600/ATT00016.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiFKubbLXpjYvnpAZ2jcJuJggqhx0JuZD7z5vfj4g5VVc5-ZaA_a4r8lsmZz70joL7wRRh8Trc2Mm0q157BEYJipib6JaJ9zK9iDHJF4pYnGE36TZgkBHhz8e4Q5p0DrQJZ2u4ZQIB6xQ/s320/ATT00016.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMe_EEm_YvWOKkutASDGiIYzJHfoV4cbkfFHgZ1E6AQS15GYOkka-dTqAn3nNUU7qQvmlGZY9B6u2b8OYD3PA4lUYB6Rghc43magDE0iui7Mf2Hz0slWqa7pcgjjgI9F4LSIXmXBubXts/s1600/ATT00017.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMe_EEm_YvWOKkutASDGiIYzJHfoV4cbkfFHgZ1E6AQS15GYOkka-dTqAn3nNUU7qQvmlGZY9B6u2b8OYD3PA4lUYB6Rghc43magDE0iui7Mf2Hz0slWqa7pcgjjgI9F4LSIXmXBubXts/s320/ATT00017.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=031612558X&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/8755207280453681120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/8755207280453681120' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/8755207280453681120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/8755207280453681120'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/04/how-internet-flow-comes-to-your-pc.html' title='How internet flow comes to your PC'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2Js031p_jCL_RkGat_LTjAR7XQRSxyHdcjrWttfZ15gp8HMwJO_T_UPMhAF2HBe6vJpt9xySJ6s7XSXpL_yWMf00E6IsqDqL1GtZVhkrGHIJXeyswb-v7bWx_QeGkBxLt-qavJ-wcdw/s72-c/ATT00001.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-1429964643494595003</id><published>2010-04-20T21:05:00.000+05:00</published><updated>2013-07-24T15:53:09.171+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Gizmodo paid $10,000 for “lost” iPhone 4G</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The Internet is abuzz today with Gizmodo’s &lt;a href=&quot;http://gizmodo.com/5520164/this-is-apples-next-iphone&quot; target=&quot;_blank&quot;&gt;hands on preview&lt;/a&gt; of what appears to be Apple’s  next-gen iPhone. In case you missed the build-up to the story, someone  found a cased iPhone on the floor of a bar in Redwood City. From the  outside, the device appeared to be an iPhone 3GS, but upon removing the  device from its specially designed case, it was clear that this was no  ordinary iPhone. Rather, it appeared to be Apple’s next-gen iPhone.  Found. In the wild. A solid two months before anyone expected to see  pictures of it.&lt;br /&gt;
In other words, this was the motherload of all Apple scoops.&lt;br /&gt;
&lt;span id=&quot;more-13253&quot;&gt;&lt;/span&gt;The individual who found the iPhone sent  pictures of the device to Engadget, but it was Gizmodo who scored big  by actually obtaining the iPhone itself. It’s been reported by  in-the-know Apple blogger John Gruber that Apple considered said iPhone  “stolen”, and was keen on getting it back.&lt;br /&gt;
But with Gizmodo’s report blowing up the Internet today, the cat is  out of the bag. At the time of this writing, Gizmodo’s story alone is  bordering on 2.5 million page views [Edit: it&#39;s now pushing 4 million  pageviews as of early Tuesday morning].&lt;br /&gt;
Now word is leaking out that Gizmodo paid a cool 10 grand for the  iPhone prototype, which all things considered, seems like a bargain  given Apple’s typically tight rein on product leaks.&lt;br /&gt;
&lt;strong&gt;Update:&lt;/strong&gt; &lt;a href=&quot;http://www.edibleapple.com/apple-legal-sends-letter-to-gizmodo-asks-for-iphone-4g-back/&quot; target=&quot;_blank&quot;&gt;Apple Legal sends letter to Gizmodo asking them to  return iPhone 4G&lt;/a&gt;&lt;br /&gt;
$10,000 has undeniably diverted a ton of eyeballs to Gizmodo’s site,  and the surge in web traffic probably has Gizmodo editors jumping for  joy. But you have to wonder if Gizmodo, in the grand scheme of things,  tarnished their “relationship” with Apple for a short term spike in  pageviews.&lt;br /&gt;
Think about it - Steve Jobs is probably livid right now, and what are  the odds that Gizmodo, going forward, gets invited to Apple’s always  popular “special events.” And what are the odds now that Gizmodo will  get a review unit of the upcoming iPhone 4G? Though, to be fair, they  apparently already have one.&lt;br /&gt;
On another note, there has been talk about Apple legal going after  Gizmodo, but that doesn’t seem plausible for a number of reasons. First  and foremost, the damage has already been done. The pictures and  information gleaned from Gizmodo’s hands-on have already been dispersed  into the ether of the Internet. If Apple demanded Gimzodo remove its  detailed post, it would a) confirm that the device is, in fact, the  next-gen iPhone and b) ultimately have no effect whatsoever given that  hundreds, if not thousands, of other websites have already copied and  pasted the pertinent information.&lt;br /&gt;
Second, it’s hard to see how exactly Apple could go after Gizmodo  from a legal standpoint. Word is that Gizmodo purchased the device last  week, but it’s unclear if Apple was aware of the exchange, and if so, if  Apple sent a legal warning to Gizmodo not to publicize the device. But  even if Apple did deliver a legal warning, Gizmodo ostensibly didn’t  coerce an Apple employee into handing over a top secret prototype.  Rather, Giz simply paid top dollar to a guy who found a different  looking iPhone on the floor of a bar. From that vantage point, there’s  not much illegality involved.&lt;br /&gt;
Matt in the comments directs us to this entry on lost/stolen property  from &lt;a href=&quot;http://en.wikipedia.org/wiki/Lost,_mislaid,_and_abandoned_property#Mislaid_property&quot; target=&quot;_blank&quot;&gt;Wikipedia&lt;/a&gt;:&lt;br /&gt;
&lt;blockquote&gt;
Property is generally deemed to have been&amp;nbsp;&lt;strong&gt;mislaid&lt;/strong&gt;  or&amp;nbsp;&lt;strong&gt;misplaced&lt;/strong&gt; if it is found in a place where the true  owner likely&amp;nbsp;&lt;em&gt;did&lt;/em&gt; intend to set it, but then simply forgot to  pick it up again. For example, a wallet found in a shop lying on a  counter near a cash register will likely be deemed&amp;nbsp;&lt;em&gt;misplaced&lt;/em&gt;  rather than&amp;nbsp;&lt;em&gt;lost&lt;/em&gt;. Under common law principles, the finder of a  misplaced object has a duty to turn it over to the owner of the  premises, on the theory that the true owner is likely to return to that  location to search for his misplaced item. If the true owner does not  return within a reasonable time (which varies considerably depending on  the circumstances), the property becomes that of the owner of the  premises&lt;/blockquote&gt;
That said, it would seem that Apple’s legal beef lies more so with  individual who sold the device than Gizmodo. Either way, going after Giz  or the dude who’s now $10,000 richer would attract a wave of bad  publicity that Apple would, we would guess, much rather do without.&lt;br /&gt;
&lt;strong&gt;Update: &lt;/strong&gt;A comment from Hacker News directs us to  this &lt;a href=&quot;http://law.onecle.com/california/penal/485.html&quot; target=&quot;_blank&quot;&gt;section&lt;/a&gt; of the California Penal Code:&lt;br /&gt;
&lt;blockquote&gt;
One who finds lost property under circumstances which  give him&amp;nbsp;knowledge of or means of inquiry as to the true owner, and  who&amp;nbsp;appropriates such property to his own use, or to the use of  another&amp;nbsp;person not entitled thereto, without first making reasonable and  just&amp;nbsp;efforts to find the owner and to restore the property to him,  is&amp;nbsp;guilty of theft.&lt;/blockquote&gt;
The question, then, is if the legal responsibility of the original  “finder” is transferred over to the party who acquires said property.  We’re guessing that it does. Also, remember that Gawker was &lt;a href=&quot;http://www.edibleapple.com/apple-all-but-confirms-existence-of-tablet-with-cease-and-desist-letter-to-gawker/&quot; target=&quot;_blank&quot;&gt;previously served&lt;/a&gt; with a cease and desist letter  from Apple back in early January for offering $50,000 for pre-release  photos or videos of the iPad and $100,000 for actual hands-on time with  the device.&lt;br /&gt;
And if that weren’t enough to chew on, Gawker managing editor Nick  Denton sent out the following &lt;a href=&quot;http://twitter.com/nicknotned/status/12472344531&quot; target=&quot;_blank&quot;&gt;tweet&lt;/a&gt;  earlier this afternoon:&lt;br /&gt;
&lt;blockquote&gt;
For people who want to know the backstory to Gizmodo’s  iPhone exclusive, it’s coming. And it’s a corker.&lt;/blockquote&gt;
&lt;strong&gt;Update x2:&lt;/strong&gt; Gizmodo exposes identity of &lt;a href=&quot;http://www.edibleapple.com/gizmodo-outs-down-on-his-luck-apple-engineer-who-lost-his-iphone-4g/&quot; target=&quot;_self&quot;&gt;Apple engineer who lost the iPhone at the bar&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Update x3: &lt;/strong&gt;Gawker editor Nick Denton said that the  company paid $5,000 for the device, with some reports claiming that  additional fees were to be paid if certain traffic goals were met.&lt;br /&gt;
&lt;br /&gt;
Via:&lt;a href=&quot;http://www.edibleapple.com/gizmodo-paid-10000-for-lost-iphone-4g/&quot;&gt;Edibleapple&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/1429964643494595003/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/1429964643494595003' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/1429964643494595003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/1429964643494595003'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/04/gizmodo-paid-10000-for-lost-iphone-4g.html' title='Gizmodo paid $10,000 for “lost” iPhone 4G'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-325594141678899490</id><published>2010-04-02T11:19:00.000+05:00</published><updated>2013-07-24T15:53:54.442+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>iPhone OS 4.0 Features Explose-Like Multitasking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikitEyAhM_EhzKT-nMVrnFBIrK1k02gVwgwK3YAwSOSnrnzVj6Xj9mLL51C7fzrt2wTEaJFnzyZXMR86bBNwn1llO4OhSRc3hLgy7MoeFuwWW6vVOEhsXdDnFwQZ19a5KrBhnknjmsO-0/s1600/iPhone_OS_4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikitEyAhM_EhzKT-nMVrnFBIrK1k02gVwgwK3YAwSOSnrnzVj6Xj9mLL51C7fzrt2wTEaJFnzyZXMR86bBNwn1llO4OhSRc3hLgy7MoeFuwWW6vVOEhsXdDnFwQZ19a5KrBhnknjmsO-0/s320/iPhone_OS_4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;Word on the Web is that the next&amp;nbsp;iPhone&amp;nbsp;OS update -- version 4.0 -- will finally deliver multitasking support via an Expose-like interface. That means users will be able to launch multiple apps, including third party ones, in the background and switch between them, a feature&amp;nbsp;Android&amp;nbsp;and&amp;nbsp;Windows Mobile&amp;nbsp;users take for granted.&lt;br /&gt;
&lt;br /&gt;
&quot;Those familiar with the design of&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;white-space: nowrap;&quot;&gt;iPhone&amp;nbsp;&lt;/span&gt;4.0 said that the user interface will resemble&amp;nbsp;Apple&#39;s&amp;nbsp;desktop Expose feature, in that a key combination -- reportedly hitting the Home button twice -- will trigger an expose-like interface that brings up a series of icons representing the currently running apps, allowing users to quickly select the one they want to switch to directly,&quot; AppleInsider reports. &quot;When a selection is made, the iPhone OS zooms out of the Expose task manager and transitions to that app.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrOPwBuqAA3yL8qoUP1OQfkxgRqxipH5beKoIDY4LdXa0BGmkjK7FG7SQpa2m9OBxX6cX0P8XiYwGgA6Y__Bn_QNv2gYjhUhKxUnpstea81JsgrMOfXFX0kikEq3Io-ELhmAi2IWOWk3w/s1600/iPhones.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrOPwBuqAA3yL8qoUP1OQfkxgRqxipH5beKoIDY4LdXa0BGmkjK7FG7SQpa2m9OBxX6cX0P8XiYwGgA6Y__Bn_QNv2gYjhUhKxUnpstea81JsgrMOfXFX0kikEq3Io-ELhmAi2IWOWk3w/s320/iPhones.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;NewsItemContent&quot; id=&quot;intelliTxt&quot; name=&quot;intelliTxt&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;div class=&quot;Body&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 10pt; line-height: 15pt; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
