Tagged: Google Toggle Comment Threads | Keyboard Shortcuts

  • #AceNewsGroup 19:48 on May 13, 2014 Permalink
    Tags: , , Do Not Track Policy, , European Union Court of Justice, Google, , , Spanish language, Web search engine   

    ` Google Must Comply with European Laws on Privacy by Amending Search Results ‘ 


    #AceSecurityNews – EU COURT Of JUSTICE – May 13 – Google must comply with the European laws on privacy and amend some search results, a top EU court ruled on Tuesday, May 13.

    English: Google Logo officially released on Ma...

    English: Google Logo officially released on May 2010 (Photo credit: Wikipedia)

    The European Union Court of Justice said that ordinary people can ask Google to remove some sensitive, irrelevant or outdated information from Internet search results.

    Earlier, the search engine stated that it does not control search results and bears no responsibility for personal data that is “in open access”. The responsibility lies with the owner of the website that provides the information, and Google merely presents the user with a link.

    The case was brought by a Spanish man who complained that an auction notice of his home that could be found on Google infringed upon his privacy.

    Around 180 similar complaints have been filed in Spain.

    #ANS2014

    Enhanced by Zemanta
     
  • #AceNewsGroup 19:40 on March 31, 2014 Permalink
    Tags: , , , , Google, Internet Service Provider (ISP), ,   

    ` Google says ` Turkey ' has been ` Intercepting ' its `Internet Domain 'and ` Redirecting Users ' to other Sites ' 


    #AceNewsServices – ANKARA – March 31 – Google says Turkey has been intercepting its Internet domain, redirecting users to other sites in the latest battle between Ankara and Web giants.

    In a weekend post on Google’s security blog, software engineer Steven Carstensen said the company has received “several credible reports and confirmed with our own research that Google’s Domain Name System (DNS) service has been intercepted by most Turkish ISPs (Internet Service Providers).”

    Carstensen said the DNS server “tells your computer the address of a server it’s looking for, in the same way that you might look up a phone number in a phone book.”

    “Imagine if someone had changed out your phone book with another one, which looks pretty much the same as before, except that the listings for a few people showed the wrong phone number,” he added.

    “That’s essentially what’s happened: Turkish ISPs have set up servers that masquerade as Google’s DNS service.”

    Ace Related News: March 30 – Sophos – That’s because the easiest way for a country to get its ISPs to block access to a site like twitter.com is to tell them to stop resolving the name of the site in their DNS servers.

    Most home users rely on their ISP for access to DNS, the Domain Name System that turns human-style internet names to computer-style numbers.

    For example, when you ask your ISP how to find twitter.com, this is what happens. http://wp.me/p120rT-13WV

    #ANS2014

     
  • #AceNewsGroup 11:00 on March 26, 2014 Permalink
    Tags: , , , , , , Google, President Dilma Rousseff, ,   

    ` Brazil Wins Victory for Net Neutrality in Brazil but Companies Win Right to still Store Information ' 


    #AceSecurityNews – BRAZIL – March 26 – Brazil has scored big for net neutrality after its lower house of Congress approved a ground-breaking post-Snowden bill that protects its users’ privacy rights, albeit with some sacrifices.

    The measure did not go as smoothly as could have. To ensure success, President Dilma Rousseff had to let it through at the cost of allowing companies such as Google and Facebook to store user information outside Brazil’s servers.

    The real truth is that as before all your GMail and Private Data is still stored on Servers outside these countries and as in the case of Google and Facebook free to be used albeit, they will say with restrictions says Ace News Services.

    However, other provisions, which ensured that internet providers gave equal privileges to all web traffic, were left in place. This went ahead despite contrary pleas by big local phone carriers who wanted to continue charging users higher prices for separate content, such as video streaming or Skype-like services.RT

    In return for allowing Google and Facebook the freedom not to be bound by Brazilian servers, where local user information was concerned, the bill gets to strengthen legal oversight and punishment for companies not respecting local laws when storing Brazilian user data internationally.

    If any transgressions are detected, or data is not made available to law enforcement on request, a company would have to pay a fine equal to 10 percent of its annual earnings from the year before.

    #ANS2014

     
  • #AceNewsGroup 20:34 on March 25, 2014 Permalink
    Tags: , , , , , , Google,   

    ` France’s Consumer Rights Group `Files Lawsuit ‘ in ` Paris Court ‘ against Social Media for Violation of Privacy ‘ 


    #AceSocialNews – FRANCE – March 25 – France’s top consumer rights group has filed a lawsuit in a Paris court against Google+, Facebook and Twitter, accusing the social networks of violating the country’s privacy laws.

    UFC-Que Choisir – a group which advises consumers on products, services and their rights – said it was filing a suit in the High Court over “abusive” and “illegal” practices in the conditions of use on the three social networks, AFP reported Tuesday.

    The consumers’ group said that last summer they warned the companies that they would bring legal action in case they did not address concerns over terms of use and data-collection practices.

    However, “they are stubbornly maintaining clauses that the association considers abusive or illegal,” the group was reported as saying.

    UFC-Que Choisir asked the court to order Google+, Facebook and Twitter to get rid of or change the fine print on their terms of use since, they believe, it is far too complicated.

    According to the organization, the instructions were “inaccessible, unreadable and full of hypertext links” – some of which are available only in English.

    The watchdog claimed that the social networks “persist in authorizing the widespread collection, modification, preservation and use of the data of users and even of those around them.”

    Social and Media News – http://on.rt.com/jpt4bc

    #ANS2014

     
  • #AceNewsGroup 10:18 on March 22, 2014 Permalink
    Tags: , , , Google, , , ,   

    Turkey : ` Google declines to remove `YouTube ‘ videos that allege Corruption ‘ 


    #AceWorldNews – Google has declined Turkey’s requests to remove YouTube videos that allege government corruption, sources told The Wall Street Journal.

    Amid a corruption scandal, Turkish Prime Minister Recep Tayyip Erdogan’s government has asked Google in recent weeks to block certain videos from its site in Turkey.

    However, Google has reportedly refused to comply given it believes the requests are legally invalid. Turkey blocked the social media site Twitter on Thursday, and the government has threatened to do the same with YouTube and Facebook, as the sites have been prime conduits for corruption allegations.

    Related News: Extract – March – 09.02 GMT – #AceWorldNews – Turkey has blocked Twitter hours after embattled Turkish Prime Minister Erdogan threatened to close it down ahead of a key election. It comes after audio recordings purportedly demonstrating corruption among his associates were posted on the site.http://wp.me/p165ui-4rt

    #ANS2014

     
  • #AceNewsGroup 12:19 on March 21, 2014 Permalink
    Tags: , , , , , , Google, Municipal wireless network, , ,   

    `Google Encrypts Gmail in Effort to Stop the Prying Eyes of the NSA – Maybe a Little To Late? ‘ 


    #AceSecurityNews – Google is doing its best to put a lid on the NSA’s prying eyes by using enhanced encryption technology to make its flagship email service airtight.

    Google Encypts Gmail“Your email is important to you, and making sure it stays safe and always available is important to us,” Gmail engineering security chief, Nicolas Lidzborski, said in a blog post.

    “Starting today, Gmail will always use an encrypted HTTPS connection when you check or send email.

    “Today’s change means that no one can listen in on your messages as they go back and forth between you and Gmail’s servers — no matter if you’re using public WiFi or logging in from your computer, phone or tablet.”

    The internet giant’s announcement is the latest attempt to bolster the company’s widely used email service and follows a similar step in 2010, when the company made HTTPS the default connection option.

