<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8509059387379308245</atom:id><lastBuildDate>Sat, 18 Apr 2026 22:44:19 +0000</lastBuildDate><category>Hacking News</category><category>News</category><category>Facebook</category><category>#GLOBAVILLAGE</category><category>Android</category><category>Mark Zuckerberg</category><category>hacking</category><category>Artificial intelligence</category><category>Google</category><category>Hack Whatsapp Accounts</category><category>Hackers</category><category>Kali Linux</category><category>Security Issue</category><category>Smartphone tricks</category><category>android tricks</category><category>facebook profile</category><category>how to activate your system</category><category>wifi hacking</category><category>#GLOBAVILLAGE.</category><category>Allo Instant Messenger</category><category>Android Cheat</category><category>Artificial Life</category><category>Bill Gates</category><category>Birmingham University</category><category>Browse Free On Android With MTN BIS</category><category>Browse free with MTN</category><category>Control YouTube In PC With Your Smartphone Without Any App</category><category>Convert your facebook profile to page</category><category>Court Case</category><category>Cracking WPA/WPA2 Encryption</category><category>Donald Trump</category><category>Download Windows 8.1 Without Product Keys</category><category>Elon Musk</category><category>Fashion</category><category>Free Browsing</category><category>Hack email account with simple tricks</category><category>Hack wifi password</category><category>How To Make Your Windows Genuine</category><category>ICT Business</category><category>IT Help desk</category><category>Imran Udin</category><category>Janicki Bioenergy</category><category>Janicki Omni</category><category>Janicki Omni Processor</category><category>Japan</category><category>Java APIs</category><category>Kanye West</category><category>Learn To Code</category><category>Linkedin</category><category>Malicious Ad</category><category>Microsoft</category><category>Obama</category><category>Oracle</category><category>Product Keys</category><category>Programming</category><category>Recovery</category><category>Restore deleted files</category><category>Root Your Android With Computer</category><category>Rooting</category><category>Salt</category><category>Secure Your Whatsapp.</category><category>Secure your self against hackers</category><category>Senegal</category><category>Simple Server And Autoproxy</category><category>SnapChat</category><category>Space</category><category>Student Hacked School Database</category><category>Tim Cook</category><category>Whatsapp</category><category>Whatsapp Tricks</category><category>Youtube</category><category>Youtube TV</category><category>Youtube Tricks</category><category>computer solutions with CMD</category><category>cyber criminals</category><category>email hacking</category><category>facebook pages</category><category>get more likes</category><category>high-speed underwater cable</category><category>iPhone</category><category>iphone Trick</category><category>make your computer genuine</category><category>protect your email from hackers</category><category>recover your permanently deleted files</category><category>social engineering</category><category>tricks</category><category>tricks to restore your files.</category><title>Global Village</title><description></description><link>http://globavillage.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>49</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-7665351349187888660</guid><pubDate>Thu, 02 Jun 2016 10:42:00 +0000</pubDate><atom:updated>2016-06-02T03:58:47.498-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title> I Wish I Could Wake Up to Robots Getting Me Ready in the Morning Like This</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0vQhjVXqd1fO9IYhhYE-RYhV49oEntceSgkhwTGQI479VRWPBG2R6goBX8kzEQIG6yrBT0gq0BjoZ5p0THr0pKy9mop41Rd_Sq8rvbamKp0jW_PirSMfnCG9VygoIzz6UAYGad7upoqvk/s1600/uvhu0rjzfqaks6eecezz.GIF&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0vQhjVXqd1fO9IYhhYE-RYhV49oEntceSgkhwTGQI479VRWPBG2R6goBX8kzEQIG6yrBT0gq0BjoZ5p0THr0pKy9mop41Rd_Sq8rvbamKp0jW_PirSMfnCG9VygoIzz6UAYGad7upoqvk/s640/uvhu0rjzfqaks6eecezz.GIF&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The toughest thing about getting up in the morning (other than getting up in the morning) is realizing all the things you have to do to make yourself decent to society. I’m not talking about just brushing your teeth, shaving, or showering. I’m talking about having to open your eyes and walk around and &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;move your arms back and forth. If only there were robots who could just get me ready instead. If only the technology in Meghann Artes’ humorous little short film Sleepy Steve actually existed in real life.&lt;br /&gt;
&lt;br /&gt;
I feel you, Steve. I feel you. I’ve totally imagined it too.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/hLeqxIqlgf8&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;</description><link>http://globavillage.blogspot.com/2016/06/i-wish-i-could-wake-up-to-robots.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0vQhjVXqd1fO9IYhhYE-RYhV49oEntceSgkhwTGQI479VRWPBG2R6goBX8kzEQIG6yrBT0gq0BjoZ5p0THr0pKy9mop41Rd_Sq8rvbamKp0jW_PirSMfnCG9VygoIzz6UAYGad7upoqvk/s72-c/uvhu0rjzfqaks6eecezz.GIF" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-7230392081821013197</guid><pubDate>Thu, 02 Jun 2016 10:28:00 +0000</pubDate><atom:updated>2016-06-02T03:28:01.498-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Elon Musk</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>Elon Musk Calls Apple&#39;s Car a &quot;Missed Opportunity&quot;</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2qDgwvhuY90eOFHfaVcDD1i8TfcB4z_nks0GwI6KFoOFqK8oR8Mdvj0k26UkecF-W_V4KDp9LS1WmIM-HHIeQJ7nurOGYAfnIMtAQlIhh5KThT4s-oO8iHC2JMr9rCOa81O_8Te_6G6QX/s1600/jwpap5aebcolokmwzmp2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2qDgwvhuY90eOFHfaVcDD1i8TfcB4z_nks0GwI6KFoOFqK8oR8Mdvj0k26UkecF-W_V4KDp9LS1WmIM-HHIeQJ7nurOGYAfnIMtAQlIhh5KThT4s-oO8iHC2JMr9rCOa81O_8Te_6G6QX/s640/jwpap5aebcolokmwzmp2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
At the Code conference this evening, Elon Musk joined Walt Mossberg and Kara Swisher onstage to talk about his varied and eclectic pursuits. And when the talk turned to autonomous vehicles, Musk was sure to share his opinions on what he perceives to be Tesla’s biggest competition.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Nope, not Google. Musk doesn’t consider Google’s self-driving car program to be a direct competitor with Tesla—“they’re not a car company.” But he did have some thoughts on Apple’s rumored vehicle, which he does see as a direct competitor. Nemesis, maybe? Like, smackdown parameters have now been drawn.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
“I would say that it’s great that they’re doing this and I hope it works out.”&lt;br /&gt;HOPE IT WORKS OUT???&lt;br /&gt;“I think they should have embarked on this project sooner, actually... I don’t think they’ll be in volume production until 2020.”&lt;br /&gt;Shoulda really gotten on this sooner, Jony!&lt;/blockquote&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
“It’s just a missed opportunity. It’s a couple years... they’ll make a good car and be successful.”&lt;br /&gt;I mean is there anything worse than calling something a “missed opportunity” before it even exists?&lt;/blockquote&gt;
&lt;br /&gt;
Speaking of opportunities, Musk is planning another Tesla event before the end of the year to specifically address autonomous technology, which he believes will be ready in two years. What exactly will he announce? “Let me just say we’re going to do the obvious thing.” And maybe work on that bus?&lt;br /&gt;
&lt;br /&gt;
In other transportation news, Musk said he believed that “something will happen in the future” with Hyperloop and hinted that Space X would definitely be building some type of Hyperloop demonstration. All in all, he’s just trying to make the world a better place, you guys. “It’s just about increasing the probability that the future will be good.”&lt;br /&gt;
&lt;br /&gt;
You can watch the whole video for more Musk Thoughts™ on neural lace, production schedules, Hyperloop pod design, landing rockets on barges, going to Mars, battery factories, simulation talk in hot tubs, and his project to save the world from a dystopian AI future.</description><link>http://globavillage.blogspot.com/2016/06/elon-musk-calls-apples-car-missed.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2qDgwvhuY90eOFHfaVcDD1i8TfcB4z_nks0GwI6KFoOFqK8oR8Mdvj0k26UkecF-W_V4KDp9LS1WmIM-HHIeQJ7nurOGYAfnIMtAQlIhh5KThT4s-oO8iHC2JMr9rCOa81O_8Te_6G6QX/s72-c/jwpap5aebcolokmwzmp2.png" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-4335867842945008498</guid><pubDate>Fri, 27 May 2016 09:45:00 +0000</pubDate><atom:updated>2016-05-27T02:45:25.162-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IT Help desk</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>Build an IT help desk</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigr8lkKCrZ-yJYoZbNhdJC0p8KEcdW24Aqq36ja1bUwVf8K9UrPgIRy4-3A-lHY5vgP-D00IVMndRIu9SkT0mYNUqyMTDMAIQ0lSlcZcDZ8ustisFwUUme_lRfxiFcz0iiET4FDPaFWQG5/s1600/remote_support_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;408&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigr8lkKCrZ-yJYoZbNhdJC0p8KEcdW24Aqq36ja1bUwVf8K9UrPgIRy4-3A-lHY5vgP-D00IVMndRIu9SkT0mYNUqyMTDMAIQ0lSlcZcDZ8ustisFwUUme_lRfxiFcz0iiET4FDPaFWQG5/s640/remote_support_1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
An IT help desk is often the first line of support for many organizations. However, some businesses can’t justify the cost of implementing and managing a dedicated help desk to serve the demands of their end users due to a lack of available IT resources or budgetary constraints. This creates a unique challenge: end users need access to support for productivity, yet a fully staffed help desk is out of the question.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Solving the conundrum involves finding a balance between supporting users and reining in costs, without either spiraling out of control. Still, businesses lacking an IT support mechanism will encounter productivity-sapping problems, which may not have any easy solutions, forcing them to employ their very best creative problem-solving skills.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Building a help desk&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Most businesses start by relying on vendors to provide help when problems strike, but vendors tend to be limited when offering free support for their own products and may require the purchase of a support plan. While the initial cost may not seem daunting, the complex, hybrid networks in use today require more than a single vendor and product support plan to keep end users productive.&lt;br /&gt;
&lt;br /&gt;
Creating a help desk for internal and external staffers should not be an insurmountable challenge. There are myriad options available, ranging from cloud-based contracted services and value-added reseller (VAR) provided solutions to internally deployed hardware and software. Regardless of the path chosen, every help desk solution should contain three critical elements:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Staff: Someone has to man the help desk and be ready to answer phone calls, emails, or other end user requests for service and additional help.&lt;/li&gt;
&lt;li&gt;Platform: A tracking system should be set up to support the creation of troubleshooting tickets and document interactions between help desk staffers and users requesting support.&lt;/li&gt;
&lt;li&gt;Remediation: A mechanism should be in place to assist help desk staffers in remediating the reported problem(s).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Normally, these three requirements are met by deploying a help desk system, which is a combination of hardware and software tools supporting the overall mission. Many hardware vendors include elements to ease the adoption of help desk techniques.&lt;br /&gt;
&lt;br /&gt;