Sounds groovy, and there will be more to iPhone 4.0 than just multitasking. Pre-release builds have shown that a global mailbox view has been added, as well as the ability to add individual contacts to the iPhone&#39;s home screen.&lt;/div&gt;
&lt;div class=&quot;clear: both;&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;BookmarkShareForm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;Via: &lt;a href=&quot;http://www.appleinsider.com/articles/10/03/31/apples_iphone_4_0_to_support_multitasking_via_expose_like_interface.html&quot;&gt;Appleinsider&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B001EH9MK2&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/325594141678899490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/325594141678899490' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/325594141678899490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/325594141678899490'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/04/iphone-os-40-features-explose-like.html' title='iPhone OS 4.0 Features Explose-Like Multitasking'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikitEyAhM_EhzKT-nMVrnFBIrK1k02gVwgwK3YAwSOSnrnzVj6Xj9mLL51C7fzrt2wTEaJFnzyZXMR86bBNwn1llO4OhSRc3hLgy7MoeFuwWW6vVOEhsXdDnFwQZ19a5KrBhnknjmsO-0/s72-c/iPhone_OS_4.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-9049946812113480221</id><published>2010-03-28T22:03:00.000+05:00</published><updated>2013-07-24T15:54:14.349+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Magellan Introduces RoadMate App For iPhone</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
iPhone   users now have another GPS  option for their phones. Magellan  GPS recently announced the Magellan RoadMate App for iPhone  for the United  States and Puerto Rico. The app uses the same interface as the company&#39;s   dedicated personal navigation devices. &lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;img height=&quot;249&quot; src=&quot;http://hothardware.com/newsimages/Item12621/Magellan-RoadMate-1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
Feature highlights include:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Spoken street name guidance&lt;/li&gt;
&lt;li&gt;Highway  lane assist&lt;/li&gt;
&lt;li&gt;In-app music control&lt;/li&gt;
&lt;li&gt;iPhone address book  integration&lt;/li&gt;
&lt;li&gt;Pedestrian Mode&lt;/li&gt;
&lt;li&gt;Most current maps provided  by NAVTEQ&lt;/li&gt;
&lt;/ul&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;img src=&quot;http://hothardware.com/newsimages/Item12621/Magellan-RoadMate-2.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
The  Magellan RoadMate App does not have any recurring  subscription fees and is available for use on the iPod touch  (2nd generation)  with the Magellan Premium Car Kit (sold separately). The app is  available at an  introductory price of $39.99.&lt;br /&gt;
&lt;img height=&quot;245&quot; src=&quot;http://hothardware.com/newsimages/Item12621/Magellan-RoadMate-3.jpg&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
Source:&lt;a href=&quot;http://hothardware.com/News/Magellan-Introduces-RoadMate-App-For-iPhone/&quot;&gt;Hothardware&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/9049946812113480221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/9049946812113480221' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/9049946812113480221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/9049946812113480221'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/magellan-introduces-roadmate-app-for.html' title='Magellan Introduces RoadMate App For iPhone'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-1231441036352433644</id><published>2010-03-26T14:29:00.000+05:00</published><updated>2013-07-24T15:54:36.302+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Google introduces warnings on suspicious Gmail use &#39;Last accessed from China, you say?&#39;</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;articleEmbed&quot; style=&quot;float: right; margin-left: 10px; width: 220px;&quot;&gt;
&lt;div class=&quot;imageGallery&quot; id=&quot;imagegallery_imageGalleryHolder&quot; style=&quot;display: block; float: right; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; width: 220px;&quot;&gt;
&lt;div class=&quot;imageHolder&quot; id=&quot;imagegallery_imageHolder&quot; style=&quot;border-bottom-color: initial; border-bottom-style: none; border-bottom-width: initial; border-left-color: rgb(128, 130, 132); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(128, 130, 132); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(128, 130, 132); border-top-style: solid; border-top-width: 1px; clear: both; height: 163px; overflow-x: auto; overflow-y: auto;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;a href=&quot;http://www.techradar.com/news/internet/google-introduces-warnings-on-suspicious-gmail-use-679506&quot; id=&quot;imagegallery_zoomButton&quot; style=&quot;color: #3393c8; outline-color: initial; outline-style: initial; outline-width: 0px; text-decoration: none;&quot;&gt;&lt;img alt=&quot;gmail-warnings&quot; src=&quot;http://cdn.mos.techradar.com//classifications/computing/internet-and-broadband/google/gmail_warning-218-85.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; float: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 218px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;keyGrey&quot; style=&quot;background-color: white; border-bottom-color: rgb(128, 130, 132); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(128, 130, 132); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(128, 130, 132); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(128, 130, 132); border-top-style: solid; border-top-width: 1px; display: block; position: relative;&quot;&gt;
&lt;div class=&quot;tl&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial initial; background-repeat: initial initial; display: block; margin-bottom: -1px; margin-left: -1px; margin-right: -1px; margin-top: -1px; position: relative;&quot;&gt;
&lt;div class=&quot;tr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial initial; background-repeat: initial initial; display: block; position: relative;&quot;&gt;
&lt;div class=&quot;br&quot; style=&quot;background-image: url(http://www.techradar.com/default/img/cnr.key.grey.br.png); background-position: 100% 100%; background-repeat: no-repeat no-repeat; display: block; position: relative;&quot;&gt;
&lt;div class=&quot;bl&quot; style=&quot;background-image: url(http://www.techradar.com/default/img/cnr.key.grey.bl.png); background-position: 0% 100%; background-repeat: no-repeat no-repeat; display: block; position: relative;&quot;&gt;
&lt;div class=&quot;content&quot; style=&quot;display: block; min-height: 10px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px; position: relative;&quot;&gt;
&lt;div class=&quot;imageInfo tiny&quot; style=&quot;color: #666666; display: block; font-size: 10px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;
&lt;div class=&quot;imageCaption black&quot; id=&quot;imagegallery_imageCaption&quot; style=&quot;color: black; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;Gmail warnings&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;imageCopyright&quot; id=&quot;imagegallery_imageCopyright&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;pin&quot; style=&quot;clear: both; display: block; float: none; height: 0px; overflow-x: hidden; overflow-y: hidden;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;pin&quot; style=&quot;clear: both; display: block; float: none; height: 0px; overflow-x: hidden; overflow-y: hidden;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;articleBody&quot;&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;Google has introduced a warning system for Gmail that will tell you if your account is being used suspiciously.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
The company is keen to show people when it appears that their details are being compromised, and will now put a high visibility bar in your account if it appears to be being accessed by someone other than you.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;Now, if it looks like something unusual is going on with your account, we&#39;ll also alert you by posting a warning message saying, &quot;Warning: We believe your account was last accessed from…&quot; along with the geographic region that we can best associate with the access,&quot; explains the&amp;nbsp;&lt;a href=&quot;http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html&quot; style=&quot;color: #3393c8; text-decoration: none;&quot;&gt;official Google blog&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;strong&gt;Broad geographical location&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;To determine when to display this message, our automated system matches the relevant IP address, logged per the Gmail privacy policy, to a broad geographical location,&quot; it added.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;While we don&#39;t have the capability to determine the specific location from which an account is accessed, a login appearing to come from one country and occurring a few hours after a login from another country may trigger an alert.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;By clicking on the &#39;Details&#39; link next to the message, you&#39;ll see the last account activity window that you&#39;re used to, along with the most recent access points.&quot;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;strong&gt;Common sense prevails&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
Google did add that it was important users did not rely entirely on the new safeguards, but continue to apply the normal common sense procedures for their accounts.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;Keep in mind that these notifications are meant to alert you of suspicious activity but are not a replacement for account security best practices,&quot; added the blog.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&quot;If you&#39;d like more information on account security, read these tips on keeping your information secure or visit the Google Online Security Blog.&quot;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
Source: &lt;a href=&quot;http://www.techradar.com/news/internet/google-introduces-warnings-on-suspicious-gmail-use-679506&quot;&gt;Techradar&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.4em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=0393072231&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/1231441036352433644/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/1231441036352433644' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/1231441036352433644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/1231441036352433644'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/google-introduces-warnings-on.html' title='Google introduces warnings on suspicious Gmail use &#39;Last accessed from China, you say?&#39;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-4282912623221470931</id><published>2010-03-19T19:07:00.000+05:00</published><updated>2013-07-24T15:55:01.746+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Google May Leave China on April 10</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Google’s &lt;a href=&quot;http://mashable.com/2010/03/13/google-china-decision/&quot;&gt;decision&lt;/a&gt;  to cease its operation in China is edging closer to reality after  months of negotiations. China Business News reports that Google plans to  leave China on April 10.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSfUeiCwgV-6itE74H2lZtuMiWwFX3S24OH-36QccSCwUbTzSKDZOpwhTYdBMv-kIbwc32jtsYO_ZAZW_0pVx8glf9lQq6o2mAaKeJxRgVidDTS_HSoyH9LB2Z5vIiQmeWEFml8G7Kv3Q/s1600-h/google-china.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSfUeiCwgV-6itE74H2lZtuMiWwFX3S24OH-36QccSCwUbTzSKDZOpwhTYdBMv-kIbwc32jtsYO_ZAZW_0pVx8glf9lQq6o2mAaKeJxRgVidDTS_HSoyH9LB2Z5vIiQmeWEFml8G7Kv3Q/s320/google-china.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The report cites an unidentified Google  China employee, but this information has not been confirmed by Google.  Allegedly, Google &lt;a href=&quot;http://www.bloomberg.com/apps/news?pid=newsarchive&amp;amp;sid=afs43GkjbRG4&quot; target=&quot;_blank&quot;&gt;gave its China employees&lt;/a&gt; the option of moving to  the company’s U.S. headquarters or working for its Asia-Pacific  operations.&lt;br /&gt;