    At the time, however, users had the option to turn this protection feature off.

    Starting from Friday, Gmail is HTTPS-only.

    The move is a response to a disclosure made by National Security Agency (NSA) whistleblower, Edward Snowden, that the agency had been secretly tapping into the main communications links that connect Yahoo and Google data centres around the world.

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 15:30 on March 20, 2014 Permalink
    Tags: , Charity (virtue), CrunchBase, Davydov, Denis Davydov, Google, , , , Safe Internet League,   

    Safe Internet for Children called into Arena by Psychologists and Psychiatrists as Google Develops own Kids Version ‘ 


    #AceSecurityNews - The Safe Internet League, Russia’s largest and most reputable organization fighting dangerous web content, considers it necessary to attract highly skilled psychologists and psychiatrists as the popular Google-owned video hosting and sharing service YouTube is developing a special version for kids, Safe Internet League CEO Denis Davydov was quoted as saying by the organization’s press service on Thursday.

    Image representing YouTube as depicted in Crun...

    Image via CrunchBase

    “Leading psychologists and psychiatrists should participate in developing requirements for video content hosted on the so-called child-friendly version of YouTube in order to eliminate the risk of ‘a wolf in sheep’s clothing’,” Davydov said. “Far from all videos that may seem harmless to us are necessarily suitable for children. And specialists’ opinion is essential in this regard.”

    Davydov said the Safe Internet League hailed Google’s decision to create a version of its video site aimed specifically at children aged ten and under.

    As envisioned by project developers, the site would only show videos deemed safe for this age group, and parents will control access to it. The site would also filter out comments that contain explicit language, or other references to adult content.

    “It is very laudable that Google has started demonstrating its willingness to work in Russia, showing respect for the rights of our citizens and taking care of the younger generation of Russians,” Davydov said.

    Last September, the Safe Internet League published the results of a full-scale investigation by the League into Google’s activities in Russia. The organization accused Google of “ignoring Russian legal requirements” and “deliberately trying to influence Russian domestic policy in order to promote its services among Russian citizens and officials, in order to undermine digital sovereignty”.

    According to reports, YouTube has already approached video producers asking to create suitable content and videos, and it is thought this content would be available exclusively on the site.

    The Safe Internet League is a non-commercial organization launched by several major internet providers and a Christian charity.

    The declared aim of the group is ridding the Internet of dangerous content through self-regulation in order to prevent government censorship.

    Russian Media Sources

    #ANS2014

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 21:00 on March 8, 2014 Permalink
    Tags: , , , Cut copy and paste, , , Google, , Share - Tweet - Comment - News and Views @AceNewsServices with #ANS2014, URL shortening,   

    Welcome Everyone to `Ace News Services ‘ Please Comment or Post to be Approved ‘ 


    #AceNewsServices says good evening from my UK home and to all my friends and readers of my news articles and posts, well just so you can write your news as it happens, and chat on the go.

    Ace Friends News

    ` Follow my news and views and post in the box’

    It is not just 140 characters and you can post a link to a video or promote your group, charity, idea or really anything.

    Anyone wanting to post a video best way is copy and paste the short URL from the YouTube site and post.

    Add your own tags and links and enjoy chatting to fellow bloggers.

    I ask for you to observe that we do not use it as a spam area, should this happen it will be closed to everyone and l will email those people ,to be the only users.

    Thank you Editor (Ace News Group) 

    Share – Tweet – Comment – News and Views @AceNewsServices with #ANS2014   

    Sites:
    Ace News Services 2014 – http://wp.me/165ui
    Ace History2Research News 2014 – http://wp.me/48Dp0
    Ace British History News 2014 – http://wp.me/3QKto
    Ace Sales & Services News 2014 – http://wp.me/2y0H0

    #ANS2014

    Ace Friends Share:

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 11:53 on March 1, 2014 Permalink
    Tags: , , constitutional-rights, Google, Innocence of Muslims,   

    ` Innocence of Muslims Video on anti-Islamic issues has been demanded back by Google ‘ 


    #AceWorldNews says that Google has urged a US appeals court to return an anti-Islamic video to YouTube, arguing that its removal damaged the website’s constitutional rights.

    The video, “Innocence of the Muslims,” surfaced in 2012 and provoked a wave of indignation and deadly violence in Muslim countries.

    The film was initially removed at the behest of one of the actresses in the film, who filed a lawsuit claiming she was tricked into appearing and was unaware of its anti-Muslim slant.

    She has since received death threats.

    #ANS2014

     
  • #AceNewsGroup 10:33 on March 1, 2014 Permalink
    Tags: , Adobe Systems, , Cupid Media, Fortune 500, Google, Information Technology, , ,   

    `Data Hacker’s steal `Three Hundred and Sixty Million Account Credentials’ now on `Black Market’ 


    #AceSecurityNews says one of the largest single personal data hack’s ever? 360 million stolen account credentials found on-line.

    Published time: March 01, 2014 01:31

     
    Reuters / Kacper PempelReuters / Kacper Pempel
    A cyber security firm has reported a “mind boggling” cache of stolen credentials which has been put up for sale on online black markets.
    A total of 360 million accounts were affected in a series of hacks, one of which seems to be the biggest in history.

    Alex Holden, chief information security officer of Hold Security LLC, said that the firm had uncovered the data over the past three weeks.

    He said that 360 million personal account records were obtained in separate attacks, but one single attack seems to have obtained some 105 million records which could make it the biggest single data breach to date, Reuters reports. “The sheer volume is overwhelming,” said Holden in a statement on Tuesday. 

    “These mind boggling figures are not meant to scare you and they are a product of multiple breaches which we are independently investigating. This is a call to action,” he added. 

    Hold Security said that as well as 360 million credentials, hackers were also selling 1.25 billion email addresses, which may be of interest to spammers. 

    The huge treasure trove of personal details includes user names, which are most often email addresses, and passwords, which in most cases are unencrypted. 

    Hold Security uncovered a similar breach in October last year, but the tens of millions of records had encrypted passwords, which made them much more difficult for hackers to use. 

    “In October 2013, Hold Security identified the biggest ever public disclosure of 153 million stolen credentials from Adobe Systems Inc. One month later we identified another large breach of 42 million credentials from Cupid Media,”
     Hold Security said in statement.

    AFP Photo / Justin SullivanAFP Photo / Justin Sullivan

    Holden said he believes that in many cases the latest theft has yet to be publically reported and that the companies that have been attacked are unaware of it. He added that he will notify the companies concerned as soon as his staff has identified them. 

    “We have staff working around the clock to identify the victims,”
     he said. 

    However, he did say that the email addresses in question are from major providers such as AOL Inc, Google Inc, Yahoo Inc, and Microsoft Corp, as well as “almost all” Fortune 500 companies and nonprofit organizations.

    Heather Bearfield, who runs cybersecurity for an accounting firm Marcum LLP, told Reuters that while she had no information about Hold Security’s findings, she believed that it was quite plausible as hackers can do more with stolen credentials than they can with stolen credit cards, as people often use the same login and password for many different accounts. 

    “They can get access to your actual bank account. That is huge. That is not necessarily recoverable funds,” she said. 

    The latest revelation by Hold Security comes just months after the US retailer Target announced that 110 million of their customers had their data stolen by hackers. Target and the credit and debit card companies concerned said that consumers do not bear much risk as funds are rapidly refunded in fraud losses.