In many cases, those additional capabilities can reduce the overall support costs and speed resolution times. For example, some hardware vendors offer remote boot, remote control, and other features that make it easier for a technician to connect to a problem system and resolve any issues. Some vendors also offer software clients and hardware capabilities to simply and smoothly integrate their products into a help desk platform.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Affordable alternatives and solutions&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You may also choose to go the open source route to create an internal help desk. There are several free options available that provide a decent starting point. For businesses seeking more information, &lt;a href=&quot;http://blog.capterra.com/the-7-best-free-help-desk-software-tools/&quot; target=&quot;_blank&quot;&gt;Capterra&lt;/a&gt; offers insight into some popular free tools, such as UserVoice, Freshdesk, and osTicket.&lt;br /&gt;
&lt;br /&gt;
Nonetheless, there is a lot more to deploying a successful IT help desk than just selecting support software. You’ll need to take into account the situations where help requests may arise and how critical it is to solve those problems before productivity is impacted, much of which can be accomplished by adopting some industry standard best practices, including:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Implement a web-based knowledge base tool.&lt;/li&gt;
&lt;li&gt;Use the help desk software system to increase communications with agents and customers.&lt;/li&gt;
&lt;li&gt;Make a customer self-help portal accessible 24 hours every day.&lt;/li&gt;
&lt;li&gt;Install service request automation processes in your help desk software.&lt;/li&gt;
&lt;li&gt;Utilize real-time help desk reports, dashboards, metrics, and analytics.&lt;/li&gt;
&lt;li&gt;Institute an asset management system and integrate it with the help desk software system.&lt;/li&gt;
&lt;li&gt;Apply a change management system.&lt;/li&gt;
&lt;li&gt;Perform customer satisfaction surveys on a regular basis.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Following these steps can lead to a successful help desk system, and soon, you’ll be able to leverage the technology and services, receive all the benefits, and &lt;a href=&quot;http://www8.hp.com/us/en/business-solutions/smb/uptime.html&quot; target=&quot;_blank&quot;&gt;keep your business running.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Return on investment&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
One of the most important issues surrounding a help desk is affordability. Many businesses tend to focus on the cost of the hardware, software, and staff needed for an effective help desk to determine operational costs, yet those same companies fail to realize the value offered by a help desk, which can be simply measured by increased productivity. The quicker problems are solved, the quicker staffers return to productivity.&lt;br /&gt;
&lt;br /&gt;
It’s also a good idea to keep tabs on help desk operations in the form of reports. By evaluating the number of problems, the time to resolution, and the return to productivity, company operators can discover how much a help desk contributes to overall productivity, thereby justifying the expenses involved.&lt;br /&gt;
&lt;br /&gt;
Unifying help desk and system management solutions can revolutionize your business’s service desk options and inventory control, and when your business starts to grow, you’ll be glad you didn’t overlook the importance of having a stable IT help desk.</description><link>http://globavillage.blogspot.com/2016/05/build-it-help-desk.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigr8lkKCrZ-yJYoZbNhdJC0p8KEcdW24Aqq36ja1bUwVf8K9UrPgIRy4-3A-lHY5vgP-D00IVMndRIu9SkT0mYNUqyMTDMAIQ0lSlcZcDZ8ustisFwUUme_lRfxiFcz0iiET4FDPaFWQG5/s72-c/remote_support_1.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-2092149413988685805</guid><pubDate>Fri, 27 May 2016 08:31:00 +0000</pubDate><atom:updated>2016-05-27T02:32:22.935-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">SnapChat</category><title>How a college student used Snapchat to land his dream internship</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-d2qifkK2NWNuKFviawzyYw2N77p3MWVxXqoqEsBDfqNZXKOAysOJ58wdmE_kn3mtQCstD9TkAG6qHg0ZRECpudDoQJn85qcexViilbY30D-TodruyfjULz4mofWHj2A2vI1Fyz3kFi4O/s1600/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99293-AP_370881284815.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-d2qifkK2NWNuKFviawzyYw2N77p3MWVxXqoqEsBDfqNZXKOAysOJ58wdmE_kn3mtQCstD9TkAG6qHg0ZRECpudDoQJn85qcexViilbY30D-TodruyfjULz4mofWHj2A2vI1Fyz3kFi4O/s640/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99293-AP_370881284815.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Standing out from a crowd of candidates can take more than brushing up your resume. College student Graham Allgood got the attention of his dream workplace by marketing himself in another way with the help of Snapchat.&lt;br /&gt;
&lt;br /&gt;
Allgood designed a custom geofilter for the New York-based advertising agency where he wanted to work as a summer intern in the hopes of catching a hiring manager&#39;s eye.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Once he completed the design, a sleek illustration incorporating Horizon Media&#39;s logo and Manhattan headquarters, he paid $29.65 to purchase an on-demand Snapchat geofilter ― temporary, location-specific photo overlays often used for events such as weddings or birthdays. He scheduled his filter to run during work hours at the Horizon Media office in early May.&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
&lt;a href=&quot;https://twitter.com/HorizonMCareers&quot;&gt;@HorizonMCareers&lt;/a&gt; Here it is! Excited to see the snapchat analytics. Horizon Media is the place to be! &lt;a href=&quot;https://twitter.com/hashtag/horizonation?src=hash&quot;&gt;#horizonation&lt;/a&gt; &lt;a href=&quot;https://t.co/35xyqrQBkd&quot;&gt;pic.twitter.com/35xyqrQBkd&lt;/a&gt;&lt;/div&gt;
— Graham Allgood (@causeitsallgood) &lt;a href=&quot;https://twitter.com/causeitsallgood/status/727586170310254593&quot;&gt;May 3, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;//platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
Allgood, a senior at California Baptist University, said in a blog post that he had designed on-demand geofilters in the past, and even used Horizon Media&#39;s own Snapchat to determine which day the company used the platform the most (Tuesday, it turned out.)&lt;br /&gt;
&lt;br /&gt;
Once it was live, Allgood tweeted a Snapchat of the filter to Horizon Media, and crossed his fingers the approach would grab the company&#39;s attention. And it did: within hours, Horizon Media sent an enthusiastic tweet in response, and by 4 p.m., requested Allgood come in for an interview the next day.&lt;br /&gt;
&lt;br /&gt;
Though Allgood said initially on his blog the company told him all its summer internship spots were filled, Horizon Media eventually offered Allgood a paid summer social media internship― via Snapchat, of course.&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
When Horizon sends you a snapchat (after my interview in their LA office) to let you know you made the team in NYC! &lt;a href=&quot;https://t.co/IslZ3Y5ZBd&quot;&gt;pic.twitter.com/IslZ3Y5ZBd&lt;/a&gt;&lt;/div&gt;
— Graham Allgood (@causeitsallgood) &lt;a href=&quot;https://twitter.com/causeitsallgood/status/733328120434974720&quot;&gt;May 19, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;//platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;br /&gt;
So a word of advice for any college students still looking to land that dream summer internship ― better Snap to it.</description><link>http://globavillage.blogspot.com/2016/05/how-college-student-used-snapchat-to.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-d2qifkK2NWNuKFviawzyYw2N77p3MWVxXqoqEsBDfqNZXKOAysOJ58wdmE_kn3mtQCstD9TkAG6qHg0ZRECpudDoQJn85qcexViilbY30D-TodruyfjULz4mofWHj2A2vI1Fyz3kFi4O/s72-c/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99293-AP_370881284815.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-6202129775978411952</guid><pubDate>Fri, 27 May 2016 08:28:00 +0000</pubDate><atom:updated>2016-05-27T02:31:15.007-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Java APIs</category><category domain="http://www.blogger.com/atom/ns#">Oracle</category><title>Google Beats Oracle And Saves $9 Billion — “Fair Use” Of Java APIs In Android</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtbQFtcMk-i1Dwcjrn6YvrS7km-g-RQOUlHCxkQqE7sfqXD0H_AYYx9KkCRV7Nbwgl1u7kbWjiPfRSAVaeaP1_jqmfU3J8xnTE9bkUWN7nRY1qF6Usq_76bZmLtmSNBUGTIz4u9GxA_SHF/s1600/JAVA-ANDROID-FAIR-USE.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;364&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtbQFtcMk-i1Dwcjrn6YvrS7km-g-RQOUlHCxkQqE7sfqXD0H_AYYx9KkCRV7Nbwgl1u7kbWjiPfRSAVaeaP1_jqmfU3J8xnTE9bkUWN7nRY1qF6Usq_76bZmLtmSNBUGTIz4u9GxA_SHF/s640/JAVA-ANDROID-FAIR-USE.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
After a two-week trial, a federal court ruled that Google’s Android operating system doesn’t infringe Oracle’s Java APIs. While Google has saved $9 billion in damages, Oracle is preparing to appeal again in Federal Circuit Appeals Court. For the time being, this win is a great news for open source community and programmers who use free and open programming languages to make innovative products.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
In 2010 database company Oracle sued Android-owner Google, saying that Android mobile operating system infringes Oracle-owned Java copyrights. Oracle said that Google’s reimplementation of 37 Java APIs is illegal as they are protected by ‘fair use’.&lt;br /&gt;
In the latest developments, Google has won the latest round of this legal battle. On Thursday, a jury found that Google didn’t violate fair use doctrine by declaring code and the structure, organization, and sequence of Java APIs.&lt;br /&gt;
&lt;br /&gt;
This battle, that has been going on for the past six years, could have cost the Android-owner about $9 billion in damages.&lt;br /&gt;
&lt;br /&gt;
Google’s Java implementation didn’t reuse Oracle’s copyrighted code. But, to ensure compatibility, Google used a list of function names, also called application programming interface (API), with the same names and function.&lt;br /&gt;
&lt;br /&gt;
Google’s lawyers cited a 1995 ruling that stated that a company didn’t infringe copyright when it created a spreadsheet and organized its menus just like the popular spreadsheet Lotus 1-2-3.&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;A win for open source and programmers!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This case is also important for open source community because it helps clarify the current copyright rules that tell programmers what “things” they can borrow for their work under fair use. It’s a win for the software developers who are dependent on open and free programming languages to make innovative products.&lt;br /&gt;
&lt;br /&gt;
In the world of programming, very often programmers mimic certain characteristics of other software to ensure functionality. Sometimes they duplicate the command sequences and its characteristics, with different code, to make them compatible with all machines.&lt;br /&gt;
&lt;br /&gt;
However, Oracle is almost certain to appeal the same to the Federal Circuit Appeals Court in near future. Given the Federal Circuit’s track records, there’s a decent chance that lower court’s decision will get overruled.&lt;br /&gt;
&lt;br /&gt;
Have something to add? Feel free to share your comments with us.</description><link>http://globavillage.blogspot.com/2016/05/google-beats-oracle-and-saves-9-billion.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtbQFtcMk-i1Dwcjrn6YvrS7km-g-RQOUlHCxkQqE7sfqXD0H_AYYx9KkCRV7Nbwgl1u7kbWjiPfRSAVaeaP1_jqmfU3J8xnTE9bkUWN7nRY1qF6Usq_76bZmLtmSNBUGTIz4u9GxA_SHF/s72-c/JAVA-ANDROID-FAIR-USE.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-6791370454806186530</guid><pubDate>Fri, 27 May 2016 08:23:00 +0000</pubDate><atom:updated>2016-05-27T02:31:25.493-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fashion</category><title>Thai fashionista recreates designer gown with bags of prawn crackers</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4i47eCyJqoP1udkUCgLg05BQiiCAabP47hS7S-U0LldYxoYEuJfB1YpHxF_9uK8g-xyciEQiOaAF5aXNV9VvWc0QgkjbIwQqQHhuj_pinHhIaMHKUmcnQiYYxkl3WKuC4k0yvSmVjwOqP/s1600/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99307-2e3addcbae8746caaf67bfe4eaf272ee.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4i47eCyJqoP1udkUCgLg05BQiiCAabP47hS7S-U0LldYxoYEuJfB1YpHxF_9uK8g-xyciEQiOaAF5aXNV9VvWc0QgkjbIwQqQHhuj_pinHhIaMHKUmcnQiYYxkl3WKuC4k0yvSmVjwOqP/s640/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99307-2e3addcbae8746caaf67bfe4eaf272ee.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