If this is true, it once again raises the question of  what, exactly, is Google pulling out from China: its entire operations  or just the search engine, which it has declined to censor? The latter  now seems more likely.&lt;br /&gt;
In any case, if Google does pull out, it  may be a long, long time before it returns. Peter Lui, who was formerly  Google’s financial controller for the Asia Pacific region, said that  Google’s public announcement to leave had “burnt bridges… There is no  way Google can ever come back.”&lt;br /&gt;
Via:&lt;a href=&quot;http://mashable.com/2010/03/19/google-leave-china-april-10/&quot;&gt;Mashable&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/4282912623221470931/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/4282912623221470931' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4282912623221470931'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4282912623221470931'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/google-may-leave-china-on-april-10.html' title='Google May Leave China on April 10'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSfUeiCwgV-6itE74H2lZtuMiWwFX3S24OH-36QccSCwUbTzSKDZOpwhTYdBMv-kIbwc32jtsYO_ZAZW_0pVx8glf9lQq6o2mAaKeJxRgVidDTS_HSoyH9LB2Z5vIiQmeWEFml8G7Kv3Q/s72-c/google-china.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-2875436138244617305</id><published>2010-03-17T19:14:00.000+05:00</published><updated>2013-07-24T15:55:22.181+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Windows Phone 7 Series won&#39;t have copy and paste</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB-Gp324Y9Sxuk0saCYhb3VfMt5DAaAym5qV0FGDaRDbRqNIBUi1OJ7S5jzWCDmiZTAhjHbh6tcYBoDZryQFDN-EmmnwDYLVpnYlDCm_6TMfDrPKvtnUdywtj4eXOb8FXbEVGbA8BOvpw/s1600-h/wp7s-lg-sm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB-Gp324Y9Sxuk0saCYhb3VfMt5DAaAym5qV0FGDaRDbRqNIBUi1OJ7S5jzWCDmiZTAhjHbh6tcYBoDZryQFDN-EmmnwDYLVpnYlDCm_6TMfDrPKvtnUdywtj4eXOb8FXbEVGbA8BOvpw/s320/wp7s-lg-sm.jpg&quot; /&gt;&lt;/a&gt;Ready for another long, drawn-out copy and paste controversy to overtake your every waking moment for a year or two? Good: Microsoft just mentioned in a Q&amp;amp;A session here at MIX10 in no uncertain  terms that clipboard operations won&#39;t be supported on Windows Phone 7  Series... so that&#39;s that. Kind of ironic considering that the WinMo of  old has been enjoying the functionality since time immemorial, isn&#39;t it?  Of course, anything is possible going forward -- they&#39;ve said on  several occasions in different talks and sessions this week that they&#39;re  already looking at a number of enhancements that were scoped out of the  initial release of the platform -- but for the phones you buy this  holiday season, don&#39;t expect to be copying anything between apps.&lt;/div&gt;
&lt;br /&gt;
&lt;strong&gt;Update:&lt;/strong&gt; We just super-double-ultra-plus-confirmed this  with Microsoft -- Windows Phone 7 Series will not have copy and paste  functionality. There is a data-detection service built into the  text-handling API that will recognize phone numbers and addresses, but  Microsoft says most users, including Office users, don&#39;t really need  clipboard functionality. We... respectfully disagree? Sure, let&#39;s leave  it at that.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Via: &lt;a href=&quot;http://www.engadget.com/2010/03/16/windows-phone-7-series-wont-have-copy-and-paste/&quot;&gt;Engagdet &lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/2875436138244617305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/2875436138244617305' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/2875436138244617305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/2875436138244617305'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/windows-phone-7-series-wont-have-copy.html' title='Windows Phone 7 Series won&#39;t have copy and paste'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB-Gp324Y9Sxuk0saCYhb3VfMt5DAaAym5qV0FGDaRDbRqNIBUi1OJ7S5jzWCDmiZTAhjHbh6tcYBoDZryQFDN-EmmnwDYLVpnYlDCm_6TMfDrPKvtnUdywtj4eXOb8FXbEVGbA8BOvpw/s72-c/wp7s-lg-sm.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-5842562795653377924</id><published>2010-03-17T19:07:00.001+05:00</published><updated>2013-07-24T15:55:39.161+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Internet Explorer 9 Is Looking Positively Sexy</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpLOJLjFGu9mH5sa44jLKlqEIhB5A5UfXmzX-d8VlJGzCFZhcPqu3VUOE3NEC_ZDqjoNalu_-AlYG54n6TS1b5cp0g7DQkwIYIjswluyAS0ymt6goYBRacmFAc_rf9zNHTgdhwuEJyIHA/s1600-h/ie_logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpLOJLjFGu9mH5sa44jLKlqEIhB5A5UfXmzX-d8VlJGzCFZhcPqu3VUOE3NEC_ZDqjoNalu_-AlYG54n6TS1b5cp0g7DQkwIYIjswluyAS0ymt6goYBRacmFAc_rf9zNHTgdhwuEJyIHA/s320/ie_logo.jpg&quot; /&gt;&lt;/a&gt;&lt;em&gt;Microsoft&lt;/em&gt;  browser—we&#39;d have beaten you with a stack of TPS reports. This week,  well, it&#39;s a different story. The actual IE9 browser isn&#39;t available for  download yet, but Microsoft has made what it calls the Internet  Explorer 9 Platform Preview available for download. Internet Explorer 9  offers a bevy of new features compared to IE8 (or anything else), but  the most exciting feature is the browser&#39;s built-in GPU hardware  acceleration. &lt;/div&gt;
&lt;br /&gt;
As it turns out, there&#39;s quite a bit Microsoft can  do, even with a modest integrated GPU. AMD&#39;s Robin Maffeo  has put together a &lt;a href=&quot;http://blogs.amd.com/developer/2010/03/16/ie9-takes-advantage-of-the-gpu/&quot;&gt;blog  post&lt;/a&gt; that summarizes several key differences between IE9 and its  predecessors.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;The MSHTML rendering layer has been enhanced to  use Direct2D and DirectWrite instead of GDI.  Direct2D enables GPU  accelerated 2D graphics and text, and allows sub-pixel positioning.  In  addition, the GPU is used for scaling (bitmaps are mapped to textures),  which is ideal for zooming and moving images around the screen.  This  GPU support translates directly into improved readability of pages, more  precise placement of text and images, and smooth scrolling and zooming.&lt;/li&gt;
&lt;li&gt;JavaScript  performance is greatly improved from older versions of Internet  Explorer, and should be competitive if not better than competing  browsers.  In the past,  JavaScript in IE was interpreted and not compiled into native processor  instructions.  The JavaScript engine now includes a JIT compiler which  emits x86 instructions and compiles the code before it runs, resulting  in a dramatic performance uplift.  Instruction generation can also be  tailored to the underlying processor to take full advantage of the  underlying platform.&lt;/li&gt;
&lt;li&gt;IE9 is more standards compliant than  previous versions, with new support for HTML5 elements such as  &lt;video tabindex=&quot;0&quot;&gt; and &lt;canvas&gt; CSS3 support, and SVG support.&amp;nbsp; The  &lt;canvas&gt; element will be accelerated on the GPU via Direct2D and  will enable hardware accelerated rendering contexts for application development,  improving visual display, reducing CPU usage, and improving power  usage.&lt;/canvas&gt;&lt;/canvas&gt;&lt;/video&gt;&lt;/li&gt;
&lt;li&gt;The Javascript performance  improvement is still a bit murky; let&#39;s unpack it with some help from  the official IE9 blog. &quot;To improve JavaScript performance even more,  Chakra [IE9&#39;s Javascript engine] does something quite different from  other script engines today. It has a separate background thread for  compiling JavaScript. Windows runs that thread in parallel on a separate  core when one is available. Compiling in the background enables users  to keep interacting with webpages while IE generates even faster code.   By running separately in the background, this process can take advantage  of today’s multi-core machines – so, users with a Core2Duo or QuadCore  or i7 can apply that power to making webpages faster without any  additional effort. &quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;img src=&quot;http://hothardware.com/newsimages/Item12507/IE9.jpg&quot; /&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;em&gt;Still shots don&#39;t do the rendering engine  justice. Picture 256 icons spinning at 60 frames a second, without  slowing anything else down. &lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
IE9 isn&#39;t expected  to drop until 2011 and its GPU-accelerated rendering engine isn&#39;t  compatible with Windows XP due to fundamental differences between  Windows XP&#39;s software rendering style and the Desktop Window Manager  that ships with both Windows 7 and Windows Vista; it&#39;s not clear if  Microsoft will release IE9 for XP or simply continue to maintain IE8&#39;s  security patches. It&#39;s hard to capture some of the coolest things the  IE9 Platform can do in a static screenshot; head over to Microsoft&#39;s  website and take a look yourself if you&#39;re curious. When you consider  how much of our time is spent within a browser, this is the sort of  innovation that could genuinely be called a game-changer. We&#39;ll  undoubtedly see announcements and demonstrations from Chrome, Firefox,  and Opera in the days ahead—the sooner this tech hits the desktop  (without being buggy) the better.  &lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
Via:&lt;a href=&quot;http://blogs.msdn.com/ie/&quot;&gt;IE Blog&lt;/a&gt;&lt;br /&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B000HCZ8EO&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/5842562795653377924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/5842562795653377924' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5842562795653377924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5842562795653377924'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/internet-explorer-9-is-looking.html' title='Internet Explorer 9 Is Looking Positively Sexy'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpLOJLjFGu9mH5sa44jLKlqEIhB5A5UfXmzX-d8VlJGzCFZhcPqu3VUOE3NEC_ZDqjoNalu_-AlYG54n6TS1b5cp0g7DQkwIYIjswluyAS0ymt6goYBRacmFAc_rf9zNHTgdhwuEJyIHA/s72-c/ie_logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-4264561960090995687</id><published>2010-03-17T18:56:00.000+05:00</published><updated>2013-07-24T15:55:59.100+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Google partners call for clarity on China plans</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXn1p5zzHfDGtdyRWThxlYguWb5xRGlEj2m2BfxgToNv-HqtYnNG-TSLs1xsnmciUaeiJKuIHWxqla1_8Qg7O8iMrzeZqzk3XqOLOBYBsjdkrue-DD3U8rBj5XRzDlsp-Q__0NO1I-S4o/s1600-h/www.reuters.com.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXn1p5zzHfDGtdyRWThxlYguWb5xRGlEj2m2BfxgToNv-HqtYnNG-TSLs1xsnmciUaeiJKuIHWxqla1_8Qg7O8iMrzeZqzk3XqOLOBYBsjdkrue-DD3U8rBj5XRzDlsp-Q__0NO1I-S4o/s400/www.reuters.com.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;(Reuters) -  Chinese firms selling advertising space on Google&#39;s search pages have  demanded clarity about the search giant&#39;s plans in China, as speculation  increases over Google&#39;s future in the world&#39;s largest Internet market.&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;relatedTopics&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;a href=&quot;http://www.reuters.com/news/technology&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.reuters.com/places/china&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;span id=&quot;midArticle_0&quot;&gt;&lt;/span&gt;Their demand comes amid signs that Google  Inc may soon move to close Google.cn, more than two months after it hit  back against sophisticated hacking attacks from inside China and said it  was no longer willing to offer a censored search engine.&lt;br /&gt;