    RT  

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 20:12 on February 25, 2014 Permalink
    Tags: , , , , Google, , IOS 6, , John Gruber, , ,   

    #NSA ” Too Close to Home – Please Update Your iPhone’s, iPad’s and Apple Computers’ NOW! 


    #AceSecurityNews says `Apple Security flaw could be a back-door for the #NSA

    "How We track Your Every Move"

    “How We track Your Every Move”

    Was the National Security Agency exploiting two just-discovered security flaws to hack into the iPhones and Apple computers of certain targets? Some skeptic’s are saying there is cause to be concerned about recent coincidences regarding the #NSA and Apple.

    Within hours of one another over the weekend, Apple acknowledged that it had discovered critical vulnerabilities in both its iOS and OSX operating systems that, if exploited correctly, would put thought-to-be-secure communications into the hands of skilled hackers.

    An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS, the company announced.

    Apple has since taken steps to supposedly patch up the flaw that affected mobile devices running its iOS operating system, such as iPhones, but has yet to unveil any fix for the OSX used by desktop and laptop computers.

    As experts investigated the issue through the weekend, though, many couldn’t help but consider the likelihood — no matter how modicum — that the United States’ secretive spy agency exploited those security flaws to conduct surveillance on targets.

    On Saturday, Apple enthusiast and blogger John Gruber noted on his personal website that information contained within internal NSA documents leaked by former intelligence contractor Edward Snowden last year coincide closely with the release of the affected mobile operating system, iOS 6.

    According to a NSA slideshow leaked by Mr. Snowden last June, the US government has since 2007 relied on a program named PRISM that enables the agency to collect data “directly from the servers” of Microsoft, Yahoo, Google, Facebook and others. The most recent addition to that list, however, was Apple, which the NSA said it was only able to exploit using PRISM since October 2012.

    "Tracking Your Every Move"

    “Tracking Your Every Move”

    The affected operating system — iOS 6.0 — was released days earlier on September 24, 2012.

    These facts, Gruber blogged, “prove nothing” and are “purely circumstantial.” Nevertheless, he wrote, “the shoe fits.”

    With the iOS vulnerability being blamed on a single line of erroneous code, Gruber considered a number of possibilities to explain how that happened.

    Conspiratorially, one could suppose the #NSA planted the bug, through an employee mole, perhaps. Innocuously, the Occam’s Razor explanation would be that this was an inadvertent error on the part of an Apple engineer,” he wrote.

    Once the bug was in place, the #NSA wouldn’t even have needed to find it by manually reading the source code. All they would need are automated tests using spoofed certificates that they run against each new release of every OS. Apple releases iOS, the #NSA’s automated spoofed certificate testing finds the vulnerability, and boom, Apple gets ‘added’ to PRISM.

    RT

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 20:25 on February 23, 2014 Permalink
    Tags: , , Google, Ray Kurzweil,   

    " Imagine a day that are `Social Media God's' think they know us better than Ourselves' 


    #AceNewsServices says that one day soon `Google will ‘know you better than your Intimate Partner’

    This was according to the recent post on RT and the fact that in 15 years’ time, computers will surpass their creators in intelligence, with an ability to tell stories and crack jokes, predicts a leading expert in artificial intelligence. Thus, Google will “know the answer to your question before you ask it.”

    The fact’s are plain the more we want this so-called `Social Freedom’ the greater chance, it is just around the corner, and we have not yet realised who ,pulls the strings.

    Ray Kurzweil

    Ray Kurzweil (Photo credit: Wikipedia)

    Most people would probably agree that computers are man-made technologies that function inside the strict boundaries of man-made borders. For technologists like Google engineering director Ray Kurzweil, however, the moment when computers liberate themselves from their masters will occur in our lifetime.

    We are being told daily that computers will make our lives better, even by 2016 , computers and robots will not only have surpassed their makers in terms of raw intelligence, they will understand us better than we understand ourselves, the futurist predicts with enthusiasm.

    Kurzweil, 66, is the closest thing to a pop star in the world of artificial intelligence, the place where self-proclaimed geek’s quietly lay the grid work for what could be truly described as a new world order.

    My research shows me that every time we broadcast a new invention, the people that would like one day for everyone to obey, are waiting with their ever open cheque-books to buy-up these next steps. That given the right environment they will create, will one day lead to the `Geek’s of Yesteryear’ becoming the controllers of our salvation.      

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 12:54 on February 8, 2014 Permalink
    Tags: , , , , Digital electronics, Free Software Foundation, Google, , Richard Stallman, , , Worlds Apart   

    ” One Man’s View of `Internet Surveillance’ and how it will Affect our Democracy” 


    #AceGuest News and Views says `Stallman: ‘We’ve got to limit Surveillance to keep Democracy’

    Published time: February 06, 2014 19:18

    Richard Stallman (screenshot from RT video)Richard Stallman (screenshot from RT video)
    We need to change a lot of things about digital technology so that they’re not surveillance engines. The idea is that human rights should be respected in digital activities as in non-digital life, software freedom activist Richard Stallman told RT.

    The world is witnessing a transition from non-digital life, in which people mostly have a lot of autonomy. However, people should also have human rights in their digital activities, the world-famous technologist and philosopher Richard Stallman said, interviewed by Oksana Boyko in RT’s Worlds Apart show. Stallman argues that though there are many exceptions in terms of human rights, they should be stopped in order to have effective democracy.

    “It simply means returning to users of computing the autonomy that they have in non-digital life. What we see happening is a transition from non-digital life, in which people mostly have a lot of autonomy … There are countries that don’t respect human rights, but we call that an injustice. The point is that you should have human rights in your digital activities as well,” Stallman said.

    “We need to change a lot of things about digital technology so that they’re not surveillance engines, but part of it is that we need to use software that the users control,” Stallman continued.

    Richard Stallman tries not to use mobile phones in personal communication, he says, but that doesn’t mean he’s advocating some pre-digital innocence. We’ve got to limit surveillance to keep democracy, he believes.

    AFP Photo / Paul J. RichardsAFP Photo / Paul J. Richards

     “When I say we should have portable phones with only free software in them, and that the system should be designed, under legal requirement, not to track anybody but court-ordered investigation subjects, that’s not saying go back to an innocent pre-digital world,” Richard Stallman told RT.

    “There are others who say using digital technology means total surveillance, just surrender to it. But since that surrender means no democracy anymore, because whistleblowers who tell us what the state is doing will be caught, and they have to flee to places like Russia in order not to be caught, that means it’s too much of a sacrifice. We’ve got to keep our democracy, and that means we’ve got to limit surveillance,” he added.

    Stallman is known for developing the concept that every computer program must be free for users to study and modify as they want.

    “Even those of us who are not programmers and won’t personally exercise the control, if the users control the program, and since most of the users don’t want to be spied on, each of us can count on the other users to make sure the program isn’t spying on us,” Stallman told RT.

    He admits that depending on others can’t guarantee perfect results, but compares it to non-free software, when users are dependent on the “tyrant”whose interest is to take advantage of them.

    “With non-free software, the decisions about that program are all made by somebody whose interest is to exploit the users and you can pretty well expect the decisions to be bad for the users, whereas when you’re depending on other users, you’ve got a pretty good chance it’s going to be more or less good,”Richard Stallman said.

    He added that the argument “Never try to get rid of a tyranny because you don’t know what’s going to happen, just accept the tyrant” is an utter fallacy, since this is particularly the thing that guarantees tyranny.

    “So, this doesn’t mean that every contributor is an angel. It does mean, however, that none of the contributors faces the same kind of temptation to abuse power that a proprietary developer faces, because none of them has that kind of power,” Richard Stallman said.