A 28-year-old Thai woman has become an Internet sensation overnight after she posted her own version of a high fashion gown that&#39;s made from bags of prawn crackers.&lt;br /&gt;
&lt;br /&gt;
Sine Benjaphorn is a plus-size model and owner of a clothing store in Ratchaburi, a province west of Bangkok, Thailand. The gown that she chose to replicate was a peach layered gown that Thai actress, Chompoo Araya wore to a L&#39;Oreal event during the recent Cannes Film Festival.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; height=&quot;726&quot; scrolling=&quot;no&quot; src=&quot;https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fpermalink.php%3Fstory_fbid%3D277379205930735%26id%3D106633236338667%26substory_index%3D0&amp;amp;width=500&quot; style=&quot;border: none; overflow: hidden;&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
According to Benjaphorn, she was inspired after seeing pictures of Araya and went out to buy bags of prawn crackers - a popular savoury snack - to sew them together. The end result from the colour down to the layering and wavy texture is uncanny.&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; height=&quot;522&quot; scrolling=&quot;no&quot; src=&quot;https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fpermalink.php%3Fstory_fbid%3D276860805982575%26id%3D106633236338667%26substory_index%3D0&amp;amp;width=500&quot; style=&quot;border: none; overflow: hidden;&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
After posting a side-by-side comparison of her posing in the gown on the streets with Araya&#39;s red-carpet picture on May 12, Benjaphorn&#39;s post quickly went viral on Facebook, with many netizens praising her for her talent - both in design and comedy. .&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
I&#39;m shocked. I never thought this many people would share my photo. And I&#39;m on every news channel, Benjaphorn told reporters.&lt;/blockquote&gt;
&lt;br /&gt;
This peach gown is not Benjaphorn&#39;s first attempt at recreating a celebrity&#39;s iconic look. She has also dressed up as Katy Perry in her &quot;Roar&quot; music video and Claire Danes in her much-talked about Zac Posen gown that she wore during to this year&#39;s Met Gala.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; height=&quot;645&quot; scrolling=&quot;no&quot; src=&quot;https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fpermalink.php%3Fstory_fbid%3D259980671003922%26id%3D106633236338667%26substory_index%3D0&amp;amp;width=500&quot; style=&quot;border: none; overflow: hidden;&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; height=&quot;502&quot; scrolling=&quot;no&quot; src=&quot;https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fpermalink.php%3Fstory_fbid%3D276504669351522%26id%3D106633236338667%26substory_index%3D0&amp;amp;width=500&quot; style=&quot;border: none; overflow: hidden;&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt;</description><link>http://globavillage.blogspot.com/2016/05/thai-fashionista-recreates-designer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4i47eCyJqoP1udkUCgLg05BQiiCAabP47hS7S-U0LldYxoYEuJfB1YpHxF_9uK8g-xyciEQiOaAF5aXNV9VvWc0QgkjbIwQqQHhuj_pinHhIaMHKUmcnQiYYxkl3WKuC4k0yvSmVjwOqP/s72-c/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99307-2e3addcbae8746caaf67bfe4eaf272ee.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-20133538351474668</guid><pubDate>Fri, 27 May 2016 08:13:00 +0000</pubDate><atom:updated>2016-05-27T02:31:31.851-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">high-speed underwater cable</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Microsoft and Facebook to build a high-speed underwater cable connecting the U.S. to Europe</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFM8uvBiKarmJviWkqYG0s31Yh7TWjZPOGKrw5miFG44FJYHeLFq4fxalQkahhKGCprP8X7Xwz0B3JB98DCC7Rj1wHx80QNi2qOBwB8o9gq3KgyKzaGEbnq52ST-aPDIAOVBOzRHI7PbMX/s1600/facebook-microsoft.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFM8uvBiKarmJviWkqYG0s31Yh7TWjZPOGKrw5miFG44FJYHeLFq4fxalQkahhKGCprP8X7Xwz0B3JB98DCC7Rj1wHx80QNi2qOBwB8o9gq3KgyKzaGEbnq52ST-aPDIAOVBOzRHI7PbMX/s640/facebook-microsoft.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Facebook and Microsoft on Thursday announced that they are teaming up to build a subsea cable across the Atlantic Ocean.&lt;br /&gt;
&lt;br /&gt;
In a blog post, Microsoft says that the goal of the cable is to “help meet the growing customer demand for high speed, reliable connections for cloud and online services” for Microsoft, Facebook and others.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhlkq_GvoLjOenN4uzARAtOPYbWAzhZPjWh2al5kMjYpsp4KlQLeWIFjDKDE0gLIAI34R5K2daXzuIaEjU7ZrwTv_0x39_Ix5Q6Aqvb2znmzPw9qE30ZWJ0Z1wq8UzUzTh7rnOYVlIuwNb/s1600/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99178-MAREA-Cable.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;258&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhlkq_GvoLjOenN4uzARAtOPYbWAzhZPjWh2al5kMjYpsp4KlQLeWIFjDKDE0gLIAI34R5K2daXzuIaEjU7ZrwTv_0x39_Ix5Q6Aqvb2znmzPw9qE30ZWJ0Z1wq8UzUzTh7rnOYVlIuwNb/s400/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99178-MAREA-Cable.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Construction on the new “MAREA” cable will start in August and is expected to be completed in October 2017. The cable system will be 6,600 km (4,100 miles) in length. Microsoft and Facebook say this is “the highest-capacity subsea cable to ever cross the Atlantic.”&lt;br /&gt;
The estimated design capacity is a staggering 160 terabits per second&lt;br /&gt;
And it’s fast. Its estimated design capacity is a staggering 160 terabits per second. Operated and managed by Telefonica’s Telexius, this will be the first subsea cable system to connect the United States to southern Europe.&lt;br /&gt;
&lt;br /&gt;
The cable will go from a data hub in Virginia Beach, Virginia, to Bilbao, Spain. From there, it will connect to various network hubs in Europe, Africa, Asia and the Middle East.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcbytVAPSwLWtnqIZ7vFV7qeqEIWM2EoF7To1M1glNmWS3FbfXQdooWNW2LpeDtAEkpHNBBMIl3CUiwhJ8mCxYic6b1NPuYdFQxgs_JZBhqiMEeBF2e9dDw_FowiaTAiDtJTawibev_yz7/s1600/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99173-AP_453113790928.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcbytVAPSwLWtnqIZ7vFV7qeqEIWM2EoF7To1M1glNmWS3FbfXQdooWNW2LpeDtAEkpHNBBMIl3CUiwhJ8mCxYic6b1NPuYdFQxgs_JZBhqiMEeBF2e9dDw_FowiaTAiDtJTawibev_yz7/s640/https---blueprint-api-production.s3.amazonaws.com-uploads-card-image-99173-AP_453113790928.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
This isn’t the first time tech companies have invested in subsea cable systems. Back in 2014, Google announced a partnership with five Asia-based telecom companies to build a subsea cable connecting the U.S. with Japan.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://mashable.com/2016/05/27/microsoft-data-subsea-cable/?utm_campaign=Feed%3A+Mashable+%28Mashable%29&amp;amp;utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&amp;amp;utm_source=feedburner&amp;amp;utm_medium=feed#2t7.b_S2wkqL&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;[[mashable]]&lt;/b&gt;&lt;/a&gt;</description><link>http://globavillage.blogspot.com/2016/05/microsoft-and-facebook-to-build-high.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFM8uvBiKarmJviWkqYG0s31Yh7TWjZPOGKrw5miFG44FJYHeLFq4fxalQkahhKGCprP8X7Xwz0B3JB98DCC7Rj1wHx80QNi2qOBwB8o9gq3KgyKzaGEbnq52ST-aPDIAOVBOzRHI7PbMX/s72-c/facebook-microsoft.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-5137264309215066876</guid><pubDate>Fri, 27 May 2016 08:11:00 +0000</pubDate><atom:updated>2016-05-27T02:31:37.675-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Obama</category><title>Vietnam Allegedly Restricted Facebook Access During Obama Visit.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw2EpEsnocZxSu9K1R1xwDHm94VHFZXjoyT3m9Lo3wSB_alaOnXxkJ4lSmjhIlnuniOipu0jqn62yzROD6vUyo6xUu7Bi3gs2qoODpAIFBdhoogKhnMvyyOI5muGPdPRmnptvvnFxaiYo0/s1600/l3fpwpj9wfpj2kgvguzd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw2EpEsnocZxSu9K1R1xwDHm94VHFZXjoyT3m9Lo3wSB_alaOnXxkJ4lSmjhIlnuniOipu0jqn62yzROD6vUyo6xUu7Bi3gs2qoODpAIFBdhoogKhnMvyyOI5muGPdPRmnptvvnFxaiYo0/s640/l3fpwpj9wfpj2kgvguzd.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
It was a big deal for the people of Vietnam when the President of the United States visited their country earlier this week. But sadly, posting about the event on Facebook proved rather difficult.&lt;br /&gt;
&lt;br /&gt;
Reuters cites sources from two activist organizations—Access Now and Viet Tan—that both claim Facebook was “restricted and at times blocked” in Vietnam during the presidential visit. Those interventions were apparently in place for the duration Obama’s trip, from Sunday to Wednesday.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The restrictions were, according to the sources, put in place so that people were unable to organize protests via the social network. Reuters explains that it’s not the first time that Vietnam has blocked Facebook—apparently it did so earlier this year when protests broke out over fish stocks and ahead of parliamentary elections.&lt;br /&gt;
&lt;br /&gt;
Nor is it alone. China, Uganda, Turkey and North Korea have all been known to censor social networks in the past.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.reuters.com/article/us-vietnam-obama-facebook-idUSKCN0YH2MZ?feedType=RSS&amp;amp;feedName=technologyNews&amp;amp;utm_source=Twitter&amp;amp;utm_medium=Social&amp;amp;utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;[Reuters]&lt;/b&gt;&lt;/a&gt;</description><link>http://globavillage.blogspot.com/2016/05/vietnam-allegedly-restricted-facebook.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw2EpEsnocZxSu9K1R1xwDHm94VHFZXjoyT3m9Lo3wSB_alaOnXxkJ4lSmjhIlnuniOipu0jqn62yzROD6vUyo6xUu7Bi3gs2qoODpAIFBdhoogKhnMvyyOI5muGPdPRmnptvvnFxaiYo0/s72-c/l3fpwpj9wfpj2kgvguzd.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-9030435592319412326</guid><pubDate>Wed, 25 May 2016 17:38:00 +0000</pubDate><atom:updated>2016-05-25T10:41:15.319-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">iPhone</category><category domain="http://www.blogger.com/atom/ns#">Tim Cook</category><title> Tim Cook Saw an iPhone in a 17th Century Painting—Here&#39;s What He Missed</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjORg7bpPKYukARBrZWVwY_Ke_y57XVUNaRPWEcQVJ7nThsZ7FzuvKmZB8Bcl2uDYymxYi2DR4-_6NveOmJO840qLfXUZAFchvCmAV9Mkwvj0ZkCCl19NyhPveut-aUsZgKpDSPQrQr2P3/s1600/gas150psaopqblmwvegu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;363&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjORg7bpPKYukARBrZWVwY_Ke_y57XVUNaRPWEcQVJ7nThsZ7FzuvKmZB8Bcl2uDYymxYi2DR4-_6NveOmJO840qLfXUZAFchvCmAV9Mkwvj0ZkCCl19NyhPveut-aUsZgKpDSPQrQr2P3/s640/gas150psaopqblmwvegu.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Tim Cook is many things: executive businessman, native Alabaman, multi-millionaire. Unfortunately, we can’t all be everything, and Tim recently revealed two things that he is most definitely not: art historian and someone who makes good jokes.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
You see, it all started on Tuesday, when he was talking with former Dutch politician Neelie Kroes at Amsterdam’s Start-Up Fest. Kroes asked Cook—who is, of course, the current CEO of Apple—if he knew where and when the iPhone was invented.&lt;br /&gt;
&lt;br /&gt;
“You know, I thought I knew until last night,” Cook answered, according to CNBC. “Last night Neelie took me over to look at some Rembrandt and in one of the paintings I was so shocked. There was an iPhone in one of the paintings.”&lt;br /&gt;
&lt;br /&gt;