&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;Google and China have been tight-lipped  since then about any talks to reconcile their differences.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;A letter purportedly from 27  Google-authorized sales representative companies says the wait has gone  on for too long, eroding their business, scaring off employees and  putting big investments in jeopardy.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;&quot;We  see a constant stream of information but cannot predict the future, we  see business sliding, but there is nothing we can do,&quot; says the letter,  which was also posted on a website affiliated with China&#39;s central  television. &quot;We are waiting now in incomparable pain and disquiet.&quot;&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;Google has received the letter and is  reviewing it, spokeswoman Jill Hazelbaker said.&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;Many of the signatories, contacted by  Reuters, would not comment on the letter, or said they were unaware of  it.&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;Some said that neither their  affiliation with Google.cn nor the fight between Google and the  government had hurt their business, although others acknowledged  hesitancy by customers unsure of Google&#39;s future in China.&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;&quot;We don&#39;t want Google to pull out. We  believe Google will give us a proper explanation,&quot; said a customer  service manager, surnamed Sheng, at Suzhou Universal Internet Media,  adding she was not familiar with the contents of the letter.&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;The Wall Street Journal quoted one anonymous  source who confirmed the contents of the letter, but added that not all  the signatories had been involved in drafting the letter.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;The companies sell advertising spots on  Google search-result pages tied to certain searches.&lt;br /&gt;
&lt;span id=&quot;midArticle_10&quot;&gt;&lt;/span&gt;COMPENSATION&lt;br /&gt;
&lt;span id=&quot;midArticle_11&quot;&gt;&lt;/span&gt;The  letter spells out demands for redress -- for investors, employees and  clients -- that could add to the economic and political pressures on  Google if it shuts down Google.cn and perhaps withdraws other operations  from China.&lt;br /&gt;
&lt;span id=&quot;midArticle_12&quot;&gt;&lt;/span&gt;The letter demands  that Google develop a plan spelling out when customers&#39; pre-payments for  advertising will be returned to them, how employees of the advertising  agents thrown out of work will be compensated, and how the companies  themselves will be compensated for investments.&lt;br /&gt;
&lt;span id=&quot;midArticle_13&quot;&gt;&lt;/span&gt;Addressed to Google&#39;s top executive for  China, John Liu, it demands negotiations with the company.&lt;br /&gt;
&lt;span id=&quot;midArticle_14&quot;&gt;&lt;/span&gt;A commerce ministry spokesman on Tuesday  warned Google to obey Chinese laws and rules, including alerting the  ministry to any exit plans.&lt;br /&gt;
&lt;span id=&quot;midArticle_15&quot;&gt;&lt;/span&gt;Google&#39;s  chief executive, Eric Schmidt, said last week he hoped to have an  outcome soon from talks with Chinese officials on offering an uncensored  search engine in the country of 384 million Internet users.&lt;br /&gt;
&lt;span id=&quot;midArticle_0&quot;&gt;&lt;/span&gt;Many experts doubt China&#39;s ruling Communist  Party would compromise on censorship. The Financial Times reported at  the weekend the talks had reached an impasse and Google was &quot;99.9  percent&quot; certain to shut Google.cn.&lt;br /&gt;
&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;A  Google spokesperson said on Monday that talks with Chinese authorities  had not ended, but added that the company was adamant about not  accepting self-censorship.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;China  requires Internet operators to block words and images the ruling  Communist Party deems unacceptable. Google.cn has not yet lifted that  filter.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;Internationally popular  websites Facebook, Twitter and YouTube are entirely blocked in China,  which uses a filtering &quot;firewall&quot; to block Internet users from overseas  content banned by authorities.&lt;br /&gt;
Via: &lt;a href=&quot;http://www.reuters.com/article/idUSTRE62E11L20100317?type=technologyNews&quot;&gt;Reuters &lt;/a&gt;&lt;br /&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B001M66SJS&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/4264561960090995687/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/4264561960090995687' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4264561960090995687'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/4264561960090995687'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/google-partners-call-for-clarity-on.html' title='Google partners call for clarity on China plans'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXn1p5zzHfDGtdyRWThxlYguWb5xRGlEj2m2BfxgToNv-HqtYnNG-TSLs1xsnmciUaeiJKuIHWxqla1_8Qg7O8iMrzeZqzk3XqOLOBYBsjdkrue-DD3U8rBj5XRzDlsp-Q__0NO1I-S4o/s72-c/www.reuters.com.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-7257165134613790759</id><published>2010-03-05T15:13:00.000+05:00</published><updated>2013-07-24T15:56:17.889+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Google Buzz Now Available as an iPhone App</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV3HfHR4ij5uFUtbI-ILBVWavwzxRKoUNkz1McuinxWAVtT8mDSGZLVohm8rjYKWdQJksvhjvDrQFIZFvLBMD64FXp-_zj3WJ-8yab00-LNuriHGGBv322n7dOu8yzQYObffHKbd4f0BU/s1600-h/Apple_Buzz.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV3HfHR4ij5uFUtbI-ILBVWavwzxRKoUNkz1McuinxWAVtT8mDSGZLVohm8rjYKWdQJksvhjvDrQFIZFvLBMD64FXp-_zj3WJ-8yab00-LNuriHGGBv322n7dOu8yzQYObffHKbd4f0BU/s320/Apple_Buzz.jpg&quot; /&gt;&lt;/a&gt;Here it is folks, the first ever third-party application for Google Buzz, now  available through the iTunes  App Store. It&#39;s called Buzzie, and for the next few days, you can snag  it for 33 percent off as part of a special introductory price.&lt;/div&gt;
&lt;br /&gt;
If  you&#39;re a fan of Google&#39;s newest social networking &lt;a class=&quot;iAs&quot; classname=&quot;iAs&quot; href=&quot;http://hothardware.com/News/Google-Buzz-Now-Available-as-an-iPhone-App/#&quot; itxtdid=&quot;6666330&quot; style=&quot;background-color: transparent ! important; background-image: none; border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; color: rgb(43, 101, 176) ! important; font-size: 100% ! important; font-weight: normal ! important; padding-bottom: 0px ! important; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;nobr id=&quot;itxt_nobr_3_0&quot; style=&quot;color: #2b65b0; font-size: 100%; font-weight: normal;&quot;&gt;&lt;/nobr&gt;&lt;/a&gt;tool and can&#39;t imagine owning a smartphone other than the iPhone, then this is  probably the best news ever. But you don&#39;t have to be a Buzz user to  check it out. Non-Gmail users who want to see what all the fuss is about  can play the part of mobile &lt;a class=&quot;iAs&quot; classname=&quot;iAs&quot; href=&quot;http://hothardware.com/News/Google-Buzz-Now-Available-as-an-iPhone-App/#&quot; itxtdid=&quot;7209806&quot; style=&quot;background-color: transparent ! important; background-image: none; border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; color: rgb(43, 101, 176) ! important; font-size: 100% ! important; font-weight: normal ! important; padding-bottom: 0px ! important; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;nobr id=&quot;itxt_nobr_4_0&quot; style=&quot;color: #2b65b0; font-size: 100%; font-weight: normal;&quot;&gt;&lt;/nobr&gt;&lt;/a&gt;voyeur and read through local Buzz conversations without ever logging  into the service. Should you decide to log in or sign up, you can then  jump into the discussion.&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;img src=&quot;http://hothardware.com/newsimages/Item12376/Buzzie.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
Buzzie  is a pretty straightforward app that&#39;s so far been well received,  according to the user reviews. The app also taps into the iPhone &lt;a class=&quot;iAs&quot; classname=&quot;iAs&quot; href=&quot;http://hothardware.com/News/Google-Buzz-Now-Available-as-an-iPhone-App/#&quot; itxtdid=&quot;7837524&quot; style=&quot;background-color: transparent ! important; background-image: none; border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; color: rgb(43, 101, 176) ! important; font-size: 100% ! important; font-weight: normal ! important; padding-bottom: 0px ! important; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;nobr id=&quot;itxt_nobr_5_0&quot; style=&quot;color: #2b65b0; font-size: 100%; font-weight: normal;&quot;&gt;&lt;/nobr&gt;&lt;/a&gt;GPS feature, but also gives you the option of marking your Buzz as  private or public depending on whether or not you want your location out  there for all to see.&lt;br /&gt;
&lt;br /&gt;
You can snag the app &lt;a href=&quot;http://itunes.apple.com/us/app/buzzie/id355397860?mt=8&quot;&gt;here&lt;/a&gt;,  and if you do, be sure to let us know what you think in the comments  section below.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
Source: &lt;a href=&quot;http://hothardware.com/News/Google-Buzz-Now-Available-as-an-iPhone-App/&quot;&gt;Hothardware&lt;/a&gt;&lt;br /&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=1416546960&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=0596515790&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=038534273X&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/7257165134613790759/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/7257165134613790759' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7257165134613790759'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7257165134613790759'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/03/google-buzz-now-available-as-iphone-app.html' title='Google Buzz Now Available as an iPhone App'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV3HfHR4ij5uFUtbI-ILBVWavwzxRKoUNkz1McuinxWAVtT8mDSGZLVohm8rjYKWdQJksvhjvDrQFIZFvLBMD64FXp-_zj3WJ-8yab00-LNuriHGGBv322n7dOu8yzQYObffHKbd4f0BU/s72-c/Apple_Buzz.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-550744774421975954</id><published>2010-02-20T23:33:00.001+05:00</published><updated>2013-07-24T15:56:48.862+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>iPhone Banned in the USA</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Eastman Kodak is after your iPhone AND they  want to take away your BlackBerry.&lt;br /&gt;
They won&#39;t come and pry the device out of your hand, but they  definitely want to halt the phones from being imported until they get  their piece of the pie.&lt;br /&gt;
Eastman Kodak claims that Apple Computers and Research in Motion are  guilty of infringement of patents. Kodak has taken the step to request  the U.S. International Trade Commission prevent both companies from  importing their smart phones into the United States. Nokia filed a  similar complaint in December 2009.&lt;br /&gt;
&lt;div class=&quot;mediaRight&quot;&gt;
&lt;div class=&quot;relatedStory&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;mediaRightIMG&quot;&gt;
&lt;img alt=&quot;iPhone banned&quot; src=&quot;http://www.better-trades.com/analyst-exchange/tech-comparisons/_images/iphonebannedUSA.jpg&quot; /&gt;&lt;/div&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.better-trades.com/analyst-exchange/tech-comparisons/_images/story_bot.jpg&quot; /&gt;     &lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clear&quot;&gt;
&lt;/div&gt;
Kodak says both companies have infringed on patents regarding digital  imaging, Apple for its iPhone and Research in Motion for its BlackBerry  phone.  The companies had been negotiating with Kodak to settle the  potential compensation matter, but those talks broke down after neither  side could break the impasse.&lt;br /&gt;