    The fact that various big companies like Google, Microsoft or Facebook were ready to cooperate with intelligence services is not surprising because they were money-driven, Stallman says. Nevertheless, it’s important to distinguish between governments spying on other governments, which is something that governments have done plenty of, and governments spying on all citizens.

    “That [governments spying on governments] is just what governments do to each other. For me, that’s not the scandal. The scandal is not spying on other governments and their activities, it’s spying on all the citizens. And of course there are countries that work together to spy on the citizens of these countries,”he told RT.

    “Thirty years ago we had phones, but they weren’t in general being monitored. There wasn’t a list of everybody’s phone calls, but now . And now the US government is collecting that all the time, and in Spain as well, with the help of the Spanish government. So, now we have to address that issue as well,”Stallman added.

    #AceGuestViews

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 21:42 on February 6, 2014 Permalink
    Tags: , , Google, , , , ,   

    “Francois Hollande would not accept `Tax Optimisation Strategies’ for Multinational Internet Giants like Google” 


    #AceWorldNews says President Francois Hollande said Thursday that France would not continue to accept the tax optimisation strategies used by multinational Internet giants like Google.

    “This is not acceptable,” he told journalists, adding that he would discuss making a “tax harmonisation effort” with US President Barack Obama when the two meet in Washington next week.
    His comments follow reports that France is seeking one billion euros ($1.36 billion) in tax from Google.

     
  • #AceNewsGroup 12:44 on February 5, 2014 Permalink
    Tags: , AdWords, Article 102 of the Treaty on the Functioning of the European Union, Commission, Competition law, Contract, , , , Google, Joaquín Almunia   

    #Google : `Anti-Trust Commission Obtains Comparable Display of Specialised Search Rivals’ 


    #AceNewsServices says `Antitrust: Commission obtains from Google comparable display of specialised search rivals’

    google-rankingsThe European Commission has obtained an improved commitments proposal from Google in the context of the ongoing antitrust investigation on on-line search and search advertising.

    In its proposal, Google has now accepted to guarantee that when it promotes its own specialised search services on its web page (e.g. for products, hotels, restaurants, etc.), the services of three rivals, selected through an objective method, will also be displayed in a way that is clearly visible to users and comparable to the way in which Google displays its own services (see also MEMO/14/87). This principle will apply not only for existing specialised search services, but also to changes in the presentation of those services and for future services.

    Commission Vice President in charge of competition policy, Joaquín Almunia, said: “My mission is to protect competition to the benefit of consumers, not competitors. I believe that the new proposal obtained from Google after long and difficult talks can now address the Commission’s concerns. Without preventing Google from improving its own services, it provides users with real choice between competing services presented in a comparable way; it is then up to them to choose the best alternative. This way, both Google and its rivals will be able and encouraged to innovate and improve their offerings. Turning this proposal into a legally binding obligation for Google would ensure that competitive conditions are both restored quickly and maintained over the next years.”

    PDF : Google had already made significant concessions regarding the other concerns raised by the Commission:

    • Google will give content providers an extensive opt-out from the use of their content in Google’s specialised search services if they so wish, without being penalised by Google.
    • Google will remove exclusivity requirements in its agreements with publishers for the provision of search advertisements; and
    • Google will remove restrictions on the ability for search advertising campaigns to be run on competing search advertising platforms.

    An important aspect of the proposal is that Google’s compliance with these commitments would be supervised by an independent monitoring trustee. The commitments would cover the European Economic Area (EEA) for 5 years.

    The Commission will in the coming period inform the complainants in this case of the reasons why it believes Google’s offer is capable of addressing the Commission’s concerns. The complainants will then have the opportunity to make their views known to the Commission before the Commission takes a final decision on whether to make Google’s commitments legally binding on Google.

    Background on the Commission’s concerns

    In March 2013, the Commission formally informed Google of its preliminary conclusion that the following four types of business practices by Google may violate EU antitrust rules prohibiting the abuse of a dominant position (Article 102 of the Treaty on the Functioning of the European UnionTFEU):

    (i) The prominent display, within Google’s web search results, of Google’s own specialised web search services as compared to competing specialised web search services (i.e. services allowing users to search for specific categories of information such as restaurants, hotels or products). First, users are not aware of the promotion of Google’s services within the search results. Second, competitors’ results that are potentially as relevant are significantly less visible and even sometimes not directly visible to users – they are more difficult for the user to find, for instance because the user has to scroll down the screen to see them or has to go to a subsequent search results web page. The Commission is concerned that this practice unduly diverts traffic away from Google’s competitors in specialised search towards Google’s own specialised search services, by reducing the ability of consumers to find a potentially more relevant choice of specialised search services.

    (ii) The use by Google without consent of original content from third-party web sites in its own specialised web search services.

    (iii) Agreements that oblige third party web sites (“publishers”) to obtain all or most of their online search advertisements from Google.

    (iv) Contractual restrictions on the transferability of online search advertising campaigns to rival search advertising platforms and the management of such campaigns across Google’s AdWords and rival search advertising platforms.

    The Commission considers that these practices can harm consumers by reducing choice and stifling innovation in the fields of specialised search services and online search advertising.

    Procedural background

    Article 102 of the Treaty on the Functioning of the European Union (TFEU) prohibits any abuse by one or more undertakings of a dominant position within the internal market or a substantial part of it in so far as it may affect trade between Member States. Article 54 of the EEA Agreement contains the same prohibition for the territory of the EEA Contracting Parties (Iceland, Liechtenstein and Norway).

    The Commission opened the investigation in November 2010 (see IP/10/1624). In the context of this investigation, the Commission is looking into 18 formal complaints against Google’s business practices.

    In March 2013 the Commission formally informed Google of its preliminary conclusions, raising four antitrust concerns. Google proposed a detailed text of commitments to address the four concerns on 3 April 2013. The Commission sought feedback from stakeholders on these commitments through a market test launched on 25 April 2013 (see IP/13/371). The Commission then informed Google that additional improvements to its commitments were required to adequately address the Commission’s concerns. Google offered changes to its commitments in October 2013 (see SPEECH/13/768). The Commission sought feedback on Google’s revised commitments from complainants and other relevant market participants and, after taking into account that feedback, informed Google that its proposal of October 2013 was not yet sufficient to fully address the Commission’s competition concerns. Google has now submitted a second improved offer.

    Article 9 of the EU’s Antitrust Regulation (Regulation 1/2003) allows the Commission to end antitrust proceedings by making commitments offered by a company legally binding. Such a decision does not conclude on whether EU antitrust rules have been infringed but legally binds the company to respect the commitments. If the company breaches these commitments, the Commission can impose a fine of up to 10% of its annual worldwide turnover, without having to find an infringement of the antitrust rules.

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 10:03 on February 4, 2014 Permalink
    Tags: , , , , Google, , , ,   

    #NSA: ” Obama Administration Announces Agreement with Facebook, LinkedIn, Yahoo, Google and Microsoft but Civil Rights Still Want More” 


    #AceSecurityNews says Facebook, Google, and others can unveil national security request details, but not until product is two years old. Thus urging `Civil Rights Groups’ to want more!

    Published time: February 03, 2014 23:02

    Reuters / Pawel KopczynskiReuters / Pawel Kopczynski
    Some of the most influential companies in Silicon Valley have unveiled data regarding the national security requests they have received from the US government, detailing how many requests they receive, how many the company responds to, and other details.