He was referring to “Man Handing a Letter to a Woman in the Entrance Hall of a House,” a painting that dates back to 1670, a date, which, silly Tim! predates the iPhone by roughly 337 years.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkU6_MJErUp_nKjlGXRLbUwYuoVIJKfe4ldL0Aldg0X5LthVp1bITqhXs-9cFLUwUnNg8katcP5sNhwhkSVtYbyjTRqis0BQWNDOnWfTTgUw8xh_R8waXaQZ0YPaZl89gsAF9QPTyr-Yw1/s1600/azm751gpoubv1k78f2u4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkU6_MJErUp_nKjlGXRLbUwYuoVIJKfe4ldL0Aldg0X5LthVp1bITqhXs-9cFLUwUnNg8katcP5sNhwhkSVtYbyjTRqis0BQWNDOnWfTTgUw8xh_R8waXaQZ0YPaZl89gsAF9QPTyr-Yw1/s640/azm751gpoubv1k78f2u4.jpg&quot; width=&quot;571&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
In the painting by Pieter de Hooch (not Rembrandt, as Cook guessed), a man appears to off to the right side, holding what is ostensibly a letter but what can be sort of maybe imagined to be an iPhone, if you squint at it after a few beers.&lt;br /&gt;
&lt;br /&gt;
Here’s a closeup:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXFmg-x535rI6IwTN_MqA20q9uTOMXPBDZ3nscrY9AOFM57qZNBmiESpu5OuE2_ZYyyam89s3hKWDrHJ8ck52NzMhzdu-k_8FXSXeGEGjKnijk-zATiB8CMp22c2Z3lK7spuDs9bSEViJv/s1600/rji8srjqpomyxuiyzuse.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;492&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXFmg-x535rI6IwTN_MqA20q9uTOMXPBDZ3nscrY9AOFM57qZNBmiESpu5OuE2_ZYyyam89s3hKWDrHJ8ck52NzMhzdu-k_8FXSXeGEGjKnijk-zATiB8CMp22c2Z3lK7spuDs9bSEViJv/s640/rji8srjqpomyxuiyzuse.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
But Tim! Oh, Tim. There’s so much more to this painting than the iPhone.&lt;br /&gt;
&lt;br /&gt;
Like the girl with the selfie stick in the background:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzJh3daa2sKnEXOsL2ENA4wY-ZevJ7XNDWbO3ZdJcFOboezOxRYgdHCoW8DGD9ry-JEIICGbbBrET3Ypei-0YNdKWGjkJPfiSmlMg4MS-PfZTK_Z5fetgQJui-9c02hg14tUCgOAbEHtwe/s1600/vcinivaif39wpq6s3eer.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;332&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzJh3daa2sKnEXOsL2ENA4wY-ZevJ7XNDWbO3ZdJcFOboezOxRYgdHCoW8DGD9ry-JEIICGbbBrET3Ypei-0YNdKWGjkJPfiSmlMg4MS-PfZTK_Z5fetgQJui-9c02hg14tUCgOAbEHtwe/s400/vcinivaif39wpq6s3eer.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
And a Stormtrooper in the window:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyEykaNzX_PbpdYot-6rsowVarHSDNQyyjtn8zGecIwnmZd4Y70VZ4mBP7VIRm2OMeUB3ppjJJNqezcT_uJ8t0nn07ERRvK6_EWCWYXILWHZa-V0w-zi74Z01xTpwVOibDfVrD81Uqn1x/s1600/p7klaatqmzzobbzttv5e.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyEykaNzX_PbpdYot-6rsowVarHSDNQyyjtn8zGecIwnmZd4Y70VZ4mBP7VIRm2OMeUB3ppjJJNqezcT_uJ8t0nn07ERRvK6_EWCWYXILWHZa-V0w-zi74Z01xTpwVOibDfVrD81Uqn1x/s640/p7klaatqmzzobbzttv5e.png&quot; width=&quot;632&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
And the bluetooth headset:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4r4ghdnIIK-cfoo_oigcKrjj_WksqKjc6EC1UmHwg64xjozGAG8xx-yaJ5HKQAz8Q3XL8_LPWXRVtK529AA6keBTHIeRDakXrdoNtUgwgzvas1GqzZUga0c9sg_4EmNcpn3bOXLz2xJrK/s1600/j1q3qatslhxplkbyh5mc.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;558&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4r4ghdnIIK-cfoo_oigcKrjj_WksqKjc6EC1UmHwg64xjozGAG8xx-yaJ5HKQAz8Q3XL8_LPWXRVtK529AA6keBTHIeRDakXrdoNtUgwgzvas1GqzZUga0c9sg_4EmNcpn3bOXLz2xJrK/s640/j1q3qatslhxplkbyh5mc.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
But we can’t blame you neglecting to notice those details, because you were clearly too distracted by this.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtOy1Ve5fXFJMX32vCDl7B8RSWp7tzf2PDoQ_tK7tBrbPa737T4F1GHgTME3yjii6r1wM-_wkIrka4_QNAk-tNnoYoNKvBvyQxHv6TCTlMXPdCcwt0_Ka-Rcr3WTJv3mCWHC_TjUsw2pls/s1600/vzzszdb7mgdx9g8mm7tb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtOy1Ve5fXFJMX32vCDl7B8RSWp7tzf2PDoQ_tK7tBrbPa737T4F1GHgTME3yjii6r1wM-_wkIrka4_QNAk-tNnoYoNKvBvyQxHv6TCTlMXPdCcwt0_Ka-Rcr3WTJv3mCWHC_TjUsw2pls/s640/vzzszdb7mgdx9g8mm7tb.jpg&quot; width=&quot;604&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
They’re watching you, Tim. They’re always watching you.</description><link>http://globavillage.blogspot.com/2016/05/tim-cook-saw-iphone-in-17th-century.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjORg7bpPKYukARBrZWVwY_Ke_y57XVUNaRPWEcQVJ7nThsZ7FzuvKmZB8Bcl2uDYymxYi2DR4-_6NveOmJO840qLfXUZAFchvCmAV9Mkwvj0ZkCCl19NyhPveut-aUsZgKpDSPQrQr2P3/s72-c/gas150psaopqblmwvegu.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-4488526072102282140</guid><pubDate>Wed, 25 May 2016 17:28:00 +0000</pubDate><atom:updated>2016-05-25T10:40:24.648-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Artificial Life</category><title> Scientists Create Artificial Life, Then Are Assholes to It in the First Trailer for Morgan</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVevtoIK4_147GgBBkGpYlYH5Fa7Jy6xWCkpGd-qhcSJgWhqMJoS-4sxkCvriKfeE7m8nXI8flAE6kJpqE8kHkfqaT8xXso-nmYaxzJuam_L85rGxSu7Jws9zWL7_2uCRf5Z1bcl_M_Cgn/s1600/uwvmzdss94byptgavh4o.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVevtoIK4_147GgBBkGpYlYH5Fa7Jy6xWCkpGd-qhcSJgWhqMJoS-4sxkCvriKfeE7m8nXI8flAE6kJpqE8kHkfqaT8xXso-nmYaxzJuam_L85rGxSu7Jws9zWL7_2uCRf5Z1bcl_M_Cgn/s640/uwvmzdss94byptgavh4o.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The idea of humans being dicks to the advanced technology we make isn’t exactly new, but it’s a story that at least looks to being used to particularly spooky effect in Morgan, the feature debut from director Luke Scott (son of Ridley Scott).&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;448&quot; src=&quot;https://www.youtube.com/embed/mwpH6_tdRZU&quot; width=&quot;600&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
The titular Morgan is a rapidly-maturing synthetic being, played by The Witch’s Anya Taylor-Joy, and after the scientists behind her creation suddenly decide that this rapidly-evolving being shouldn’t be treated like a human being, Kate Mara’s “troubleshooter” is called in to investigate. Naturally, things go awry, because when will you learn, supposedly smart scientists!? Still, this looks like it could be a fun ride, despite the familiar premise. Morgan hits theaters September 2.</description><link>http://globavillage.blogspot.com/2016/05/scientists-create-artificial-life-then.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVevtoIK4_147GgBBkGpYlYH5Fa7Jy6xWCkpGd-qhcSJgWhqMJoS-4sxkCvriKfeE7m8nXI8flAE6kJpqE8kHkfqaT8xXso-nmYaxzJuam_L85rGxSu7Jws9zWL7_2uCRf5Z1bcl_M_Cgn/s72-c/uwvmzdss94byptgavh4o.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-2273133153632556509</guid><pubDate>Tue, 24 May 2016 15:42:00 +0000</pubDate><atom:updated>2016-05-24T08:42:50.303-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Salt</category><title>The Most Absurd Lie Ever Told About Salt</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLy0YSbxTTBtJsCyYgdXahEJRMK0bIeU9ZtdLJHOKx2K0qNdHWoqE2a16PuRy_DjO688SpoUTs7qe7NXbRgR2OizAANgZHgHeIl-Eo5vBdCPuErgOqWBX0iKV-fAxVCq9Vf2cKb8wGJNd/s1600/mofflydr3ced4j6c093d.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLy0YSbxTTBtJsCyYgdXahEJRMK0bIeU9ZtdLJHOKx2K0qNdHWoqE2a16PuRy_DjO688SpoUTs7qe7NXbRgR2OizAANgZHgHeIl-Eo5vBdCPuErgOqWBX0iKV-fAxVCq9Vf2cKb8wGJNd/s640/mofflydr3ced4j6c093d.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Salt. It shows up in our idioms about as often as our food. Even the word salary is derived from salarium, the term for a Roman soldier’s earned ration of salt. But one of the most ridiculous lies perpetuated about this humble mineral is that in ye olden days, salt was more valuable than gold due to its function in food preservation. YouTube historian Lindybeige explains how this is all just a big misunderstanding.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
According to trade documents from Venice in 1590, 33 gold ducats would buy you a ton of salt (ton the unit of measure, not the hyperbolic large quantity). Similar figures exist from ancient Egypt showing that, no, salt was never worth more than gold. Duh. With the obvious stuff out of the way, there’s a reasonable explanation for the gold &amp;lt; salt notion.&lt;br /&gt;
&lt;br /&gt;
The same Venetian trade documents reveal something interesting about the demand for salt: only one of those 33 ducats actually equated to the cost of the salt itself. The rest went towards transportation, tax, and profit. And people paid it gladly because salt was a necessity for survival. Those enormous markups suggest that at one point in time the salt trade was probably more valuable than the gold industry.&lt;br /&gt;
&lt;br /&gt;
So the next time someone says “salt used to be worth more than gold” you can pedantically explain to them that they’re right, but not for the incredibly stupid reason they’re suggesting.&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;448&quot; src=&quot;https://www.youtube.com/embed/g_3wRicL-QI&quot; width=&quot;660&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://globavillage.blogspot.com/2016/05/the-most-absurd-lie-ever-told-about-salt.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLy0YSbxTTBtJsCyYgdXahEJRMK0bIeU9ZtdLJHOKx2K0qNdHWoqE2a16PuRy_DjO688SpoUTs7qe7NXbRgR2OizAANgZHgHeIl-Eo5vBdCPuErgOqWBX0iKV-fAxVCq9Vf2cKb8wGJNd/s72-c/mofflydr3ced4j6c093d.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-5302285194274260186</guid><pubDate>Tue, 24 May 2016 14:55:00 +0000</pubDate><atom:updated>2016-05-24T07:55:36.136-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Japan</category><category domain="http://www.blogger.com/atom/ns#">Learn To Code</category><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Programming</category><title>Japan Just Made Computer Programming A Compulsory Subject In Its Schools</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAH_XC9Z8eqC9SWhyRj_FRh-5WPK4MD_v7TD-DvrNO8Xby_p5pmyB8N4guUal2DArIEbkBQ0QdLL3uVJoZK0thfpFVwn6thhtCg-jb7ZVDoZAeJE14cRysFASqyQg9Svxcek_sGpEmI_on/s1600/kids-code-japan.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;369&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAH_XC9Z8eqC9SWhyRj_FRh-5WPK4MD_v7TD-DvrNO8Xby_p5pmyB8N4guUal2DArIEbkBQ0QdLL3uVJoZK0thfpFVwn6thhtCg-jb7ZVDoZAeJE14cRysFASqyQg9Svxcek_sGpEmI_on/s640/kids-code-japan.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
With an aim to improve children’s creative and logical thinking, Japan has decided to make programming a compulsory subject in its schools. To start this program from 2020, the Japanese government has constituted panels to decide the programming syllabus and incorporated the matter in its growth strategy agenda.&lt;br /&gt;
&lt;br /&gt;
Starting with the primary schools in 2020, computer programming will be made a compulsory subject in the Japanese primary schools. It will be followed by the implementation in middle schools in 2021 and high schools in 2022.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Japan aims to make computer programming a common subject like science and integrated studies to make children ready for the bigger challenges.&lt;br /&gt;
&lt;br /&gt;
In Japanese cities like Takeo, Koha, and Ibaraki Prefecture, programming classes are already mushrooming to assist the schools. The Japan News reports that volunteers and businesses are contributing effectively to this mission.&lt;br /&gt;
Interested In Learning To Code? Get Started Here&lt;br /&gt;
To decide the syllabus of the programming classes being introduced in the schools, the Japanese education ministry has constituted a panel.&lt;br /&gt;
&lt;br /&gt;
A similar trend has also been observed in China where Chinese parents are teaching coding at a much earlier age. Going one step ahead of Japan, China has started teaching kids the basics of coding even before they reach preschool.&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white; color: blue; font-size: x-large;&quot;&gt;&lt;a href=&quot;https://stacksocial.com/sales/become-a-professional-programmer-bundle?aid=a-bbvwa1zq&quot; target=&quot;_blank&quot;&gt;Interested In Learning To Code? Get Started Here&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
However, these developments in the Asian countries isn’t a new phenomenon. Long back in 2000, the Israeli government made programming a compulsory subject in its high schools. Britain came up with the same type of rule for children aged 5 or older.&lt;br /&gt;
&lt;br /&gt;