Kodak wants to ban devices with touch screens, like the Apple iPhone,  the BlackBerry Storm and other camera phones such as the Tour, Bold,  Curve and Pearl. The main issue is the built-in cameras. Kodak has more  than 1,000 patents involving digital imaging. &lt;br /&gt;
Kodak&#39;s complaint says the iPhone and BlackBerry infringe on the  patent approved in 2001 regarding the ability to preview images. Kodak  made more than $622 million on intellectual property last year and  expects to receive more than $450 million in royalty this year from  Samsung. It is seeking a similar agreement with Apple and Research in  Motion.&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.better-trades.com/analyst-exchange/tech-comparisons/_images/antonioperez.jpg&quot; style=&quot;float: left; padding: 10px 15px 20px 0pt;&quot; /&gt;   The ITC has 45 days to decide whether it will consider the complaint  and would hold a hearing about the matter within the next year. Kodak  has filed a similar suit against Samsung and LG and currently has  licensing agreements with both companies, as well as Sony Ericsson,  Motorola and Nokia.&lt;br /&gt;
This is just another round in the smartphone war. Apple filed a  complaint against Nokia with the USITC last month that was designed to  block the import of Nokia&#39;s Oyj phone into the United States. The ITC  has agreed to consider the complaint. Nokia, the world&#39;s largest  manufacturer of mobile phones, filed its own complaint to ban imports of  the iPhone, iPod and MacBook. The USITC said it would review that  complaint, too.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Source: &lt;a href=&quot;http://www.better-trades.com/analyst-exchange/tech-comparisons/iphone-banned-in-usa.asp&quot;&gt;Better Trades&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/550744774421975954/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/550744774421975954' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/550744774421975954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/550744774421975954'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/02/iphone-banned-in-usa.html' title='iPhone Banned in the USA'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-7707750606955744556</id><published>2010-02-15T20:00:00.000+05:00</published><updated>2013-07-24T16:00:34.943+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Top 10 Google Settings You Should Know About</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5182900004351052895&quot; style=&quot;border-bottom: 0pt none; cursor: text; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img class=&quot;left image500&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/500x_google_settings_splash.jpg&quot; width=&quot;500&quot; /&gt;As the &lt;a href=&quot;http://lifehacker.com/5469388/stop-google-buzz-from-showing-the-world-your-contacts&quot;&gt;outcry&lt;/a&gt;  over &lt;a href=&quot;http://lifehacker.com/5470104/google-updates-explains-buzz-privacy-setup&quot;&gt;Google  Buzz&#39;s privacy&lt;/a&gt; has shown us, it&#39;s smart to &lt;a href=&quot;http://lifehacker.com/5468067/hideremove-google-buzz-updates-from-your-gmail-inbox&quot;&gt;explore  settings in Gmail&lt;/a&gt;, along with other places you&#39;re sharing data with  the search giant. Let&#39;s take a look at 10 privacy, convenience, and  annoyance fixers you should know.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
10. Turn off auto-displayed pictures from Gmail  contacts&lt;/h3&gt;
&lt;img class=&quot;left image500&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/500x_504x_display-images.jpg&quot; width=&quot;500&quot; /&gt;By default, Gmail hides images  embedded into emails from chain letters and unknown sources—and that&#39;s a  smart move, given spammers&#39; tracking tactics and malware tendencies.  But it still &lt;a href=&quot;http://gmailblog.blogspot.com/2009/07/now-displaying-images-in-messages-from.html&quot;&gt;shows  images from contacts you&#39;ve previously sent mail to&lt;/a&gt;, which can be a  pain if you&#39;ve got relatives who just &lt;em&gt;love&lt;/em&gt; hi-&lt;em&gt;larious&lt;/em&gt;  forwards. Head to your Settings page, and look for the &quot;external  content&quot; setting, which you can switch off to always ask you to confirm  showing images in any email. If you&#39;ve got just a handful of offenders,  open up one of the egregious emails, hit the &quot;Show details&quot; link near  the bottom of the to/from/subject details, and click the &quot;don&#39;t display  from now on&quot; link. (&lt;a href=&quot;http://lifehacker.com/5319455/gmail-now-automatically-displays-images-in-messages-from-contacts&quot;&gt;Original  post&lt;/a&gt;)&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
9. Fine-tune Google Apps  for your domain&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_google_apps_fyd.jpg&quot; width=&quot;340&quot; /&gt;Google Apps, formerly know as Apps  for Your Domain, has a lot of goodies tucked inside it for anyone who  owns their own site, runs a family name domain, or operates a small  business. Unlike Gmail, however, the new features and disabled offerings  aren&#39;t as apparent (or blogged about). Gina gave us a &lt;a href=&quot;http://lifehacker.com/5391537/trick-out-google-apps-for-your-domain&quot;&gt;great  tour of Google Apps&lt;/a&gt;, showing how you can control privacy and  access, choose which Labs features make it into your domain&#39;s email, and  otherwise set up your site to your liking.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
8. Prevent Android from  automatically signing into Gchat&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_auto-sign-in.jpg&quot; width=&quot;340&quot; /&gt;Simple and easy, but also easy to  miss: If you&#39;ve got an Android phone and have launched Google Talk from  it just once, you might notice that you seem to catch any and all chats  throughout the day. That&#39;s because Talk can sit in the background upon  launching, ready to pick up messages. That&#39;s fine if that&#39;s what you  want, but if you want a choice in the matter, head to the Google Talk  app, hit your Menu key, and choose Settings. Un-check the &quot;Automatically  sign in&quot; option, hit your back button, and then hit Menu and sign out  of Google Talk. You&#39;ll need to sign back in if you&#39;re downloading apps  from the Market (odd pairing, indeed), but you&#39;re otherwise free to chat  when you want to. (&lt;a href=&quot;http://lifehacker.com/5461265/prevent-google-talk-on-android-from-automatically-signing-in&quot;&gt;Original  post&lt;/a&gt;)&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
7. Turn off Buzz, Chat,  and Labs in Gmail&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_top10_gmail_setting.jpg&quot; width=&quot;340&quot; /&gt;Not big on Buzz? Chat more  distracting than useful? Gmail Labs making your inbox feel lag-ish? You  can kill all of them, if you&#39;d like, and get back just a plain vanilla  inbox. Scroll all the way to the bottom of any page inside Gmail, and at  the bottom, you&#39;ll see two links to turn Gmail&#39;s chat sidebar and Buzz  inbox on or off. Actually, you don&#39;t really &quot;turn off Buzz&quot; so much as  remove it from your inbox, so be sure and check your Buzz settings at &lt;a href=&quot;http://google.com/profiles/me&quot;&gt;your Google Profile&lt;/a&gt;, if you  have a Google Profile. If Labs features seem to be slowing down, or even  breaking, your Gmail experience, you can turn them off entirely by  loading Gmail from this URL: &lt;a href=&quot;https://mail.google.com/mail/?labs=0#&quot;&gt;&lt;code&gt;https://mail.google.com/mail/?labs=0#&lt;/code&gt;&lt;/a&gt;.  Bookmark it as your main Gmail link, or title it &quot;Gmail (Safe Mode)&quot; if  you&#39;d like to still venture into all the goodies on occasion.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
6. Disable SafeSearch (or  lock it in semi-permanently)&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_top10_safesearch3.jpg&quot; width=&quot;340&quot; /&gt;Google&#39;s &lt;a href=&quot;http://www.google.com/support/websearch/bin/answer.py?hl=en&amp;amp;answer=35892#safe&quot;&gt;SafeSearch&lt;/a&gt;  isn&#39;t an entirely comprehensive solution to preventing impressionable  eyes from the worst realms of the internet. It is, however, a good  stopgap until they learn to grow up and install other browsers, wipe out  cookies, and customize user scripts. Whether you don&#39;t have any young  ones in the house and want to turn SafeSearch off altogether or you want  a complete SafeSearch lockdown on your computer, head to your &lt;a href=&quot;http://www.google.com/preferences?hl=en&quot;&gt;search preferences&lt;/a&gt;,  scroll down to the SafeSearch section, and find the setting that fits  you. (In Google Image Search, they&#39;ve helpfully placed the control right  under the search box on your first result.) If you want to permanently  enable SafeSearch, click the &quot;Lock SafeSearch&quot; link—and repeat for any  browsers the little ones use. Now when they&#39;re performing a Google  search, you should see some giant Google-colored balls in the  upper-right corner—or else they&#39;ve gotten too smart.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
5. Set your default SMS  location&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_top10_sms_location.jpg&quot; width=&quot;340&quot; /&gt;For those without web-connected  smartphones, or at least a decent data connection, Google&#39;s &lt;a href=&quot;http://google.com/sms&quot;&gt;SMS service&lt;/a&gt; is seriously helpful—it&#39;s  how I (used to) &lt;a href=&quot;http://lifehacker.com/399619/forget-the-iphone++the-ipod-touch-is-good-enough&quot;&gt;get  by with just an iPod touch&lt;/a&gt; and a standard phone. To make it even  more helpful, text &lt;a href=&quot;http://googlesystem.blogspot.com/2007/09/google-sms-adds-personalization.html&quot;&gt;set  location&lt;/a&gt;, followed by the city and state or ZIP code where you  spend the most time. Now you can just text &quot;weather&quot; or &quot;pet store&quot; to  get the skinny on what&#39;s happening. (&lt;a href=&quot;http://lifehacker.com/software/text-messaging/get-more-from-google-sms-by-setting-a-default-location-299659.php&quot;&gt;Original  post&lt;/a&gt;)&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
4. Link and integrate  your apps&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_tasksincal.jpg&quot; width=&quot;340&quot; /&gt;Taking off the privacy and preference  hat for a moment, Google&#39;s apps have a lot of neat settings just  beneath their surface that make using them all together a tight  experience. You can turn emails into tasks, and then map those tasks on  your calendar. You can send voice messages and SMS from Google Voice to  Gmail, and mark them as read when you open them there. Gina previously  ran down &lt;a href=&quot;http://lifehacker.com/5355512/seven-easy-ways-to-integrate-your-google-apps&quot;&gt;seven  easy ways to integrate your Google apps&lt;/a&gt;, and even more seem to come  along every week.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
3. Turn off Search  History, logged in or not&lt;/h3&gt;