    The Obama administration announced Monday it had come to an agreement with Facebook, LinkedIn, Yahoo, Google, and Microsoft to allow the companies to disclose some details about the surveillance requests targeting their customers.

    Apple released its own transparency report last week.

    US Attorney General Eric Holder and Director of National Intelligence James Clapper said in a joint statement that the tech companies are now authorized to disclose the “number of national security orders and requests issued to communication providers, the number of customer accounts targeted under those orders and requests and the underlying legal authorities.”

    The companies have spent months fighting for such a deal after complaining that the National Security Agency dragnet exposed last year had hurt business.

    We filed our lawsuits because we believe that the public has a right to know about the volume and types of national security requests we receive,” the five companies said in a joint statement Monday. “We’re pleased the Department of Justice has agreed that we and other providers can disclose this information. While this is a very positive step we’ll continue to encourage Congress to take additional steps to address all of the reforms we believe are needed.”

    Civil liberties activists hold a rally against surveillance of US citizens on January 17, 2014. (AFP Photo / Nicholas Kamm)Civil liberties activists hold a rally against surveillance of US citizens on January 17, 2014. (AFP Photo / Nicholas Kamm)

    Reports indicate that, when the first of the Edward Snowden leaks were publicized in June, the White House was reluctant to make any deals with Silicon Valley. But with media pressure mounting and shifting polls proving that a sizable number of Americans are skeptical about the NSA surveillance, administration officials told Politico the time to negotiate had come.

    While this aggregate data was properly classified until today, the office of the Director of National Intelligence, in consultation with other departments and agencies, has determined that the public interest in disclosing this information now outweighs the national security concerns that require its classification,” stated Holder and Clapper.

    Facebook’s transparency report for the latter half of 2012 and the first six months of 2013 noted that only a “small fraction” of one percent of its users were the target of any surveillance requests.

    LinkedIn received “between 0 and 249” national security-related requests in the first six months of 2013. Over the same time period, Microsoft said it was sent under 1,000 national security letters pertaining to fewer than 1,000 accounts.

    However, the government still prohibits companies from disclosing surveillance details about a new product until two years after it was launched, a condition that has irked civil liberties advocates calling for wider change.

    Brad Smith, Microsoft’s general counsel and the company’s executive vice president for legal and corporate affairs, has said the government agreed to let the companies disclose requests “in bands of a thousand” and only six months after a request was made.

    Asking the public and policymakers to try to judge the appropriateness of the government’s surveillance practices based on a single, combined, rounded number is like asking a doctor to diagnose a patient’s shadow: only the grossest and most obvious problem, if even that, will be ever evident,” Kevin Bankston, policy director at the New America Foundation’s Open Technology Institute, told Politico.

    Enhanced by Zemanta
     
  • #AceNewsGroup 15:33 on February 2, 2014 Permalink
    Tags: , $3.2 billion, , Google, iPod, Nest Labs, Smoke detector, Tony Fadell, Yahoo Tech   

    ” When our Smart Appliances become to Smart for their Own Good” 


    #AceNewsServices says `Google Buys Nest — Maker Of The ‘Smart Thermostat’ — For $3.2 Billion to `Spy on your Live’s’

    This post was provided by Yahoo Tech on the 15 January following a `Press Release’  

    Jason O. Gilbert

    Jan 14, 2014
    OK, Google: Turn down the temperature in the living room, won’t you?

    On Monday afternoon, Google announced via press release that it had agreed to acquire Nest Labs, maker of a critically acclaimed “smart thermostat” and “smart smoke detector,” for $3.2 billion. The move gives Google ammo in a new battle over home electronics, being waged by several companies both large and small, to reinvent familiar gadgets within the home as smartphone-controlled, Internet-connected devices. (Read more about this fight here.)

    The Nest Learning Thermostat — Nest Labs’ first and most well-known product, released in 2011 — was widely praised for its beautiful design, intuitive interface and so-called “smart” features: Programmable via your smart phone, the Nest Learning Thermostat could educate itself about the temperatures you prefer at certain times of day; sense when you weren’t at home and shut itself off; and perform other functions designed to save you money and keep you comfortable.

    Nest followed up its 2011 “smart thermostat” with 2013’s Nest Protect, a “smart smoke detector” which can also be controlled via smart phone, which sends alerts to your phone, and which interacts with other Nest smoke detectors throughout the house.

    The CEO and Co-Founder of Nest Labs is Tony Fadell, a former Apple executive who is often referred to as the godfather of the iPod. Fadell is widely credited with bringing the simplicity of Apple design to an unloved appliance with both the Nest Learning Thermostat and Nest Protect.

    The $3.2 billion deal for Nest Labs represents a little over 5 percent of Google’s available cash-on-hand, and is the second-largest in Google’s history; only its $12.5 billion acquisition of Motorola came in higher. Nest will continue to operate as its own distinct brand after the close of the deal, Google said, which should come in the next few months, pending regulatory approval.

     

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 16:14 on January 20, 2014 Permalink
    Tags: , Adware, , , Google   

    Google kills off adware-injecting Chrome extensions 


    #AceSecurityAlert “Chrome Extensions Can Cause Adware” #adware

     
  • #AceNewsGroup 21:12 on January 16, 2014 Permalink
    Tags: , Anti-terrorism legislation, Cyberwarfare, , Father, Federal Security Service (Russia), , Google, Holy Spirit, HolySpirit, , Manila Times, Russian Orthodox Church, Target Corporation, Trinity, Trojan Horses,   

    Russia: “In the Name of the Father, Son and Holy Spirit Virus Hits Russian Computers” and Demands Money” 


    #AceSecurityNews says  that New draft anti-terrorism legislation grants the FSB greater access to information about users of popular websites such as Google and Facebook;

    The Federal Customs Service starts implementing tough new rules relating to parcel deliveries – much to the dismay of on-line shoppers; IT experts raise the alarm over a new virus that’s apparently on a mission from God – beginning its cyber attack by demanding money in the name of the Father, the Son and the Holy Spirit.

    Father,Son and Holy SpirtAccording to the latest news from the Manila Times and there post MOSCOW has added a spiritual dimension to the world of hacking, a new Trojan virus has emerged in Russia that locks computers and demands money for church repairs.

    Victims may feel the urge to pray if their computers are hit by the malware, which claims to be acting “in the name of the Father, the Son and the Holy Spirit.” More specifically, the Trojan-Dropper.Win32.Dapato.dggc virus claims to be moved by the last of the three aspects of the Trinity to lock up user’s files.

    Father,Son and Holy Spirit2Recovery is promised in return for a donation, which is allegedly to be spent on church restoration, the Kaspersky Lab antivirus company reported on its corporate blog.

    A similar trick is often employed in the non-virtual world by Russian beggars, who dress up as priests and pretend to collect money for church needs.

    The Russian-language Trojan is distributed as a .zip archive containing unspecified court documents allegedly intended for the user, Kaspersky Lab said on the blog on Monday.

    The hackers behind the spiritual computer sabotage have not been identified. The Russian Orthodox Church has not commented on the allegedly pious malware at the time of publication.

    Russia is undergoing an alleged religious revival, with numbers of believers – though not churchgoers – skyrocketing in recent years, according to polls.

    Separately, Russia outranked the United States, Germany, China and Poland for the number of cyber-attacks on computers in 2013, Kaspersky Lab reported in December. 