It would be wrong to assume that the United States government is unaware of the importance of teaching programming in schools. In January, President Barack Obama announced a plan to invest $4 billion in the computer science education.&lt;br /&gt;
&lt;br /&gt;
Should our children be taught programming as a basic subject at an early age? Share your views in the comments below.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: blue; font-size: x-large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: blue; font-size: x-large;&quot;&gt;&lt;a href=&quot;https://stacksocial.com/sales/become-a-professional-programmer-bundle?aid=a-bbvwa1zq&quot; target=&quot;_blank&quot;&gt;Interested In Learning To Code? Get Started Here&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</description><link>http://globavillage.blogspot.com/2016/05/japan-just-made-computer-programming.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAH_XC9Z8eqC9SWhyRj_FRh-5WPK4MD_v7TD-DvrNO8Xby_p5pmyB8N4guUal2DArIEbkBQ0QdLL3uVJoZK0thfpFVwn6thhtCg-jb7ZVDoZAeJE14cRysFASqyQg9Svxcek_sGpEmI_on/s72-c/kids-code-japan.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-5613381756782945498</guid><pubDate>Tue, 24 May 2016 12:22:00 +0000</pubDate><atom:updated>2016-05-24T05:27:34.800-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack Whatsapp Accounts</category><category domain="http://www.blogger.com/atom/ns#">Whatsapp</category><category domain="http://www.blogger.com/atom/ns#">Whatsapp Tricks</category><title>Excellent WhatsApp Tips And Tricks</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWqek5RxHg4Y275FpV1nMNdaSmpbT0Ma-OyOiCGQuA4YIiMHGmSnIgdVNQkRovcb5Xypgd8KSGiEYKJpX-fI0Qn8iOeDelIySCeEUXdH4ka25F-SXZk2gW_KQAuryfpH5Gtk2QbgX1OAPC/s1600/WhatsApp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWqek5RxHg4Y275FpV1nMNdaSmpbT0Ma-OyOiCGQuA4YIiMHGmSnIgdVNQkRovcb5Xypgd8KSGiEYKJpX-fI0Qn8iOeDelIySCeEUXdH4ka25F-SXZk2gW_KQAuryfpH5Gtk2QbgX1OAPC/s400/WhatsApp.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Whatsapp tips and tricks that you must use to have more enjoyable on Whatsapp, Whatsapp messenger is a popular Online messaging service app available for Android, iPhone, Blackberry, Nokia, Java Mobiles, WhatsApp for PC also available now, that is truly biggest 200 million per month active users which is more substantial than other messenger like Viber.&lt;br /&gt;
Whatsapp, among the hottest mobile phone messaging app, experienced intense level of competition from the likes of WeChat and Line but kept its ground using its several features that makes sure users have a secure, reliable and realistic messaging expertise.&lt;br /&gt;
&lt;br /&gt;
The reputation of WhatsApp has developed a lot popular that a lot of WhatsApp tricks and hacks on the online and also many users are looking for these amazing WhatsApp tips and tricks to use in their smartphone and surprise their friends. So many of our audience also requested us to write about best WhatsApp tricks and tips. So, here are a number of tips, tricks and apps to have more from Whatsapp.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;THESE ARE TRICKS BELOW:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;b&gt;How To Install WhatsApp On Mobile Without Mobile Number&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Step # 1: Be connected your device Via Wi-Fi or modem to the online to that you simply need to install WhatApp. And also visit the official site of WhatsApp By Just click here and get WhatsApp Application. Right after Download Set up it to your gadget.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEili5yFYv0R4MkkMZkjlGUYstqaSnlvVVGpLUlZlu18EboIkTfYS5ukoucD2F-euYQka1mfY__XuL72wClH3srEUe0K4bjdJx4_gVyzYtZhvUFUOkKmxtnvcfaGUNX5evhkCwyjr4L1_j53/s1600/whatsapp-without-mobile-number-620x392.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEili5yFYv0R4MkkMZkjlGUYstqaSnlvVVGpLUlZlu18EboIkTfYS5ukoucD2F-euYQka1mfY__XuL72wClH3srEUe0K4bjdJx4_gVyzYtZhvUFUOkKmxtnvcfaGUNX5evhkCwyjr4L1_j53/s320/whatsapp-without-mobile-number-620x392.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
Step # 2: Just after the installation of WhatsApp Application you’ll view a WhatsApp welcome display screen. Then simply click on agree terms and conditions. Displayed under in screenshot.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcBsYzk5u5mt_C2n8nectcyQcSBY1Qvq28oVFIbWqwcSC_32S9o4hZu0DKPadulr_mpbLkwLI06VWevedYjHTJmjyDPpnk7GgWOEm1_bYlweb84uQ47jXxwF4JSnT374bjExX7TxckxynM/s1600/whatsapp-without-simcard.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcBsYzk5u5mt_C2n8nectcyQcSBY1Qvq28oVFIbWqwcSC_32S9o4hZu0DKPadulr_mpbLkwLI06VWevedYjHTJmjyDPpnk7GgWOEm1_bYlweb84uQ47jXxwF4JSnT374bjExX7TxckxynM/s400/whatsapp-without-simcard.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
Step # 3: Just after “Step # 2″ it is going to ask you to confirm the mobile number. Now type in the mobile phone number that we’re going to talk about in “Note” section over and click ok. Now the verification are unsuccessful but you might get a verification code soon to verify.Which means that this is the trick here.&lt;br /&gt;
Please note: Wait around for 10-15 mins to get confirmation code. So be patient. If you receive the Text message then simply click on call me to confirm. Just a call from WhatsApp arrived to your smartphone and following that verify the code. Which is finish now you can gain access to whatsApp on smartphone without any mobile number.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to Hack the Conversation of Your Friend&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Perhaps you have ever before believed that it is possible to hack Whatsapp conversation of the your close friends? It appears actually awesome and an elegant things right? Then ok, i’ll explain to you this awesome trick through which it will be easy to hack your friends Whatsapp chat.&lt;br /&gt;
The first and the main element that you should do is, navigate to the MICROSD card and then just click on the Whatsapp and afterwards on the Database choice. Immediately after you are done for just a the first step you’ll get two files such as,&lt;br /&gt;
-msgstore-yyyy..dd..db.crypt&lt;br /&gt;
-msgstore.db.crypt&lt;br /&gt;
Right after getting these two data files, you need to simply do is get these data files from your friends mobile phone and then you can be very easily can read their chat conversations that they’ve done with their friends.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;How To Create a Fake Conversation&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Found the fake conversations among some celebrities existing on Facebook? Possibly needed to try to do that by yourself? By making use of an application like &lt;a href=&quot;http://whatsaid-whatsapp-prank.soft112.com/&quot; target=&quot;_blank&quot;&gt;WhatSaid&lt;/a&gt; you can actually make fake chat conversations and enjoy with your friends. Please don’t make use of it to mess up somebody’s life.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;How to Disable WhatsApp Last Seen Time Stamp&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
A few of you might need to disable this timestamp for personal privacy reasons. You possibly can disable this time-stamp on both apple iOS and Android operating system mobiles.&lt;br /&gt;
Last seen time-stamp give us an some notification about when the user, who you need to chat was on the online. Is definitely excellent feature but the aspect happens to be actually pretty frustrating because it shows if you are online or not. You are unable to hide your self from your close friends and they will continue chatting along with you.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Get WhatsApp notifications On Desktop&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
If you’ve ever missed a WhatsApp message while working on your desktop, you’ll know how annoying it can be. If you’re using Android, there are a few ways to make sure that you never miss a WhatsApp message again. You can use &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.pushbullet.android&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;Pushbullet&lt;/a&gt;, which includes notification mirroring alongside a lot of other features, but if all you want is notifications on your computer, check out Desktop Notifications.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaOfE187pe_z5ooFXEWixRF5pzpPA_pzHhYph0e65HgIH7N3K6EPbel0YX3SbWsgXM4xqPhaaqkCE5Gxo5FJlku55mmtphlSTP9ABcVcXx-1F8ZK__A0TFJPEGUKdLnPcat6aMLdJXZILz/s1600/desktop-notifications.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaOfE187pe_z5ooFXEWixRF5pzpPA_pzHhYph0e65HgIH7N3K6EPbel0YX3SbWsgXM4xqPhaaqkCE5Gxo5FJlku55mmtphlSTP9ABcVcXx-1F8ZK__A0TFJPEGUKdLnPcat6aMLdJXZILz/s400/desktop-notifications.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Just install Desktop Notifications on your Android phone, then install either the Chrome or Firefox extensions depending on your choice of browser. Link the extension to the app using the code provided and you’re good to go; you’ll now get WhatsApp (and more) notifications on your desktop.</description><link>http://globavillage.blogspot.com/2016/05/excellent-whatsapp-tips-and-tricks.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWqek5RxHg4Y275FpV1nMNdaSmpbT0Ma-OyOiCGQuA4YIiMHGmSnIgdVNQkRovcb5Xypgd8KSGiEYKJpX-fI0Qn8iOeDelIySCeEUXdH4ka25F-SXZk2gW_KQAuryfpH5Gtk2QbgX1OAPC/s72-c/WhatsApp.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-431459052310625188</guid><pubDate>Tue, 24 May 2016 11:45:00 +0000</pubDate><atom:updated>2016-05-24T04:46:42.098-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Fur Affinity Art Gallery Website Taken Down by Hackers</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7edJ_SzKPr_9SjDgiT89zOtjQ7qzCNxupw5BZj-_FbHJoY4a-l44hEjfG4-wDyO_1F9f_dNveQGYQFUv4xWZTsa1SAydAazQAAwZHPYD9fHl29hNM5bGl1eZsWDbT9K0z87zwvSsUa_s/s1600/simple_furaffinity_title_by_legionthecomrade-d6gib4k-800x445.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7edJ_SzKPr_9SjDgiT89zOtjQ7qzCNxupw5BZj-_FbHJoY4a-l44hEjfG4-wDyO_1F9f_dNveQGYQFUv4xWZTsa1SAydAazQAAwZHPYD9fHl29hNM5bGl1eZsWDbT9K0z87zwvSsUa_s/s640/simple_furaffinity_title_by_legionthecomrade-d6gib4k-800x445.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
A widely followed online hub of furries community called Fur Affinity disappeared from the web. Hackers deleted everything on their website which contains content including art submissions and user profiles from Fur Affinity website, which actually is an online gallery that allows users to upload music, art, and written content. The furries community is a group of people having a keen interest in anthropomorphic animal characters like foxes and wolves.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The hackers have also gained access to personal user data, such as encrypted passwords and email addresses which made a easy job to access accounts of several users. A user having the profile name Fender clarified that the passwords have already been reset. Fender also revealed that the site has been facing issues since early on in May.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
If you changed your password since the site went live on the 18th that information is safe.&lt;br /&gt;
— Fur Affinity (@furaffinity) May 21, 2016&lt;/blockquote&gt;
&lt;br /&gt;
Users at an anonymous convention were selling the site’s source code on USB sticks and the same day their site was hacked again. Then in the next attack the site’s content was deleted by the attackers. However, the site’s security team prevented key data like notes and journals from being deleted, according to Dragoneer the site’s admin.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
We have received thousands of emails requesting help with accounts and staff are actively responding. We will assist you as soon as we can.&lt;br /&gt;
— Fur Affinity (@furaffinity) May 23, 2016&lt;/blockquote&gt;
&lt;br /&gt;