&lt;a href=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/top10_web_history2.jpg&quot; rel=&quot;lytebox&quot;&gt;&lt;img class=&quot;left image500&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/500x_top10_web_history2.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;If you&#39;re logged into Google for  Gmail or any other service, there&#39;s a good chance Google&#39;s keeping tabs  on all your searches, months after you made them. If you aren&#39;t logged  in, Google&#39;s probably still tracking and personalizing your searches  based on what you previously typed in. This &lt;a href=&quot;https://www.google.com/accounts/DeleteService?service=hist&quot;&gt;one-stop  solution&lt;/a&gt; should work for most users, but if it doesn&#39;t, log into  Google and head to &lt;a href=&quot;http://www.google.com/history/&quot;&gt;&lt;code&gt;google.com/history&lt;/code&gt;&lt;/a&gt;.  A notice at the top will tell you if you&#39;ve &quot;paused&quot; or otherwise  stopped your search history, or else you&#39;ll see your recent searches  listed with dates and times. You can clear out this history by hitting  the &quot;Remove items&quot; link on the left. If you aren&#39;t logged in, look for  the &quot;Web History&quot; link in the upper-right corner. From there, you can  choose whether Google tracks your searches via cookie and IP address and  customizes your results.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
2. Back up Google apps&#39;  data&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_google_docs_backup.jpg&quot; width=&quot;340&quot; /&gt;For all you&#39;ve heard about Buzz,  privacy, and Google this week, you still can&#39;t fault them too much for  their efforts to let you take your data with you if you decide to leave  their app ecosystem. The &lt;a href=&quot;http://www.dataliberation.org/&quot;&gt;Data  Liberation Front site&lt;/a&gt;, a pet project from Google&#39;s engineers,  explains how you can pull your information, documents, and other data  out of nearly any Google product. Gina&#39;s also covered some of Google&#39;s  apps in a &lt;a href=&quot;http://lifehacker.com/5335553/free-tools-to-back-up-your-online-accounts&quot;&gt;cloud  backup feature&lt;/a&gt;, and Adam tackled the &lt;a href=&quot;http://lifehacker.com/281635/back-up-your-google-apps-data&quot;&gt;best-at-that-time  tools for Google backups&lt;/a&gt; in 2007. (&lt;a href=&quot;http://lifehacker.com/5359205/googles-data-liberation-front-details-how-to-free-your-data-from-google&quot;&gt;Original  Data Liberation Front post&lt;/a&gt;)&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
1. Control what Buzz says  about you on the web&lt;/h3&gt;
&lt;img class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/340x_top10_google_buzz.jpg&quot; width=&quot;340&quot; /&gt;Google&#39;s new social service Buzz  showed up suddenly in everyone&#39;s Gmail accounts this week, and right  away it wanted to get you connected with the people you contact over  email and chat the most. Before you let it turn you loose, though,  consider whether you want the world to see exactly who you &quot;follow.&quot;  Google has since &lt;a href=&quot;http://gmailblog.blogspot.com/2010/02/millions-of-buzz-users-and-improvements.html&quot;&gt;improved  the on/off visibility&lt;/a&gt;, but if you want to make sure you&#39;re not  broadcasting your inbox to the web at large, we suggest &lt;a href=&quot;http://lifehacker.com/5469388/stop-google-buzz-from-showing-the-world-your-contacts&quot;&gt;visiting  your profile and checking your follower counts&lt;/a&gt;. If you don&#39;t see a  profile at all, or don&#39;t see the followed/following numbers, you&#39;re  likely in the clear, but as with many aspects of Buzz in this early  stage, you can&#39;t be too careful. And when you actually start using the  thing, be careful not to &lt;a href=&quot;http://techcrunch.com/2010/02/11/reply-google-buzz-exposing-email/&quot;&gt;broadcast  private email addresses yourself&lt;/a&gt;. (Original posts: &lt;a href=&quot;http://lifehacker.com/5470104/google-updates-explains-buzz-privacy-setup&quot;&gt;Buzz  update&lt;/a&gt;, &lt;a href=&quot;http://lifehacker.com/5470513/how-buzz-exposes-private-email-addresses-in-replies&quot;&gt;private  emails&lt;/a&gt;).&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;
Bonus item: Open search  results in new tabs&lt;/h3&gt;
&lt;img class=&quot;left image500&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2010/02/500x_top10_bonus_new_window.jpg&quot; width=&quot;500&quot; /&gt;Lifehacker copy consigliere Dustin  Luck mentions yet another reason to &lt;a href=&quot;http://www.google.com/preferences?hl=en&quot;&gt;hit up your search  preferences&lt;/a&gt; from time to time. With a single click, you can choose  to open the results you click on in new windows. If you&#39;ve set up your  browser the right way, those new windows become new tabs, and little  research projects on Google just became far more convenient.&lt;br /&gt;
&lt;br /&gt;
Source:&lt;a href=&quot;http://lifehacker.com/5470671/top-10-google-settings-you-should-know-about&quot;&gt;lifehacker &lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/7707750606955744556/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/7707750606955744556' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7707750606955744556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/7707750606955744556'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/02/top-10-google-settings-you-should-know.html' title='Top 10 Google Settings You Should Know About'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-5781404328240836701</id><published>2010-02-14T20:22:00.000+05:00</published><updated>2013-07-24T15:57:16.341+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>iTunes Nears 10 Billion Music Downloads And Prize To Downloader</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha-E9qxvR_8v0zP7CbIDpefE1h1_jrTQdMCswcZNlWEFXaWU1nXh9umt-6mXewC_I0jfAbvqkunINfVIUkTnIWDhCMhzE8JPSqxJYmjl7vM4V0BNajSH_twexRCPPelJaVShE06lvir6I/s1600-h/iTunes.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha-E9qxvR_8v0zP7CbIDpefE1h1_jrTQdMCswcZNlWEFXaWU1nXh9umt-6mXewC_I0jfAbvqkunINfVIUkTnIWDhCMhzE8JPSqxJYmjl7vM4V0BNajSH_twexRCPPelJaVShE06lvir6I/s320/iTunes.jpg&quot; /&gt;&lt;/a&gt;The 10 billionth iTunes download is fast approaching, and Apple&#39;s  offering up a $10,000 iTunes gift card prize to one lucky winner.  That  winner will either be the downloader of the 10 billionth song, or the  person who submits the first &lt;a href=&quot;http://www.apple.com/itunes/10-billion-song-countdown/entryform/&quot; target=&quot;_&quot;&gt;non-purchase online entry form&lt;/a&gt; immediately following the  download of the 9,999,999,999th song.&lt;/div&gt;
&lt;br /&gt;
Based on those rules,  considering there are still over 100 million songs to go, it makes no  sense to try to enter at the time of this writing.  It&#39;s totally based  on when you enter, not some random drawing of entries, unless you happen  to tie for the 10 billionth entry.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgukGRGSdQDJEicWjZo3c_Bgtb_A-ez_eUbRRnC9iZ882DjTK1yG1LovwTbLmbQ-182I_tQULBzB32OmYOGM9g2l66SxbrXtO-PQ9MN3DZ_Izdt6_R-hrN4UiEPp0M_iQuvkkepPEPZ62A/s1600-h/iTunesContest.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgukGRGSdQDJEicWjZo3c_Bgtb_A-ez_eUbRRnC9iZ882DjTK1yG1LovwTbLmbQ-182I_tQULBzB32OmYOGM9g2l66SxbrXtO-PQ9MN3DZ_Izdt6_R-hrN4UiEPp0M_iQuvkkepPEPZ62A/s400/iTunesContest.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Last year, Apple had a similar promotion for the 1 billionth App Store  download.  However, they must value App Store downloads much more than  iTunes downloads, as that promotion included a lot more than just the  $10,000 iTunes gift card: the lucky winner collected an iPod  Touch, a Time Capsule, and a MacBook Pro, as well.&lt;br /&gt;
&lt;br /&gt;
Apple calls  it &quot;one huge milestone for music,&quot; and it is, but Apple hit a bigger  milestone much earlier.  In 2008, iTunes became the number one U.S.  music retailer.&lt;br /&gt;
Source:&lt;a href=&quot;http://www.apple.com/itunes/10-billion-song-countdown/&quot;&gt;Apple&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/5781404328240836701/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/5781404328240836701' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5781404328240836701'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5781404328240836701'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/02/itunes-nears-10-billion-music-downloads.html' title='iTunes Nears 10 Billion Music Downloads And Prize To Downloader'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha-E9qxvR_8v0zP7CbIDpefE1h1_jrTQdMCswcZNlWEFXaWU1nXh9umt-6mXewC_I0jfAbvqkunINfVIUkTnIWDhCMhzE8JPSqxJYmjl7vM4V0BNajSH_twexRCPPelJaVShE06lvir6I/s72-c/iTunes.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-679636959445959158</id><published>2010-02-08T22:54:00.000+05:00</published><updated>2013-07-24T16:01:44.078+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Real Time Voice Translation is On the Way, Thanks to Google.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Real time voice translation is on the way and Google aims to pioneer  it.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-PZULiLexBKth2niEIDjmc_v-WXEhmJ7IvRoTzEtTEKVwmME9_cDZYpPiWAuDj7_0XLXBdsMkLwsZp8DNlVmnStIERBGVeLf8uI00mF3yFc7IjIMQirCBssxmbE5Y_8VRt5A6TuhFN4/s1600-h/baby-talking-on-cell-phone-280x280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-PZULiLexBKth2niEIDjmc_v-WXEhmJ7IvRoTzEtTEKVwmME9_cDZYpPiWAuDj7_0XLXBdsMkLwsZp8DNlVmnStIERBGVeLf8uI00mF3yFc7IjIMQirCBssxmbE5Y_8VRt5A6TuhFN4/s320/baby-talking-on-cell-phone-280x280.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The Internet giant wants to develop its smartphone technology  to translate speech in real time.&lt;br /&gt;
The company would combine its  advanced voice recognition know-how with its text translation service to  create a mobile phone that acts as an instant interpreter.&lt;br /&gt;
Head  of translation services Franz Och said: “We think speech-to-speech  translation should be possible and work reasonably well in a few years’  time.&lt;span id=&quot;more-3969&quot;&gt;&lt;/span&gt;“Clearly, for it to work smoothly, you  need a combination of high-accuracy machine translation and  high-accuracy voice recognition, and that’s what we’re working on.”&lt;br /&gt;
‘Everyone  has a different voice, accent and pitch,’ said Mr Och. ‘But recognition  should be effective with mobile phones because by nature they are  personal to you.’&lt;br /&gt;
Google has already created an automatic system  for translating text on computers, which is being honed by scanning  millions of multi-lingual websites and documents.&lt;br /&gt;
However Google  admits speech will be an even tougher challenge than text but says a  customer’s phone would adapt to its user by ‘learning’ their style of  talking.&lt;br /&gt;
Source: &lt;a href=&quot;http://thenextweb.com/apps/2010/02/08/google-launch-smartphone-tool-translate-real-time/&quot;&gt;The next web&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/679636959445959158/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/679636959445959158' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/679636959445959158'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/679636959445959158'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/02/real-time-voice-translation-is-on-way.html' title='Real Time Voice Translation is On the Way, Thanks to Google.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-PZULiLexBKth2niEIDjmc_v-WXEhmJ7IvRoTzEtTEKVwmME9_cDZYpPiWAuDj7_0XLXBdsMkLwsZp8DNlVmnStIERBGVeLf8uI00mF3yFc7IjIMQirCBssxmbE5Y_8VRt5A6TuhFN4/s72-c/baby-talking-on-cell-phone-280x280.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-2393205781157069896</id><published>2010-01-26T22:31:00.000+05:00</published><updated>2013-07-24T16:02:10.190+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Belkin TuneCast Auto LIVE Makes FM Transmission Easy For iPhone 3G/3GS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h1 class=&quot;Title&quot; style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f3f3f; font-size: 18px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 6px; padding-left: 0px; padding-right: 0px; padding-top: 5px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv6P1XA_gkHOQR1qU5sTPmeUycaTSchIOFu0Bi3vCkCNO5faqsgInz1vteNCzhCfw2yrvouOXRy2rxp46rMa0fMkH4hBZVWkr92QFlfnJF1YVRWjixvGgo5w7yRyIXhhghmCtcUIAICEg/s1600-h/tunecast-iphone-110.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv6P1XA_gkHOQR1qU5sTPmeUycaTSchIOFu0Bi3vCkCNO5faqsgInz1vteNCzhCfw2yrvouOXRy2rxp46rMa0fMkH4hBZVWkr92QFlfnJF1YVRWjixvGgo5w7yRyIXhhghmCtcUIAICEg/s320/tunecast-iphone-110.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-size: 13px; font-weight: normal; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://hothardware.com/Tags/belkin.aspx&quot; style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e38b00; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Belkin&lt;/a&gt;&amp;nbsp;has been doing quite well in the&amp;nbsp;&lt;nobr id=&quot;itxt_nobr_0_0&quot; style=&quot;color: #2b65b0; font-size: 13px; font-weight: normal;&quot;&gt;iPod&lt;/nobr&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://hothardware.com/Tags/iphone.aspx&quot; style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e38b00; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;iPhone&lt;/a&gt;&amp;nbsp;accessory market, and today&#39;s announcement should be music to the ears of those who don&#39;t feel like installing any kind of sophisticated iPod adapter into their automobile. Sure, many new vehicles have iPod support from the factory, but older models were never designed to handle Steve&#39;s most popular products ever.&lt;br /&gt;