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 20:52 on January 14, 2014 Permalink
    Tags: , Boston Dynamics, DARPA, Google, Larry Page, , , Regina E. Dugan, , ,   

    #NSA #Darpa & #Google “Join Forces As Military Contractor” 


    #AceWorldNews says this post outlines the tie up between three parties, #NSA for Spying, #Darpa for the defence and research into robot’s as future warfare machine, where games become reality and #Google as the robotics provider and computerization techniques.

    Google has spent the last decade building databases on everything, including each and every computer-using American citizen. Now it intends to join forces with the United States Military to put all that info to good use. The giant “swooshing sound” you are hearing right now is the major leap forward of the Mark of the Beast.

    The DC: Google CEO Larry Page has rapidly positioned Google to become an indispensable U.S. military contractor. Google recently purchased Boston Dynamics, a robotics pioneer that produces amazing humanoid robots for the U.S. Defense Department.

    This development invites attention to Google’s broader military contracting ambitions — especially since Boston Dynamics is the eighth robotics company that Google has bought in the last six months.

    google-becomes-military-contractor-for-the-pentagon-war-machine

    Just like drones are the future of air warfare, humanoid robots and self-driving vehicles will be the future of ground warfare according to U.S. defense plans.

    There are many other reasons why the U.S. military is on path to become Google’s single largest customer. Likewise these reasons indicate Google has a closer working relationship with the NSA than it acknowledges publicly.

    First, consider the military value of Google’s research and development efforts and the military contracting pipeline revenue it could represent.

    Page created Google X, which is Google’s secretive research and development lab tasked with pursuing “moon-shot” technology breakthroughs. So far, Google X is best known for its earth-bound self-driving cars and Google Glass.

    Tellingly, the purpose of the original “moon-shots” by the Soviet Union and America was military. The two Cold War superpowers were in a “space race” to publicly showcase the technological and military supremacy of their rival ideologies.

    Simply, America’s Cold War “moon-shot” was about winning the military space and arms race with the former Soviet Union.

    Even more tellingly, the greatest application for almost all of Google X’s “moon-shot” technological efforts — are military. Like drones, self-driving vehicles, and robot soldiers could enhance military surveillance and payload delivery while reducing risks to military personnel.

    Google Glass’ advances in wearable augmented reality could offer American soldiers tactical advantages over enemy combatants. Google’s Project Loon could quickly provide a supplemental battlefield bandwidth advantage in remote areas.

    Second, Google’s personnel hiring signals its aspirations for a closer Google-military relationship

    English: This was the most up-to-date DARPA lo...

    English: This was the most up-to-date DARPA logo as of January 2009. It is obsolete now. (Photo credit: Wikipedia)

    In 2012, Google hired Regina Dugan, the head of DOD’s Defense Advanced Research Projects Agency (DARPA), DOD’s in-house “moon-shot” idea factory. At the time a Google spokesperson said: “Regina is a technical pioneer who brought the future of technology to the military during her time at DARPA.  She will be a real asset to Google.”

    Simply, few people could have a better insider knowledge of the U.S. military’s future technology needs that Google could exploit than Ms. Dugan.

    Third, Google has a long history of working for, and with, the NSA and the other U.S. intelligence services.

    In 2004, Google purchased satellite mapping company Keyhole, which was strategically important enough to be funded by the CIA’s investment fund In-Q-Tel. Google turned the aptly named “Keyhole” surveillance capability into the wildly popular Google Earth and Google Maps service used by over a billion people and over one million websites.

    In 2008, the San Francisco Chronicle reported that U.S. spy agencies use “Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence.” The article also reported that Google had a support contract with the NSA.

    In 2010, the Washington Post reported that Google worked with the NSA to figure out how Chinese hackers broke into Google. The New York Times later reported that those Chinese hackers stole Google’s entire password system called Gaia.

    Fourth, Google has too many unique capabilities and metadata sets that are of strategic value to the NSA to believe Google’s denials that it does not work closely with the NSA

    Snowden’s NSA revelations have underscored the high value the NSA puts on collecting the metadata of who is communicating with whom, when, where, and how much.

    Remember Google is metadata central. It is veritable surveillance catnip for the NSA Think about it. Google’s cookies track the Internet behavior of nearly 2 billion people. Over a billion people regularly use Google Search, Maps, Android, and YouTube. And about a half billion people use Gmail and Google + social media.

    Former NSA Director Michael Hayden has said “Gmail is the preferred Internet service provider of terrorists worldwide.”

    Thus Google has the unique capability to surveil for the NSA the online behavior of a targeted group of people by country, language, interests, keywords, names, communications, physical location, movements, time and more.

    Simply put, Google’s world’s largest computer already can do what the NSA wants to do most.

    Add to all this Google’s unique capability to instantaneously translate 80 different languages across applications, and why wouldn’t the NSA covet a close working relationship with Google?

    Finally, the behavior of America’s greatest military rivals, Russia and China, speaks volumes about the likely extent of unreported close cooperation between Google and NSA/DOD.

    Remember it was the U.S. Defense Advanced Research Projects Agency that invented the Internet in the early ‘70s. It is no coincidence that Russia and China have been the most hostile to allowing Google’s Internet dominance to extend into their countries.

    In summation, the accumulating evidence indicates that the U.S. military is on path to become Google’s single largest customer.

    Page’s strategic positioning of Google’s biggest investments to strongly align with future U.S. military needs are no coincidence. It is likely tacit confirmation of a much stronger relationship than Google has acknowledged to date.

    Page’s creeping militarization of Google will increasingly become problematic for the privacy of Google’s foreign users, which generate over half of Google’s revenues. While U.S. law purportedly prevents the #NSA from surveilling Americans without a warrant, the NSA’s official mandate is to surveil foreign signals intelligence.

    Scott Cleland is President of Precursor LLC, a consultancy serving Fortune 500 clients, some of which are Google competitors. He is also author of “Search & Destroy: Why You Can’t Trust Google Inc. Cleland has testified before both the Senate and House antitrust subcommittees on Google and also before the relevant House oversight subcommittee on Google’s privacy problems.

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 18:02 on January 13, 2014 Permalink
    Tags: , Airfare, Comparison-Tool, Google, Michael O'Leary, Ryanair, working   

    “Google Working on Airfare Comparison Tool” 


    Google Is Working On Airfare Price Comparison Tool That Will Blow Everyone Out Of That Water

    by Matthew Sparkes on Jan 13, 2014, 7:50 AM

    Advertisement

    Google is working on a new price comparison tool for airline travel which will “blow everyone else out of the water”, according to budget airline Ryanair.

    Speaking to Irish newspaper the Sunday Independent, airline boss Michael O’Leary said that he was helping Google with some “exciting developments” in airline ticket sales.

    The company has shared its pricing information with the company, which is developing a service that will display fares without bias and then direct customers to third party sites where they can buy tickets.

    "Google will say, ‘Here are the fares,’ then you click straight through to Ryanair or someone else. It blows everyone else out of the water," said O’Leary.

    "Because Google, being Google, want to show all of the prices from all of the airlines on display. They don’t want to charge us, they make all of their money out of advertising.

    "They don’t want to have a limited or biased search. They want to be able to say they’ve screened all of these airlines on all of the routes. They need to find who has got the lowest airfare on these routes… and that’s us," he said.

    O’Leary also said that Ryanair was working on incorporating more technology into its own services.

    "In five years’ time, everyone on Ryanair will be paying on their mobile. You’ll pay for your drinks and snacks with your mobile. You’ll upgrade to priority boarding on your mobile,” he said.