As they were having a backup of all the data deleted by the hackeers the team was able to restore Fur Affinity on 11th may, hence the damage is less.</description><link>http://globavillage.blogspot.com/2016/05/fur-affinity-art-gallery-website-taken.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7edJ_SzKPr_9SjDgiT89zOtjQ7qzCNxupw5BZj-_FbHJoY4a-l44hEjfG4-wDyO_1F9f_dNveQGYQFUv4xWZTsa1SAydAazQAAwZHPYD9fHl29hNM5bGl1eZsWDbT9K0z87zwvSsUa_s/s72-c/simple_furaffinity_title_by_legionthecomrade-d6gib4k-800x445.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-8811251981783031458</guid><pubDate>Tue, 24 May 2016 11:37:00 +0000</pubDate><atom:updated>2016-05-24T04:41:33.189-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ICT Business</category><title>This 14-Year-Old Boy CEO Rejected $30 Million Offer For His “RecMed” Innovation</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlw2yjHf6PTxbzZlEy9e6_M-xZU02Na1VXbsxbZpZZESjrYEsVosLQ5bk0dWt6zScJbrTNMIBHuBDpH8jyDJQbXUTskCBFPFvAhl5bNXMwZkNCTvzZqq0TLoZQsq5OGeNS3nQRO3-0DpSG/s1600/taylor-rosenthal-recmed-first-aid-machine.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlw2yjHf6PTxbzZlEy9e6_M-xZU02Na1VXbsxbZpZZESjrYEsVosLQ5bk0dWt6zScJbrTNMIBHuBDpH8jyDJQbXUTskCBFPFvAhl5bNXMwZkNCTvzZqq0TLoZQsq5OGeNS3nQRO3-0DpSG/s640/taylor-rosenthal-recmed-first-aid-machine.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Taylor Rosenthal, a young innovator from Alabama says that he has turned down a $30 million buyout offer from a large company. He is the founder of a RedMed, a company that makes first aid dispensing vending machines. Rosenthal came up with this innovative idea when he was working on a eighth-grade project.&lt;br /&gt;
&lt;br /&gt;
A 14-year-old boy has come up with the innovative idea of a first aid dispensing vending machine. This genius boy, Taylor Rosenthal, from Alabama, has said that he rejected a $30 million buyout offer from a “large national healthcare company.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;It looks like the young inventor is ready for the big leagues. He is also the youngest person to ever get accepted for giving a demo at TechCrunch Disrupt.&lt;br /&gt;
&lt;br /&gt;
Rosenthal launched his startup RecMed in 2015. He has already gained $100,000 in angel investments. This first aid dispensing machine was started as an eighth-grade project when he was a part of a Young Entrepreneurs Academy class.&lt;br /&gt;
&lt;br /&gt;
Talking about the source of inspiration of this business idea, he tells that he needed to come with a &amp;nbsp;business idea in that class.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
Every time I’d travel for a baseball tournament in Alabama, I’d notice that kids would get hurt and parents couldn’t find a band-aid,&lt;b&gt; he told CNN Money&lt;/b&gt;. I wanted to solve that.&lt;/blockquote&gt;
To solve this problem, initially, he tried to set up a pop-up shop that would sell first-aid kids to the players. Realising that this isn’t the best model, he prepared a new design and took some advice from his parents, who already work in the medical industry.&lt;br /&gt;
&lt;br /&gt;
By December, he was successful in obtaining a patent by preparing a prototype that worked.&lt;br /&gt;
&lt;br /&gt;
Now, he plans to sell the machines for $5,500 each. These first aid kid dispensing vending machines come with first aid kits and basic medical supplies like gloves, plasters, gauze pads etc. that cost $4-$11.&lt;br /&gt;
&lt;br /&gt;
Over the summer, Rosenthal plans to deliver these machines to beaches, stadiums, and amusement parks. As a start, Six Flags theme park has already placed an advance order for 100 machines.&lt;br /&gt;
&lt;br /&gt;</description><link>http://globavillage.blogspot.com/2016/05/this-14-year-old-boy-ceo-rejected-30.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlw2yjHf6PTxbzZlEy9e6_M-xZU02Na1VXbsxbZpZZESjrYEsVosLQ5bk0dWt6zScJbrTNMIBHuBDpH8jyDJQbXUTskCBFPFvAhl5bNXMwZkNCTvzZqq0TLoZQsq5OGeNS3nQRO3-0DpSG/s72-c/taylor-rosenthal-recmed-first-aid-machine.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-3539749736095976933</guid><pubDate>Mon, 23 May 2016 14:00:00 +0000</pubDate><atom:updated>2016-05-23T07:01:42.911-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Malicious Ad</category><title>Flashlight App Available In Google Play Store Spreads Malicious Ads</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjadw6-o4KD7RcxNev-KIKijSbyQbvcv1saVdB-2tXA-umLHjPo0gv3plIKVBQ38qPQffApOxyB6cQy8DM-dq46Z-BXWASHMnISU6b9ipgeL_kFpVwcM8QFHa9FJsFOlOvqv_Tj8qI_bFaY/s1600/A-flashlight-app-800x445.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjadw6-o4KD7RcxNev-KIKijSbyQbvcv1saVdB-2tXA-umLHjPo0gv3plIKVBQ38qPQffApOxyB6cQy8DM-dq46Z-BXWASHMnISU6b9ipgeL_kFpVwcM8QFHa9FJsFOlOvqv_Tj8qI_bFaY/s640/A-flashlight-app-800x445.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
An extremely popular flashlight application for Android devices which is available from the official Google Play Store is showing malicious ads that try to fool users into installing potentially harmful applications on their android devices, according to the Trend Micro security researchers. While apps that show ads are very much found in the Google Play Store, this app shows ads with a scareware tendency that tell users that their device is infected.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Well experienced users who are aware of such ads will uninstall this app without clicking into the ads, but less experienced users might click the ad which will lead them to download another app, a so-called virus remover or antivirus which is harmful to the device. Security experts call these types of apps PUAs (Potentially Unwanted Applications).&lt;br /&gt;
&lt;br /&gt;
Some of the reviews about this app from users in the official Google Play Store :&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVaOic3GvCt3pEQN2p7OBX8Tx61WACOnZsN5-_HhBqaquPJZBWNmtgo7Y-vptUA7x2k838Zt5LpvSsH36t1luetLQPW7R_r7bp7hhiFop3VcGE3V39pUGEG-W60xG-XNfHSXpPao0Y9BBn/s1600/Capasaaaaaature.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVaOic3GvCt3pEQN2p7OBX8Tx61WACOnZsN5-_HhBqaquPJZBWNmtgo7Y-vptUA7x2k838Zt5LpvSsH36t1luetLQPW7R_r7bp7hhiFop3VcGE3V39pUGEG-W60xG-XNfHSXpPao0Y9BBn/s640/Capasaaaaaature.png&quot; width=&quot;372&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Currently the app is still available on the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.surpax.ledflashlight.panel&amp;amp;reviewId=Z3A6QU9xcFRPSDZfd2FGQlVnSUd4dTBJUTN0OWtFVk9XaW1uSnRxd2FJSFZxZHhiaVB0OWJrZXVwekI0U01GeUJrV2JUcXhycndvN1NGMTUxU1hlcFZHaTN3&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Google Play Store&lt;/b&gt;&lt;/a&gt;, where Google reports that users installed the app over 100 million times. As most phones don’t have a built-in flashlight functionality these days , which is why users tend to install one from the store where it is available for free. So have been taking advantage of these over the year crooks have often used games and flashlight apps to distribute malware to users. It’s a fact that over 0.15 percent of all Play Store app installs in 2015 contained malicious code.</description><link>http://globavillage.blogspot.com/2016/05/flashlight-app-available-in-google-play.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjadw6-o4KD7RcxNev-KIKijSbyQbvcv1saVdB-2tXA-umLHjPo0gv3plIKVBQ38qPQffApOxyB6cQy8DM-dq46Z-BXWASHMnISU6b9ipgeL_kFpVwcM8QFHa9FJsFOlOvqv_Tj8qI_bFaY/s72-c/A-flashlight-app-800x445.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-5327689955184704662</guid><pubDate>Mon, 23 May 2016 13:55:00 +0000</pubDate><atom:updated>2016-05-23T06:55:07.716-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security Issue</category><title>A cameroonian Hacker Stole $2 Million Worth of Airline Tickets Through Phishing</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXCaWa7f4pputgQDMVXO9Q7wYlaC397k00SbLB3DjUy7yooRlkCfjkWlytH9mUtU3B_jwD6g_gOUBirOVeHClofkcKlzJGTcfR5-C3mJ66mTX8HeTioNDujcbNGXT4WtKIAilgN8vODa5x/s1600/anthem-breach-phishing-attack-cited-showcase_image-1-a-7895.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXCaWa7f4pputgQDMVXO9Q7wYlaC397k00SbLB3DjUy7yooRlkCfjkWlytH9mUtU3B_jwD6g_gOUBirOVeHClofkcKlzJGTcfR5-C3mJ66mTX8HeTioNDujcbNGXT4WtKIAilgN8vODa5x/s640/anthem-breach-phishing-attack-cited-showcase_image-1-a-7895.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
An African hacker, Eric Donys Simeu, 32, of Cameroon pulled off a massive phishing scam that saw him making off with over $2m (£1.38m) worth airline tickets. According to the US Justice Department, Simeu sent out numerous targeted phishing emails between July 2011 and September 2014 to employees of various air travel firms.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The emails were specifically sent to impersonate official communications, in order to trick the victims into opening fake websites and logging in with their official details. The hacker targeted those employees with access to GDS (Global Distribution System) network, which is generally used by air travel and tourism firms to access airline severs to buy or sell flight tickets.&lt;br /&gt;
&lt;br /&gt;
According to the US officials he obtained the GDS login credentials for two companies which includes one from Atlanta, Georgia, and another from Southlake, Texas. After logging into the GDS network he issued numerous airline tickets, which he either used for his personal travels or resold to customers in West Africa at a fraction of their real price.&lt;br /&gt;
&lt;br /&gt;
Simeu was arrested by the French police in September 2014 when attempting to use one of his own fraudulent air tickets to travel from Casablanca, Morocco, to Paris. The US finally extradited Simeu and the case is still being investigated by the FBI and the Justice Department.</description><link>http://globavillage.blogspot.com/2016/05/a-cameroonian-hacker-stole-2-million.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXCaWa7f4pputgQDMVXO9Q7wYlaC397k00SbLB3DjUy7yooRlkCfjkWlytH9mUtU3B_jwD6g_gOUBirOVeHClofkcKlzJGTcfR5-C3mJ66mTX8HeTioNDujcbNGXT4WtKIAilgN8vODa5x/s72-c/anthem-breach-phishing-attack-cited-showcase_image-1-a-7895.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-2427542178664515647</guid><pubDate>Mon, 23 May 2016 13:49:00 +0000</pubDate><atom:updated>2016-05-23T06:49:46.115-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Donald Trump</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>Donald Trump Hotel Collections Website Taken Down By The Ghost Squad</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWVU_Dx73ghG3WBJEM8HuQeL2lofvQMrrM2_Hhde68IfkI687tSblzOcxFaV5KQyBpuRoBOzBrXvU0Da9i2ORUyxWicY0wWFHoTR9EzYSKdWKUAxomL-3cfUJ7Iw6JoBDWj_52EowZooOi/s1600/donald-trump-grow-up-800x445.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWVU_Dx73ghG3WBJEM8HuQeL2lofvQMrrM2_Hhde68IfkI687tSblzOcxFaV5KQyBpuRoBOzBrXvU0Da9i2ORUyxWicY0wWFHoTR9EzYSKdWKUAxomL-3cfUJ7Iw6JoBDWj_52EowZooOi/s640/donald-trump-grow-up-800x445.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The Ghost Squad hackers recently conducted a powerful Distributed Denial of Service attack (DDoS) on the Donald Trump Hotel Collection website forcing it to go offline and display the Cloud Flare’s version for the home page. Till yesterday whoever tries to access the website where confirmed with a message saying that the site is offline, but now the services has been restored and the website works normally.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
&lt;a href=&quot;https://twitter.com/HackRead&quot;&gt;@HackRead&lt;/a&gt; - &lt;a href=&quot;https://t.co/yZbFPgzRYr&quot;&gt;https://t.co/yZbFPgzRYr&lt;/a&gt; - &lt;a href=&quot;https://twitter.com/hashtag/Offline?src=hash&quot;&gt;#Offline&lt;/a&gt; By &lt;a href=&quot;https://twitter.com/hashtag/GhostSquadHackers?src=hash&quot;&gt;#GhostSquadHackers&lt;/a&gt; Meanwhile &lt;a href=&quot;https://twitter.com/CloudFlare&quot;&gt;@Cloudflare&lt;/a&gt; Protecting Pro ISIS Sites &lt;a href=&quot;https://t.co/ZmRbG1eYzx&quot;&gt;pic.twitter.com/ZmRbG1eYzx&lt;/a&gt;&lt;/div&gt;
— ✘Ba̐nnedOͭf̮fline✘ (@BannedOffline) &lt;a href=&quot;https://twitter.com/BannedOffline/status/733745965367234560&quot;&gt;May 20, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
BannedOffline, one of the attackers from Ghost Squad announced to that the groups reason was to target Trump’s hate mongering and the use of Cloud Flare protection which has been pointed out for protecting websites spreading hate and terrorism.&lt;br /&gt;
&lt;br /&gt;
As the site uses CloudFlare’s Always Online™ technology you can continue to surf a snapshot of the site and as soon as the site comes back, you will automatically be served the live version.&lt;br /&gt;
&lt;br /&gt;
The statement given by the Ghost Squad to the HackRead reporters in an exclusive interview :&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