&lt;br /&gt;
The TuneCase Auto LIVE is one of the most elegant FM Transmitter solutions that we&#39;ve seen to date for the&amp;nbsp;&lt;nobr id=&quot;itxt_nobr_2_0&quot; style=&quot;color: #2b65b0; font-size: 13px; font-weight: normal;&quot;&gt;iPhone&lt;/nobr&gt;&amp;nbsp;3G and iPhone 3GS, as it actually uses the phone&#39;s GPS module in order to locate where you are and track down the most open radio frequency available to you. Anyone who has used an FM Transmitter will know that finding a good, clean open frequency is difficult, and this device basically takes the hard guesswork out of it.&lt;br /&gt;
&lt;br /&gt;
The integrated ClearScan technology finds the best station to broadcast on, and if you need to manually change it, the app allows you to do so right on the iPhone&#39;s screen. It&#39;s available now in North America for $79.99. Europe, Asia and Australia will have it by late-Spring.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkf4oKByPdNx0CupoG0YJwXFvHFEq-3mYM1a5FbNAf-DDptb2m3TjGUFhBVUUc36Ql9n8AWekdjZi4cupqBz6baHuvVMFCT4WLl17Q4WQmjLNqUmDy6oe0pBRlaHS4p1NAWFUuZ8VMp1o/s1600-h/tunecast-iphone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkf4oKByPdNx0CupoG0YJwXFvHFEq-3mYM1a5FbNAf-DDptb2m3TjGUFhBVUUc36Ql9n8AWekdjZi4cupqBz6baHuvVMFCT4WLl17Q4WQmjLNqUmDy6oe0pBRlaHS4p1NAWFUuZ8VMp1o/s320/tunecast-iphone.jpg&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-color: rgb(204, 204, 204); border-bottom-style: dotted; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: dotted; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: dotted; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: dotted; border-top-width: 1px; font-size: 13px; margin-bottom: 16px; margin-left: 16px; margin-right: 16px; margin-top: 16px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px; quotes: none;&quot;&gt;
&lt;ul style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; line-height: 18px; list-style-image: initial; list-style-position: initial; list-style-type: disc; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 40px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Quickly find the best FM station with the help of your iPhone GPS system and location-based user feedback.&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #2d2d2d; font-family: Helvetica; font-size: 12px; line-height: 16px;&quot;&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ClearScan LIVE iPhone App conveniently recommends the best FM frequencies based on your GPS coordinates.&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Control your FM transmission easily from your iPhone screen.&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em;&quot;&gt;&lt;div style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Now available in North America&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Available March 2010 in Europe&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Available April 2010 in Asia and Australia&lt;/em&gt;&lt;/div&gt;
&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;http://catalog.belkin.com/IWCatProductPage.process?Product_Id=493610&quot; style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e38b00; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;TuneCast Auto Live&lt;/a&gt;&amp;nbsp;(F8Z498) - $79.99&lt;/span&gt;&lt;/div&gt;
&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ClearScan LIVE Application available for free download at the iTunes store&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ClearScan technology scans for the clearest frequency and best audio quality at the push of a button&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Control FM transmission and music from your iPhone screen&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Also compatible with iPod touch, nano, and classic&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;High-contrast LCD display for easy viewing&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Two programmable preset buttons&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Charges through car&#39;s 12-volt lighter outlet&lt;/em&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0.25em; padding-left: 0px; padding-right: 0px; padding-top: 0.25em; text-align: left;&quot;&gt;&lt;em style=&quot;-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;1-Year Limited Warranty&lt;/em&gt;&lt;/li&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;i&gt;
&lt;/i&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNm3XAc_Ea70Z7qdygVmfv_rSzpJWJCpu3FqDiF97eZ0pAZkl94v7BIVjayLSqhHvdGa6bnDum3wZkq3YBarwbTfYoZYeJoYWx0nTKDjBRKiYPFdBCnQdo0X3uPhhhXyoK5dHNxBB5weM/s1600-h/tunecast-live-auto-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNm3XAc_Ea70Z7qdygVmfv_rSzpJWJCpu3FqDiF97eZ0pAZkl94v7BIVjayLSqhHvdGa6bnDum3wZkq3YBarwbTfYoZYeJoYWx0nTKDjBRKiYPFdBCnQdo0X3uPhhhXyoK5dHNxBB5weM/s320/tunecast-live-auto-1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Via &lt;a href=&quot;http://hothardware.com/News/Belkin-TuneCast-Auto-LIVE-Makes-FM-Transmission-Easy-For-iPhone-3G3GS/&quot;&gt;Hothardware&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/2393205781157069896/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/2393205781157069896' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/2393205781157069896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/2393205781157069896'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/01/belkin-tunecast-auto-live-makes-fm.html' title='Belkin TuneCast Auto LIVE Makes FM Transmission Easy For iPhone 3G/3GS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv6P1XA_gkHOQR1qU5sTPmeUycaTSchIOFu0Bi3vCkCNO5faqsgInz1vteNCzhCfw2yrvouOXRy2rxp46rMa0fMkH4hBZVWkr92QFlfnJF1YVRWjixvGgo5w7yRyIXhhghmCtcUIAICEg/s72-c/tunecast-iphone-110.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5182900004351052895.post-5455478460315193973</id><published>2010-01-17T23:08:00.001+05:00</published><updated>2013-07-24T16:02:31.979+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Educational technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="New Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Science &amp; Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology News"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Technology"/><title type='text'>Want really secure Gmail? Try GPG encryption</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;cnet-image-div image-regular float-right&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; width: 94px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8HrQh2VhY7dBQNsef8UWTtuFSxB3F7QnhsKuNT9Mf46YsTLUNks3DGnHSYQHIaPC2sHvj1xKatE-ZJmPtUAX8-v-fG6xVtjUiZgJ8nEPbQvyiQHW-__CoKEUXpqsqcbfk2Ah94Qk7eU/s1600-h/gmail_icon.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8HrQh2VhY7dBQNsef8UWTtuFSxB3F7QnhsKuNT9Mf46YsTLUNks3DGnHSYQHIaPC2sHvj1xKatE-ZJmPtUAX8-v-fG6xVtjUiZgJ8nEPbQvyiQHW-__CoKEUXpqsqcbfk2Ah94Qk7eU/s320/gmail_icon.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Perhaps &lt;a href=&quot;http://news.cnet.com/8301-30684_3-10433538-265.html&quot;&gt;Google&#39;s announcement that Chinese cyber attackers went after human rights activists&#39; Gmail accounts&lt;/a&gt; has made you skittish about just how private your own messages are on the Google e-mail service. &lt;br /&gt;
Well, if you want to take a significant step in keeping prying eyes away from your electronic correspondence, one good encryption technology that predates Google altogether is worth looking at. It&#39;s called public key encryption, and I&#39;m sharing some instructions on how to get it working if you want try it. &lt;br /&gt;
Unfortunately, better security typically goes hand in hand with increased inconvenience. But some human rights activists who used Gmail right now likely wish they&#39;d put up with a little hardship to help keep hackers at bay. I&#39;m not going so far as to recommend you use e-mail encryption, but I think this is a good time to take a close look at it. &lt;br /&gt;
Specifically, I&#39;ll show here how to use a collection of free or open-source software packages: &lt;a href=&quot;http://www.gnupg.org/&quot;&gt;GPG, or GNU Privacy Guard&lt;/a&gt;, &lt;a href=&quot;http://www.mozillamessaging.com/thunderbird/&quot;&gt;Mozilla Messaging&#39;s Thunderbird e-mail software&lt;/a&gt;, and its &lt;a href=&quot;http://enigmail.mozdev.org/&quot;&gt;Enigmail plug-in&lt;/a&gt;. CNET Download.com also hosts Thunderbird for &lt;a href=&quot;http://download.cnet.com/Mozilla-Thunderbird/3000-2367_4-10213643.html&quot;&gt;Windows&lt;/a&gt; and &lt;a href=&quot;http://download.cnet.com/Mozilla-Thunderbird/3000-2367_4-10207484.html&quot;&gt;Mac&lt;/a&gt; and &lt;a href=&quot;http://download.cnet.com/Enigmail/3000-11745_4-10671339.html&quot;&gt;Enigmail&lt;/a&gt; for all platforms. &lt;br /&gt;
But first, some background about how it works.&lt;br /&gt;
&lt;b&gt;Public key cryptography&lt;/b&gt;&lt;br /&gt;
Encryption scrambles messages so that only someone with a key (or a tremendous amount of computing horsepower, or knowledge of how to exploit an encryption weakness) can decode them. One form is called, curiously, &lt;a href=&quot;http://en.wikipedia.org/wiki/Public-key_cryptography&quot;&gt;public key&lt;/a&gt; encryption, and this is what GPG and Enigmail use. &lt;br /&gt;
Here&#39;s the quick version of how it works. You get a private key known only to yourself and a public key that&#39;s available for anyone else to use. The person you&#39;re corresponding with also has such a pair of keys. Although the public and private keys are mathematically related, you can&#39;t derive one from the other. &lt;br /&gt;
To send a private message, someone encrypts it with your public key; you then decrypt it with your private key. When it&#39;s time to reply, you encrypt your message with the recipient&#39;s public key and the recipient decodes it with his or her private key. &lt;br /&gt;
Messages in transit from one machine to another are a bunch of textual gobbledygook until decoded. If you&#39;re being cautious enough to encrypt your e-mail, you should be aware that there&#39;s still some information that leaks out to the outside world. The subject line isn&#39;t encrypted, and somebody might take interest in the identity of your active e-mail contacts and the timing and frequency of communications. &lt;br /&gt;
So how do you find out what your correspondent&#39;s public key is? You can either fetch the key firsthand from the correspondent, or you search for it on public computers on the Net called key servers--mine is stored at pool.sks-keyservers.net. &lt;br /&gt;
This form of encryption has another advantage: you can sign your e-mail electronically so the recipient knows it really is from you. This time the process works in reverse: you sign your e-mail with your private key, then your recipient verifies it&#39;s from you using your public key. &lt;br /&gt;
&lt;b&gt;Drawbacks aplenty&lt;/b&gt;&lt;br /&gt;