    This transmission is intended for the named addressee(s) only and may contain sensitive or protectively marked material up to RESTRICTED and should be handled accordingly. Unless you are the named addressee (or authorised to receive it for the addressee) you may not copy or use it, or disclose it to anyone else. If you have received this transmission in error please notify the sender immediately.

     
  • #AceNewsGroup 21:42 on January 12, 2014 Permalink
    Tags: , Ad's, Google, Photo's   

    ” Google Will Use Your Google+ Photo In Ad’s Starting Today Unless You Turn It Off” 


    #AceSecurityNews by Ryan Bushey on Jan 10, 2014, 9:55 AM

    After announcing a new update to their terms of service back in November, Google will start using your profile information in advertisements.

    This means that your profile name and photo could pop up in the form of recommendation regarding an app in the Google Play Store.

    Fortunately, there’s a way to opt out of it. Here’s how.

    Once you access your Google+ profile, click on Home. A drop down menu should appear. Go to settings.

    Google Shared Endorsements

    After that, you’ll see the Shared Endorsements option. Click on Edit.

    Google+ Settings

    Scroll all the way down to the bottom. Make sure that box is unchecked if you don’t want your info appearing in these ads. Google needs permission to do this.

    Google+ Shared Endorsements

    This transmission is intended for the named addressee(s) only and may contain sensitive or protectively marked material up to RESTRICTED and should be handled accordingly. Unless you are the named addressee (or authorised to receive it for the addressee) you may not copy or use it, or disclose it to anyone else. If you have received this transmission in error please notify the sender immediately.

     
  • #AceNewsGroup 12:45 on January 11, 2014 Permalink
    Tags: , , , Alfonso Cuarón, Cloud, Cloud computing, Google, , , NetFlix, Personal computer, , SAP AG, , VMware,   

    #AceGuestNews & Views: ” The Year Ahead – Beautiful Content Everywhere, Feeling the Love” 


    #AceNewsServices says l have a number of people that send me posts all year round and would like me to post their Guest Views some l have found not to our news groups ethos, but occasionally someone has thought it through and their views are worthy of print. These are their view’s and l thank them for their input.

    Their Thoughts and Feelings about 2013 and 2014:   

    More than anything 2014 is going to be a year of beauty, acceptance, and becoming more comfortable with the fact that we’re not alone. even in our own thoughts.

    In 2013 we saw:

    1.  The demise (more of a lowering of expectations) of 3D and movement to the next era of insanely brilliant moving image brilliance with 4K content and growing possibilities
    2. The death (realignment) of the PC, rise of everything mobile, constant connection
    3. The stimulated deterioration of long-term thinking being replaced by ultra short-term images/messages that are replaced in a nanosecond by newer/funer images/messages
    4. Business pressures demanding a more rapidly deployed and flexible infrastructure that could respond/react in minutes/hours rather than days/weeks economically. The Cloud
    5. The “horror” to discover that even our most innocuous utterances, activities were being followed by someone, somewhere but not enough to skip a beat or a keystroke

    The list at first blush may look like a very pessimistic view of our “progress” but actually the last two years have been a major seismic shift – forward – in becoming increasingly more comfortable with the speed of technology change/adoption. And it’s only getting better…faster.

    In 2014 we’ll see:

    1.  4K content production, delivery, enjoyment will increase more rapidly than many expect not just because people will buy UHD TV sets more quickly than anticipated but because more 4K content – new and old – will be appreciated and we’ll see a demand force the move more quickly than we did with  the shift from SD to HD. The change will also have a positive/negative effect on what we watch, when we watch it, where we watch it. OTT (over the top) quality streaming will enable more viewing options forcing the change of cable/satellite firms to become service providers, not gate keepers.
    The first developers of IBM PC computers negle...

    The first developers of IBM PC computers neglected audio capabilities (first IBM model, 1981). (Photo credit: Wikipedia)

    1. First appearing in 1977 the PC has had a good run and is being rapidly augmented – not replaced – by new tablets and smartphones. It’s estimated that more than a half billion of the desktop/notebook systems are in use today and the technology is on track to keep them fresh and relevant. The challenge (opportunity) for the industry is to offer a range of screen sizes for tablets and smartphones so they meet the uses of each consumer not broad theoretical “groups.” The 9-12 inch tablet will establish itself as the entertainment/work device of choice by Gen X, Gen Yers while the 3-7 inch phone/phablet will become the communications/entertainment device of choice for Gen Cers
  • The instant-on acceptance of TVs and appliances has raised the expectations of people in almost everything they see, hear, do. It is difficult to “find the time” to sit through something as exciting and breathtaking as Alfonso Cuarón’s Gravity without the addition of show Tweets and 3-minute YouTube views of outtakes and goofs. Fortunately the human computer – the mind – is upgrading itself to make multitasking easier to manage, control, live with…I hope
  • Image representing SAP as depicted in CrunchBase

    Image via CrunchBase

    1. The Cloud will experience a lot of upheaval in 2014 that will also have a mixed effect on the computer hardware/software industry. The industry will experience a lot of change this year as startups will be squeezed out or acquired by others and the herd will be thinned to the point where the dominant players will be Amazon, IBM, Google, Microsoft. This consolidation of horrendously big data centers will also place a lot of pressure on hardware producers like Dell and HP as well as software providers such as Oracle, SAP and VMware which will have a much smaller prospective customer base. The saving grace for these organizations will be the growing SMB (small to medium business) segment which is growing very nicely
  • While we all “knew” that businesses were spying on each other and tracking customer activities on the Internet and we “knew” governments were spying on each other, 2013 marked the turning point where we now “really knew” it. While we will continue to give lip service to transparency, the security industry will enjoy solid – but futile – growth in every area – consumer, business, public organizations. Globally governments, businesses, individuals will use all the tools they can develop/find to keep their friends close and their enemies even closer. The black hats/white hats will finally become grey hats
  • Image representing IBM as depicted in CrunchBase

    Image via CrunchBase

    Conclusion: 

    • Lower cost video capture solutions like Black Magic’s 4K $400 and $4,000 cameras combined with high-performance, low-cost video post production systems will reduce overall content production costs so studios, indies and businesses will deliver more eye-popping content more quickly
    • Standards organizations like SMPTE (Society of Motion Picture and Television Engineers) are already developing more efficient solutions for delivering (streaming) content rather than forcing native 4K content delivery. Rather than relying on pushing  more pixels through the already cramped pipe they will focus on more delivering higher frame rates, better bit rates and a broader color gamut more effectively with lower bandwidth requirements
    • While producing new 4K content is an expensive/time-consuming process, studios, content owners and firms like 4K Studios are finding they can mine their libraries of content, economically re-purpose/represent old movies/shows and find an eager market for the material
    • UHD TV set manufacturers are “stimulating” people to replace their “old” HD sets more quickly and are working directly with content owners to deliver material now rather than waiting for the cable gatekeepers to negotiate distribution
    • The perfect storm of new Xbox and PS4, growing array of versatile media players like Roku, Nuvola, NetFlix, Hulu and UltraFlix are giving consumers just the content they want – mixture of free/paid – helping legacy TV services to become less relevant
    • Today there are a half billion PCs in use and the sales growth has obviously slowed as mobile devices – tablets/smartphones – take more of the consumer’s budget. Still only about 230M + tablets will be sold this next year and more than 500M smartphones. Three players will continue to dominate the tablet market – Apple, Samsung, Amazon – and two will dominate the smart phone market – Apple and Samsung. The big struggle here will be in the OS arena – Android, iOS and Windows.  To be more in control of its own destiny you can expect to see Samsung move more of its mobile devices from Android to Baba in a slow, cautious fashion
    • Face it there are just too many cloud service companies in the pool and 25 percent of them will disappear this coming year either through acquisition or bankruptcy. The economy of scale plays too big of a roll for second tier service providers to make the heavy investment in infrastructure
    • Because C office folks see huge savings by buying into the cloud it also means less IT investment – servers, storage, software – which could reduce global IT spending to single-digit growth. It will also require a major focus shift from enterprise to SMB sales
    • I’m not quite certain why Snowdon’s “revelations” of the foul activities of the #NSA (National Security Agency) gets so much attention but it has certainly stimulated the security industry. People have put, gathering, grabbing big data on the Internet for years. Look in the mirror…you are big data. And there’s money to be made, things to be found in your data. It’s what people gave freely to get free stuff! It’s the financial motivation to mine that data that fuels Facebook’s/Google’s growth. It is just too tempting for governments, organizations not to tap into. It’s not that people didn’t know that spies, espionage, surveillance didn’t know it…it’s on the news and the storyline of every movie, TV show. Everyone is suddenly outraged even though he/she wants to know what the other is thinking/doing while protecting their thoughts/ideas/actions. Covering up my stuff while finding out dirt about the other guy is a big business, getting bigger. Just know everyone !