We Chose To DDoS His Hotel Collection Website Because Of A Statement He Said In His Speech I will build a great, great wall, on our southern border, and I will make Mexico pay for that wall”. Also, on TV today, he apologized acting like he did not mean anything he said about Muslims or Mexicans. Words do not go away when you say something mean you obviously mean it then regret it sooner or later. Also, we have noticed CloudFlare has their mind on protecting websites that contain explicit material such as animal p*rn and isis supporting sites. This Is Only The Beginning Though As We Have Future Plans For Hillary Clinton And His Main Website.&lt;/blockquote&gt;
&lt;br /&gt;</description><link>http://globavillage.blogspot.com/2016/05/donald-trump-hotel-collections-website.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWVU_Dx73ghG3WBJEM8HuQeL2lofvQMrrM2_Hhde68IfkI687tSblzOcxFaV5KQyBpuRoBOzBrXvU0Da9i2ORUyxWicY0wWFHoTR9EzYSKdWKUAxomL-3cfUJ7Iw6JoBDWj_52EowZooOi/s72-c/donald-trump-grow-up-800x445.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-6803008313168144030</guid><pubDate>Mon, 23 May 2016 08:48:00 +0000</pubDate><atom:updated>2016-05-23T01:48:59.828-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Artificial intelligence</category><title>Google Maps Driving Mode Is Your Essential In-Car AI</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyVeTYbJo6GdClrxt6Pao21I61lhdaxFEtRzjyxzdFHssSp2l6kG_g0LJ1bPyCbYgquTLeho8_prV3Qp3vvaFkLG4eCKhRIsuugKScghoqQd9UFuPS5VDIBcEW7trx0SPm-I8SDQmtPMbe/s1600/hvdbvvjdiu4yyzlfm0d1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyVeTYbJo6GdClrxt6Pao21I61lhdaxFEtRzjyxzdFHssSp2l6kG_g0LJ1bPyCbYgquTLeho8_prV3Qp3vvaFkLG4eCKhRIsuugKScghoqQd9UFuPS5VDIBcEW7trx0SPm-I8SDQmtPMbe/s640/hvdbvvjdiu4yyzlfm0d1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
You’re probably used to getting turn-by-turn directions to your next destination with Google Maps, but there’s also a pretty-well-hidden Driving Mode just for... well, driving. It alerts you to traffic problems, directs you to nearby gas pumps and stores, and is useful for those times when you already know your route or don’t even have a destination in mind.&lt;br /&gt;
&lt;br /&gt;
Google launched Driving Mode earlier this year for Android but it’s kind of tricky to find: in Google Maps, choose Start driving from the app menu or make use of the 1x1 widget (under Maps). Your screen fills up with your current position and nearby traffic conditions.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyyHY2vhqe5ka2iuf9Ucki1Rpt834EsRXZ6Dmu3N_45rOt5fWa9gcgpwrLgUVQktB5NBvSJgD_sUjpKESFpXuO4nnOguLPdIxd78Ae2anjvCF9B5jUiqsMFj2WmfMJPOS15ZZC6mRUf9FZ/s1600/ak0xvbyohb3dfittsgbx.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyyHY2vhqe5ka2iuf9Ucki1Rpt834EsRXZ6Dmu3N_45rOt5fWa9gcgpwrLgUVQktB5NBvSJgD_sUjpKESFpXuO4nnOguLPdIxd78Ae2anjvCF9B5jUiqsMFj2WmfMJPOS15ZZC6mRUf9FZ/s640/ak0xvbyohb3dfittsgbx.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
If it’s close to commute time, you’ll see ETAs to your home or work (if you’ve added them to Maps). Driving Mode also shows ETAs to places you’ve recently been to or searched for. If you like the timings, you can hit a place to navigate to it in the normal way.&lt;br /&gt;
&lt;br /&gt;
For example, say you just got out of work and want to quickly know whether it’s worth heading home or going to the gym first. Driving Mode tells you with some driving time estimates and you can make your choice; as you motor around, the ETAs update.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCCc1rpcsh_n-LQMhx0SfSwBCpAb0FgFFS9qAMBoGdHmKxCTjVjbdBYvRUIv8sTD3JYImV1dyn85c66oAGLgVu3sIXnuzQS9gRpEBvSzTuf9quOA3EP-gpb9FZcq1zJS9NBYkXiMA9XYkx/s1600/rm5oylc48nyyfxhu9cve.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCCc1rpcsh_n-LQMhx0SfSwBCpAb0FgFFS9qAMBoGdHmKxCTjVjbdBYvRUIv8sTD3JYImV1dyn85c66oAGLgVu3sIXnuzQS9gRpEBvSzTuf9quOA3EP-gpb9FZcq1zJS9NBYkXiMA9XYkx/s640/rm5oylc48nyyfxhu9cve.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
As in the “standard” navigation mode, you can search for nearby gas stations, restaurants, supermarkets, and more through the search button. Again, these results stay on screen until you dismiss them, so if you’re circling around looking for a place to eat then the results keep updating as you move.&lt;br /&gt;
&lt;br /&gt;
For those times when you know where you’re going but still want traffic updates, Driving Mode is helpful; it’s also useful when you’re touring around an area without any particular destination in mind. No word yet if the feature will make its way over to iOS.</description><link>http://globavillage.blogspot.com/2016/05/google-maps-driving-mode-is-your.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyVeTYbJo6GdClrxt6Pao21I61lhdaxFEtRzjyxzdFHssSp2l6kG_g0LJ1bPyCbYgquTLeho8_prV3Qp3vvaFkLG4eCKhRIsuugKScghoqQd9UFuPS5VDIBcEW7trx0SPm-I8SDQmtPMbe/s72-c/hvdbvvjdiu4yyzlfm0d1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-3961086384530134662</guid><pubDate>Mon, 23 May 2016 08:42:00 +0000</pubDate><atom:updated>2016-05-23T01:42:54.899-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Space</category><title> India Just Launched an Adorable Mini Shuttle Into Space</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPvCUp9UHbHH1cZptHGJERdWIegOCv7IZCbE6d4ZUCOVU18Wmw3YsGtFxzhi5AJzLugx_IQ1qNSZls8diIJOF2JRSXSxt_EYK60r95WQ2MxGWLAor5ofDnlgvivMJOnpEzkY7a9ZPsVRA/s1600/lssysxineis3ct5v0rwl.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPvCUp9UHbHH1cZptHGJERdWIegOCv7IZCbE6d4ZUCOVU18Wmw3YsGtFxzhi5AJzLugx_IQ1qNSZls8diIJOF2JRSXSxt_EYK60r95WQ2MxGWLAor5ofDnlgvivMJOnpEzkY7a9ZPsVRA/s640/lssysxineis3ct5v0rwl.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
India is joining the reusable space race. Its space agency has today launched a 22-foot space shuttle, that will be used test the country’s plans for creating a spacecraft that can be used multiple times.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The 1.75-tonne un-manned spacecraft—known as Reusable Launch Vehicle—will travel to 43 miles above the Earth’s atmosphere then descend back to the surface of the planet. This particular shuttle isn’t expected to survive the landing. Instead, it will gather data about the speed and intensity of re-entry, and test the craft’s autonomous landing capabilities.&lt;br /&gt;
&lt;br /&gt;
This mission is the result of five years of work and $14 million of investment, according to the BBC. It’s hoped that the country will be using a full-scale reusable spacecraft within the next 10 years.&lt;br /&gt;
&lt;br /&gt;
India joins a long line of folks—not least the private companies like SpaceX and Blue Origin—trying to build a reusable space craft.</description><link>http://globavillage.blogspot.com/2016/05/india-just-launched-adorable-mini.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPvCUp9UHbHH1cZptHGJERdWIegOCv7IZCbE6d4ZUCOVU18Wmw3YsGtFxzhi5AJzLugx_IQ1qNSZls8diIJOF2JRSXSxt_EYK60r95WQ2MxGWLAor5ofDnlgvivMJOnpEzkY7a9ZPsVRA/s72-c/lssysxineis3ct5v0rwl.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-5531914732189063703</guid><pubDate>Sat, 21 May 2016 16:33:00 +0000</pubDate><atom:updated>2016-05-21T09:33:11.988-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Top Websites That Use Audio Fingerprinting To Secretly Track Web Users</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUcODcFc6Dk592AV0EjMd61xiu55anuFVHynkjuzpGVGIJNT-jg_xFQpk6P4H6ChqpmRBR4XOMlDX-XozaJcoed7BDEvsUWpnXTCLiCdUomuu0ue2DQ9tUYFPQbRg-9qDU1S-iAdQGKZf-/s1600/audio-fingerprinting.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;334&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUcODcFc6Dk592AV0EjMd61xiu55anuFVHynkjuzpGVGIJNT-jg_xFQpk6P4H6ChqpmRBR4XOMlDX-XozaJcoed7BDEvsUWpnXTCLiCdUomuu0ue2DQ9tUYFPQbRg-9qDU1S-iAdQGKZf-/s640/audio-fingerprinting.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting.&lt;br /&gt;
&lt;br /&gt;
This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even decrypting the traffic.&lt;br /&gt;
&lt;br /&gt;
Researchers at Princeton University have conducted a massive privacy survey and discovered that Google, through its multiple domains, is tracking users on nearly 80 percent of all Top 1 Million Domains using the variety of tracking and identification techniques.&lt;br /&gt;
&lt;br /&gt;
Out of them, the newest tracking technology unearthed by the researchers is the one based on fingerprinting a machine’s audio stack through the &lt;a href=&quot;https://www.w3.org/TR/webaudio/&quot; target=&quot;_blank&quot;&gt;AudioContext API&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
All of the top five third-parties, as well as 12 of the top 20, are Google-owned domains,&quot; the researchers note. &quot;In fact, Google, Facebook, and Twitter are the only third-party entities present on more than 10 percent of sites.&lt;/blockquote&gt;
The AudioContext API is not collecting audio played or recorded on a machine, but rather harvesting the audio signals of the each machine that is then using it to reveal unique browser and device combinations.&lt;br /&gt;
&lt;br /&gt;
The method has nothing to do with the device&#39;s microphone, as it relies on the way a signal is processed.&lt;br /&gt;
&lt;br /&gt;
A third-party tracker uses the AudioContext API to send low-frequency sounds to a user&#39;s computer and then measures how the computer processes the data, creating a unique fingerprint based on the hardware and software capabilities of the user&#39;s computer.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s what the researchers explain:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
A script from the company Liverail checks for the existence of an AudioContext and OscillatorNode to add a single bit of information to a broader fingerprint. More sophisticated scripts process an audio signal generated with an OscillatorNode to fingerprint the device. This technique appears conceptually similar to that of canvas fingerprinting. Audio signals processed on different machines or browsers may have slight differences due to hardware or software differences between the machines while the same combination of machine and browser will produce the same output.&lt;/blockquote&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Check Your Audio Fingerprint&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0iI39ow36a2qBvbJ8Ugnj1JdmdH9my2Kl3GqHvtIvJS1SobMmS7ecfwYh0-cz5MCbE2eF-lxoaQn_eKRdDhMnRpTAQ2DqS17Xnp7SIa8Zh0H1mJFBM8vsr7tEWsduwXzH9eaA-st329L/s1600/tracking-online-user.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0iI39ow36a2qBvbJ8Ugnj1JdmdH9my2Kl3GqHvtIvJS1SobMmS7ecfwYh0-cz5MCbE2eF-lxoaQn_eKRdDhMnRpTAQ2DqS17Xnp7SIa8Zh0H1mJFBM8vsr7tEWsduwXzH9eaA-st329L/s640/tracking-online-user.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
The researchers, Assistant Professor Arvind Narayanan and graduate student Steven Englehardt, have created a &lt;a href=&quot;https://audiofingerprint.openwpm.com/&quot; target=&quot;_blank&quot;&gt;live demonstration page&lt;/a&gt; of the technique. So, if you want to check your audio fingerprint, you can check on the demo page.&lt;br /&gt;
&lt;br /&gt;
The audio fingerprinting technique is not widely adopted but joins a number of other approaches that could be used in combination for tracking users as they browse the Internet.&lt;br /&gt;
&lt;br /&gt;
To carry out measurements to track the trackers, the researchers said they used a custom piece of an open-source software called OpenWPM, which loads sites in Chrome, Firefox and Internet Explorer, collecting data on the tracking loaded on each page.&lt;br /&gt;
&lt;br /&gt;
Another widely used method to track online users is fingerprinting technique based on the HTML Canvass API and WebRTC local IP discovery.&lt;br /&gt;
&lt;br /&gt;
From last few years, many websites and third-party trackers are utilizing the fingerprinting power of HTML5 Canvas, which is a HTML element used to dynamically generated an image in your browser’s web page.&lt;br /&gt;
&lt;br /&gt;