Weighed against the encryption advantages of privacy and message signing is the fact that you&#39;ll lose access to service you may like or depend on. &lt;br /&gt;
When you see an encrypted e-mail in the Web-based Gmail, it&#39;s gibberish. Google doesn&#39;t index it, so Gmail search doesn&#39;t work. And the strong points of cloud computing--reading your e-mail from your mobile phone, your friend&#39;s computer, a computer kiosk on the airport--isn&#39;t possible. You&#39;re once again anchored to your PC with the encryption software installed. &lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-regular float-none&quot; style=&quot;width: 617px;&quot;&gt;
&lt;img alt=&quot;Gmail won&#39;t be able to make heads or tails of your encrypted e-mail.&quot; class=&quot;cnet-image&quot; height=&quot;299&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/bto/20100113/gpg_encrypted.png&quot; width=&quot;617&quot; /&gt; &lt;br /&gt;
&lt;div class=&quot;image-caption&quot;&gt;
Gmail won&#39;t be able to make heads or tails of your encrypted e-mail.&lt;/div&gt;
(Credit: Screenshot by Stephen Shankland/CNET) &lt;/div&gt;
Another doozy is that the technology, while conceptually manageable in my opinion, quickly gets complicated. It&#39;s the kind of thing where you benefit from some hand-holding from your technologically sophisticated pal. Encryption is chiefly used by the expert crowd, so the documentation quickly gets technical, the options quickly go beyond most people&#39;s comprehension, and the help quickly can shift from Spartan manuals to grasping at straws on a search engine results page. &lt;br /&gt;
Given time and experience, intractable technology can be beaten into submission, though. The bigger problem with encrypted mail is convincing others to install the software and use it. Until then, you&#39;ll be like the proverbial owner of the world&#39;s single fax machine: nice technology, but there&#39;s nothing you can do with it until someone else gets one. &lt;br /&gt;
My personal hope is that encrypted e-mail will become more common and that wider use will encourage some flavor of it that will work more transparently with existing systems, perhaps through local plug-ins on a computer such as &lt;a href=&quot;http://getfiregpg.org/s/home&quot;&gt;FireGPG&lt;/a&gt;, though there appears to be challenges getting it to work with Gmail. &lt;br /&gt;
Meanwhile, here&#39;s one collection of software that&#39;s available today for public key e-mail encryption. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Install the software&lt;/b&gt;&lt;br /&gt;
First, install Thunderbird e-mail software, if you haven&#39;t already. I recommend the new version 3.0, which is &lt;a href=&quot;http://www.mozillamessaging.com/thunderbird/download/&quot;&gt;available for Windows, Mac OS X, and Linux&lt;/a&gt;. One particularly nice feature is that the software will ask you for your e-mail address and password on its first launch, and Gmail users will find the software automatically handles the tangle of configuration details that previously had to be manually set. &lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-regular float-none&quot; style=&quot;width: 452px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;65&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/bto/20100113/enigmail_logo.png&quot; width=&quot;452&quot; /&gt; &lt;/div&gt;
Next up is GPG, the command-line software that handles the actual encryption, decryption, and key management behind the scenes. Fetch the appropriate copy for your operating system from the &quot;binaries&quot; links at the &lt;a href=&quot;http://www.gnupg.org/download/index.en.html&quot;&gt;GPG downloads page&lt;/a&gt;. Technophiles will like using this actual software from the command line, but don&#39;t worry--you don&#39;t have to. &lt;br /&gt;
Last is installing the Enigmail plug-in for Thunderbird. Fetch the appropriate version from the &lt;a href=&quot;http://enigmail.mozdev.org/download/index.php&quot;&gt;Enigmail download site&lt;/a&gt; and make a note of where you save the file. &lt;br /&gt;
Enigmail isn&#39;t the kind of file you double-click to install. Instead, go to Thunderbird, open the Tools menu and click Add-ons. In the lower-left corner of the dialog box that appears, click &quot;Install...&quot; When prompted for a location, point to where you saved the plug-in; the filename should be &quot;enigmail-1.0-tb-win.xpi&quot; or some other operating system-appropriate variation. &lt;br /&gt;
&lt;b&gt;Set up the software&lt;/b&gt;&lt;br /&gt;
Next, it&#39;s time to get started. &lt;a href=&quot;http://enigmail.mozdev.org/documentation/quickstart-ch1.php#id2488853&quot;&gt;Enigmail offers useful instructions&lt;/a&gt; that generally are up to date, though they don&#39;t mention Thunderbird 3.0 and some other matters. &lt;br /&gt;
You&#39;ll likely get a setup Wizard from Enigmail, which is fine. My advice: set it to sign encrypted messages by default but not to encrypt messages by default unless you&#39;re confident you&#39;re going to use it a lot. &lt;br /&gt;
The first task is generate your public and private keys--your &quot;keypair.&quot; Enigmail can handle this chore. In Thunderbird, click the OpenGPG menu, then the &quot;Key Management&quot; option. A new window will pop up with its own set of menus. Click the rightmost one, &quot;Generate.&quot; &lt;br /&gt;
The default options are pretty good, though setting the key not to expire might be preferable for some people. That can be changed later, if you have second thoughts. For your passphrase, the usual password rules apply: the longer it is and the farther away from anything in a dictionary it is, the harder it is to crack. &lt;br /&gt;
Now comes the best part of the whole thing: helping out the random number generator while the keys are being generated. It doesn&#39;t take long, but doing something else while it happens--browsing a Web page or loading a word processing file, for example--creates events that actually inject a little helpful unpredictability into the algorithm. It&#39;s one of those wacky computer science moments. &lt;br /&gt;
Once the keys are generated, upload yours to a key server so your pals can find your key. It&#39;s easy: click the &quot;Keyserver&quot; menu, &quot;Upload Public Keys,&quot; and go with the default pool.sks-keyservers.net server. &lt;br /&gt;
&lt;b&gt;Try it out&lt;/b&gt; &lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-regular float-right&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; width: 94px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;94&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/bto/20100113/thunderbird_logo.png&quot; width=&quot;94&quot; /&gt; &lt;/div&gt;
Now it&#39;s time to get viral. You have to find somebody to experiment on. Go through your list of nerdy, security-minded, perhaps somewhat paranoid friends and start recruiting. A tinfoil hat isn&#39;t a prerequisite for using e-mail encryption, but there&#39;s a connection. &lt;br /&gt;
Once you&#39;ve got a companion--or set up a second keypair with another e-mail account--start a new e-mail message and type in a subject line and some text. In the OpenPGP menu, select &quot;sign message,&quot; &quot;encrypt message,&quot; and if your message recipient is using Enigmail, &quot;Use PGP/MIME for this message.&quot; (The latter option has some advantages, but isn&#39;t supported universally.) &lt;br /&gt;
When you send the message, you&#39;ll need to use your recipient&#39;s public key to encrypt the message and your own passphrase to sign the message with your private key. &lt;br /&gt;
When it&#39;s time to read, you&#39;ll need the public key of your correspondent to verify the signature and your own passphrase to decrypt it. &lt;br /&gt;
Sending and receiving is where those public key servers come in handy. Seek, and if ye don&#39;t find, ask your friend to e-mail you the public key. &lt;br /&gt;
There&#39;s a whole new world of encryption out there--the web of trust, key signing, fingerprints and such--that I won&#39;t get into here. I recommend a look at the &lt;a href=&quot;http://enigmail.mozdev.org/documentation/basic.php&quot;&gt;Enigmail configuration manual&lt;/a&gt; and the &lt;a href=&quot;http://enigmail.mozdev.org/documentation/handbook.php&quot;&gt;Enigmail Handbook&lt;/a&gt;. &lt;br /&gt;
If you&#39;re a command-line nut, I recommend &lt;a href=&quot;http://www.glump.net/howto/gpg_intro&quot;&gt;Brendan Kidwell&#39;s practical introduction&lt;/a&gt; and, with my usual reservations about the utter lack of informative examples, the &lt;a href=&quot;http://www.gnupg.org/documentation/manpage.en.html&quot;&gt;GPG man page&lt;/a&gt;. History buffs can check the &lt;a href=&quot;http://en.wikipedia.org/wiki/GNU_Privacy_Guard&quot;&gt;Wikipedia pages&lt;/a&gt; (the saga of Phil Zimmermann vs. the U.S. government concerning &lt;a href=&quot;http://en.wikipedia.org/wiki/Pretty_Good_Privacy&quot;&gt;GPG&#39;s precursor, PGP, or Pretty Good Privacy&lt;/a&gt;, is particularly notable), and &lt;a href=&quot;http://lists.gnupg.org/pipermail/gnupg-announce/2007q4/000268.html&quot;&gt;one 10th-anniversary GPG retrospective&lt;/a&gt; from founder Werner Koch. &lt;br /&gt;
&lt;b&gt;In closing: backup your key&lt;/b&gt;&lt;br /&gt;
There is one last task you should attend to: export your keypair. Enigmail can handle this fine: In the search field, type your name until your key appears, click it to select it, then click &quot;File&quot; and &quot;Export Keys to File.&quot; &lt;br /&gt;
This backup will be useful for decrypting your mail on a new computer, installing software from scratch, or otherwise managing the inevitable digital transitions in your life. But be warned: that private key is what somebody needs to crack your encryption, so don&#39;t leave it where somebody can find it. &lt;br /&gt;
I&#39;m not convinced that GPG will rule the world. Indeed, I&#39;m concerned that so much documentation I encountered for this article was written before &lt;a href=&quot;http://www.cnet.com/windows-vista.html&quot; section=&quot;luke_topic&quot;&gt;Windows Vista&lt;/a&gt; arrived. &lt;br /&gt;
But I am convinced there are serious holes with our current security and privacy arrangements. A 2,048-bit encryption key won&#39;t thwart phishing scams or other social engineering attacks that appear to have been employed in the Google-China case, but it&#39;s a good place to start. &lt;br /&gt;
And using encryption sends a message to the technology world: perhaps it&#39;s time to start taking our security more seriously. &lt;a href=&quot;http://news.cnet.com/8301-30685_3-10433965-264.html&quot;&gt;Google opted for encrypted Gmail network connections&lt;/a&gt;, even though it will tax their servers with more processing, which is a good start. Better security can be inconvenient and expensive, but don&#39;t forget to consider the drawbacks of poor security.&lt;br /&gt;
&amp;nbsp;Via:&lt;a href=&quot;http://news.cnet.com/8301-30685_3-10434684-264.html?tag=newsLeadStoriesArea.1&quot;&gt;Cnet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=photo09e-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B002VEC826&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://technology-base.blogspot.com/feeds/5455478460315193973/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5182900004351052895/5455478460315193973' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5455478460315193973'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5182900004351052895/posts/default/5455478460315193973'/><link rel='alternate' type='text/html' href='http://technology-base.blogspot.com/2010/01/want-really-secure-gmail-try-gpg.html' title='Want really secure Gmail? Try GPG encryption'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12623765335569859842</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8HrQh2VhY7dBQNsef8UWTtuFSxB3F7QnhsKuNT9Mf46YsTLUNks3DGnHSYQHIaPC2sHvj1xKatE-ZJmPtUAX8-v-fG6xVtjUiZgJ8nEPbQvyiQHW-__CoKEUXpqsqcbfk2Ah94Qk7eU/s72-c/gmail_icon.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>