For the detailed study, you can read this full &lt;a href=&quot;http://randomwalker.info/publications/OpenWPM_1_million_site_tracking_measurement.pdf&quot; target=&quot;_blank&quot;&gt;PDF&lt;/a&gt; full here.</description><link>http://globavillage.blogspot.com/2016/05/top-websites-that-use-audio.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUcODcFc6Dk592AV0EjMd61xiu55anuFVHynkjuzpGVGIJNT-jg_xFQpk6P4H6ChqpmRBR4XOMlDX-XozaJcoed7BDEvsUWpnXTCLiCdUomuu0ue2DQ9tUYFPQbRg-9qDU1S-iAdQGKZf-/s72-c/audio-fingerprinting.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-7192579783631360925</guid><pubDate>Sat, 21 May 2016 13:14:00 +0000</pubDate><atom:updated>2016-05-21T06:14:06.142-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><category domain="http://www.blogger.com/atom/ns#">Linkedin</category><title>Over 117 Million LinkedIn Accounts Have Been Put On Sale By Hackers</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL1FwpAh6KVVwO098-Ov056BepAHiQcvsbD6x6X621wZRcjX37Ee3Cq7B_use2_XL91vcSsmLeD_A5FB9qnqF-yiD9Pngt1pVz-cq99pxIzebnnKwvaX9UIxcHO_VwpPAvFqWwtITOcx2p/s1600/linkedin-office.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL1FwpAh6KVVwO098-Ov056BepAHiQcvsbD6x6X621wZRcjX37Ee3Cq7B_use2_XL91vcSsmLeD_A5FB9qnqF-yiD9Pngt1pVz-cq99pxIzebnnKwvaX9UIxcHO_VwpPAvFqWwtITOcx2p/s400/linkedin-office.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
According to the lastest report over 117 million LinkedIn email addresses and passwords have been stolen and been put up for sale on the Dark Web. In 2012 LinkedIn suffered a huge data breach were more than 6 Million users accounts login details, including encrypted passwords were posted online by a Russian hacker.&lt;br /&gt;
&lt;br /&gt;
The hacker, who goes by the name “Peace”, told the Motherboard reports that the data was stolen during the LinkedIn breach of 2012. At the time, only around 6.5 million encrypted passwords were posted online, and LinkedIn never clarified how many users were affected by that breach.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Peace is selling the data on the dark web illegal marketplace The Real Deal for 5 bitcoin (around $2,200). Even if a user changed their password following the 2012 hack, they could still be using the same password elsewhere on the web, leaving their accounts open to cyber criminals.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbs3F1AMvNWbZ-IkV35PL9tEXEpCOtBFUnnkWQ2G0fvH33oNkkxIF-gBkWK44n40eVQa0HH32w3F0oyFy2SkHZAFTi0Q3bVcljF5vAE3yP6uWw7WtTlM613upRunI5FCy6i9skBela865d/s1600/Casspture.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;361&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbs3F1AMvNWbZ-IkV35PL9tEXEpCOtBFUnnkWQ2G0fvH33oNkkxIF-gBkWK44n40eVQa0HH32w3F0oyFy2SkHZAFTi0Q3bVcljF5vAE3yP6uWw7WtTlM613upRunI5FCy6i9skBela865d/s640/Casspture.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the passwords have been initially encrypted with the SHA1 algorithm, with “no salt,” it just took ‘LeakedSource‘, the paid search engine for hacked data, 72 hours to crack roughly 90% of the passwords. LeakedSource provided Motherboard with a sample of almost one million credentials, which included email addresses, hashed passwords, and the corresponding hacked passwords.&lt;br /&gt;
&lt;br /&gt;
n 2015, Linkedin also agreed to settle a class-action lawsuit over 2012’s security breach by paying a total of $1.25 million to victims in the U.S, means $50 to each of them.&lt;br /&gt;
&lt;br /&gt;</description><link>http://globavillage.blogspot.com/2016/05/over-117-million-linkedin-accounts-have.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL1FwpAh6KVVwO098-Ov056BepAHiQcvsbD6x6X621wZRcjX37Ee3Cq7B_use2_XL91vcSsmLeD_A5FB9qnqF-yiD9Pngt1pVz-cq99pxIzebnnKwvaX9UIxcHO_VwpPAvFqWwtITOcx2p/s72-c/linkedin-office.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-6395888434037584150</guid><pubDate>Sat, 21 May 2016 13:11:00 +0000</pubDate><atom:updated>2016-05-21T06:11:41.617-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Smartphone tricks</category><title>Your Smartphone Is Still Spying On You After Turning it Off – Android</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8cnwYpObAg_zhLxFpZrhXluv6daHo6cqWmsULN2KwvEpMHlsRrt_G8iH8lYI2Ea7tNcyeRrAwwORO0dNwo1pA-3Mg7kMHEvlWbS1s8c-527O5qQ05aILLTjpVy6ZhLfCn9afEzXoxwQF7/s1600/Android-hacked1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8cnwYpObAg_zhLxFpZrhXluv6daHo6cqWmsULN2KwvEpMHlsRrt_G8iH8lYI2Ea7tNcyeRrAwwORO0dNwo1pA-3Mg7kMHEvlWbS1s8c-527O5qQ05aILLTjpVy6ZhLfCn9afEzXoxwQF7/s400/Android-hacked1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Security experts have recently found that your smartphones are spied even your phone is switched off.Security researchers have unearthed a new Android Malware called PowerOffHijack. &amp;nbsp;PowerOffHijack because the nasty malware has a very unique feature – it hijacks the shutdown process of user’s mobile phone.Next time you turn off your Android phone, you might want take the battery out just to be certain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After pressing the power button, you will see the real shutdown animation, and the phone appears off. Although the screen is black,your been spied.According to the company, PowerOffHijack malware infects devices running Android versions below 5.0 (Lollipop) and requires root access to perform the tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
PowerOffHijack malware has already infected more than 10,000 devices, mostly in China.PowerOffHijack malware has ability to silently send lots of premium-rate text messages, make calls to expensive overseas numbers, take photos and perform many other tasks even if the phone is supposedly switched off.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Note: Simple method to get rid of you being spied is by taking out the battery after u switch off your smartphone.&lt;/b&gt;</description><link>http://globavillage.blogspot.com/2016/05/your-smartphone-is-still-spying-on-you.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8cnwYpObAg_zhLxFpZrhXluv6daHo6cqWmsULN2KwvEpMHlsRrt_G8iH8lYI2Ea7tNcyeRrAwwORO0dNwo1pA-3Mg7kMHEvlWbS1s8c-527O5qQ05aILLTjpVy6ZhLfCn9afEzXoxwQF7/s72-c/Android-hacked1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-6683056040929103800</guid><pubDate>Sat, 21 May 2016 10:37:00 +0000</pubDate><atom:updated>2016-05-21T03:37:46.067-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">iphone Trick</category><title>Changing Time And Date Setting To Jan 1, 1970 Will Brick Your iPhone</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS5zZL_IuNk8ov4pQeSzGWyjLszrHM0IdjE_WGtzAn_p08ualCK6WRzyyBZdxbJVdjOqyzcoDjn_-_R1reJX-AUHbggvTmuX6G23hWaVgjTME-Z5XCR6x3n4xnJx7kyxmKebaERAsj1QtV/s1600/iphonebug.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS5zZL_IuNk8ov4pQeSzGWyjLszrHM0IdjE_WGtzAn_p08ualCK6WRzyyBZdxbJVdjOqyzcoDjn_-_R1reJX-AUHbggvTmuX6G23hWaVgjTME-Z5XCR6x3n4xnJx7kyxmKebaERAsj1QtV/s400/iphonebug.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
A simple bug in iPhone founded by Zach Straley on YouTube shows that if you set the time and date to January 1, 1970 will brick your iPhone.&lt;br /&gt;
&lt;br /&gt;
The iOS device will fail to boot, stuck at display of Apple logo.&lt;br /&gt;
This glitch got lot of attention on reddit with people experimenting on their iPhone devices to see if it worked. This glitch works on any iOS device that uses a 64-bit processor and is running iOS 8 or newer, including iPhones, iPads, and iPod touches. To avoid this, simply let your iPhone automatically set the time.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;480&quot; src=&quot;https://www.youtube.com/embed/fY-ahR1R6IE&quot; width=&quot;620&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
For people who tried this for fun and got their iPhone bricked had to visit to their local Apple store and replace their iPhone under warranty.&lt;br /&gt;
&lt;br /&gt;
Other way to fix this problem is to wait until the battery die and then plug the charger in iPhone and reset. You can see blue screen for about 3 seconds after few minutes. This worked for few people and didn’t work for others.</description><link>http://globavillage.blogspot.com/2016/05/changing-time-and-date-setting-to-jan-1.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS5zZL_IuNk8ov4pQeSzGWyjLszrHM0IdjE_WGtzAn_p08ualCK6WRzyyBZdxbJVdjOqyzcoDjn_-_R1reJX-AUHbggvTmuX6G23hWaVgjTME-Z5XCR6x3n4xnJx7kyxmKebaERAsj1QtV/s72-c/iphonebug.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8509059387379308245.post-7752874556095945356</guid><pubDate>Sat, 21 May 2016 10:24:00 +0000</pubDate><atom:updated>2016-05-21T03:24:57.589-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Court Case</category><category domain="http://www.blogger.com/atom/ns#">Mark Zuckerberg</category><category domain="http://www.blogger.com/atom/ns#">Security Issue</category><title>Facebook Sued For Illegally Scanning Users&#39; Private Message</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWg6zanFkscbcm3qiNhy-sUx3a6BEZg-hkqYdj9qMOuYrGaoX3iGdnZ5XDTQ2EX6YY84M3jmIYckuGzsaNxynCIXE-QnJ34lkyi2iFUNsME7_ngSStcMvu4BqYCdZ-o2F4VikZed3CYEyg/s1600/facebook-private-messages.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;334&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWg6zanFkscbcm3qiNhy-sUx3a6BEZg-hkqYdj9qMOuYrGaoX3iGdnZ5XDTQ2EX6YY84M3jmIYckuGzsaNxynCIXE-QnJ34lkyi2iFUNsME7_ngSStcMvu4BqYCdZ-o2F4VikZed3CYEyg/s640/facebook-private-messages.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Facebook is facing a class-action lawsuit in Northern California over allegations that the company systematically scans its users&#39; private messages on the social network without their consent and makes the profit by sharing the data with advertisers and marketers.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
According to the lawsuit filing, Facebook might have violated federal privacy laws by scanning users&#39; private messages.&lt;br /&gt;
Facebook routinely scans the URLs within users&#39; private messages for several purposes like anti-malware protection and industry-standard searches for child pornography, but it has been claimed that the company is also using this data for advertising and other user-targeting services.&lt;br /&gt;
&lt;br /&gt;
The plaintiffs, Matthew Campbell, and Michael Hurley argue that the Facebook is scanning and collecting URLs-related data in a searchable form, violating both the Electronic Communications Privacy Act and California Invasion of Privacy Act, reported the Verge.&lt;br /&gt;
Facebook argues that the company scans users&#39; private messages in bulk, and maintains the URL records in an anonymized way, which is only used in aggregate form.&lt;br /&gt;
However, according to a technical analysis done on behalf of the plaintiffs, each URL-related message is stored in &quot;Titan,&quot; a private message database that displays the date and time the message was sent, along with the user IDs of both the sender and the recipient.&lt;br /&gt;
&lt;br /&gt;
However, it turns out that Facebook used this practice in past, but the company claimed to have stopped such practices a long time ago.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
We agree with the court&#39;s finding that the alleged conduct did not result in any actual harm and that it would be inappropriate to allow plaintiffs to seek damages on a class-wide basis, a Facebook spokesperson told CNET.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
The remaining claims relate to historical practices that are entirely lawful, and we look forward to resolving those claims on the merits.&lt;/blockquote&gt;
However according to the plaintiffs, Facebook is still continuing to collect links from users&#39; private messages.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Facebook&#39;s source code not only reveals that Facebook continues to acquire URL content from private messages, but that it also continues to make use of the content it acquires.&lt;/blockquote&gt;
Meanwhile, you can check out the lawsuit here. The lawsuit was originally filed in 2012 and for now, the case is expected to proceed.&lt;br /&gt;
Plaintiffs have until June 8 to file an amended complaint, following a scheduled conference toward the end of the month.</description><link>http://globavillage.blogspot.com/2016/05/facebook-sued-for-illegally-scanning.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWg6zanFkscbcm3qiNhy-sUx3a6BEZg-hkqYdj9qMOuYrGaoX3iGdnZ5XDTQ2EX6YY84M3jmIYckuGzsaNxynCIXE-QnJ34lkyi2iFUNsME7_ngSStcMvu4BqYCdZ-o2F4VikZed3CYEyg/s72-c/facebook-private-messages.png" height="72" width="72"/><thr:total>1</thr:total></item></channel></rss>