    <

    p style=”text-align:center;”>Is cheating, spying except you and me and…I’m not too sure about you.

    <

    p style=”text-align:left;”>Editor: Says if you have your own thoughts and feelings about 2013 or 2014 or anything really, just send me your details, by leaving a simple link to your site on the comments box, to a post or posts you would like to feature. Thank you.   

    Enhanced by Zemanta

 
  • #AceNewsGroup 16:47 on January 10, 2014 Permalink
    Tags: , , Google   

    Google just made it so strangers can email your Gmail account – here’s how to stop them 


    #AceNewsGroup:

    #AceNewsServices says follow the instructions on this site and switch of the latest Gmail changes – to stop strangers emailing you, without your permission #Privacy

    Like

    Originally posted on BGR:

    Google on Thursday unveiled a new Gmail feature – emailing Google+ users whose email address you actually don’t know. Moving forward, Gmail will suggest Google+ connections as recipients when a user composes a new email, without revealing the recipient’s email addresses to the sender until the recipient either replies to the email or follows the sender. While some Gmail users may welcome the feature, others may see it as a privacy threat… and of course Google has enabled it by default. Thankfully, there’s a way to prevent random Google+ strangers, companies or services that may abuse this feature from emailing you using solely your social network profile.

    View original 175 more words

     
  • #AceNewsGroup 16:35 on January 10, 2014 Permalink
    Tags: , , , Google,   


    #AceNewsServices says according to BI and Bloomberg they have reported that Google X, the cordoned-off branch of Google that’s spawned stuff like Google Glass and the driver-less car, is now meeting with the FDA to discuss medical devices.

    The whispered theory here is that there may be bio-sensors in Google Glass that will listen to your body and provide feedback to the device.

    The meeting included at least four Google workers, some of whom have connections with Google X — and have done research on sensors, including contact lenses that help wearers monitor their biological data. Google staff met with those at the Food and Drug Administration who regulate eye devices and diagnostics for heart conditions, according to the agency’s public calendar.

    More Soon ……………………………………………………………………………………………

     
  • #AceNewsGroup 14:05 on January 8, 2014 Permalink
    Tags: , DuckDuckGo, Google, Home page, , , , ,   

    #Tor: Hidden Service Protocol Making Searching the Web a Little More Secure #Privacy 


    #AceSecurityNews says as many of you know l have written a number of articles relating to the recent spying and back-door tactics used by both the US #NSA and the UK #GCHQ  agencies. These together with a number of service providers and hidden service protocols, have led to people searching the web to try to find alternative ways, to protect their #data from these prying eyes.

    Startpage

    I personally have experimented with a number of search machines one such is Startpage and another is “DuckDuckGo” but the Tor Network favours “Startpage” and the bare essentials in add on’s and with the use of  this “Hidden Service Protocol” you can search the web a little more securely. So l thought l would like to share the simple instructions for setting up this network with my readers. To those that already use these types of relays and onion routers, my apologies.

    English: Tor Logo

    English: Tor Logo (Photo credit: Wikipedia)

    Here are 6 easy steps to learning how “Tor Actual Works” please share and comment as usual and thanks for taking time to read this post. 

    Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor “rendezvous points,” other Tor users can connect to these hidden services, each without knowing the other’s network identity. This page describes the technical details of how this rendezvous protocol works. For a more direct how-to, see our configuring hidden services page.

    Step One: A hidden service needs to advertise its existence in the Tor network before clients will be able to contact it. Therefore, the service randomly picks some relays, builds circuits to them, and asks them to act as introduction points by telling them its public key. Note that in the following figures the green links are circuits rather than direct connections. By using a full Tor circuit, it’s hard for anyone to associate an introduction point with the hidden server’s IP address. While the introduction points and others are told the hidden service’s identity (public key), we don’t want them to learn about the hidden server’s location (IP address).

    Tor hidden service step one

    Step Two: The hidden service assembles a hidden service descriptor, containing its public key and a summary of each introduction point, and signs this descriptor with its private key. It uploads that descriptor to a distributed hash table. The descriptor will be found by clients requesting XYZ.onion where XYZ is a 16 character name derived from the service’s public key. After this step, the hidden service is set up.

    Although it might seem impractical to use an automatically generated service name, it serves an important goal: Everyone – including the introduction points, the distributed hash table directory, and of course the clients – can verify that they are talking to the right hidden service. See also Zooko’s conjecture that out of Decentralized, Secure, and Human-Meaningful, you can achieve at most two. Perhaps one day somebody will implement a Petname design for hidden service names?

    Tor hidden service step two

    Step Three: A client that wants to contact a hidden service needs to learn about its onion address first. After that, the client can initiate connection establishment by downloading the descriptor from the distributed hash table. If there is a descriptor for XYZ.onion (the hidden service could also be offline or have left long ago, or there could be a typo in the onion address), the client now knows the set of introduction points and the right public key to use. Around this time, the client also creates a circuit to another randomly picked relay and asks it to act as rendezvous point by telling it a one-time secret.

    Tor hidden service step three

    Step Four: When the descriptor is present and the rendezvous point is ready, the client assembles an introduce message (encrypted to the hidden service’s public key) including the address of the rendezvous point and the one-time secret. The client sends this message to one of the introduction points, requesting it be delivered to the hidden service. Again, communication takes place via a Tor circuit: nobody can relate sending the introduce message to the client’s IP address, so the client remains anonymous.

    Tor hidden service step four

    Step Five: The hidden service decrypts the client’s introduce message and finds the address of the rendezvous point and the one-time secret in it. The service creates a circuit to the rendezvous point and sends the one-time secret to it in a rendezvous message.

    At this point it is of special importance that the hidden service sticks to the same set of entry guards when creating new circuits. Otherwise an attacker could run his own relay and force a hidden service to create an arbitrary number of circuits in the hope that the corrupt relay is picked as entry node and he learns the hidden server’s IP address via timing analysis. This attack was described by Øverlier and Syverson in their paper titled Locating Hidden Servers.

    Tor hidden service step five

    In the last step, the rendezvous point notifies the client about successful connection establishment. After that, both client and hidden service can use their circuits to the rendezvous point for communicating with each other. The rendezvous point simply relays (end-to-end encrypted) messages from client to service and vice versa.

    One of the reasons for not using the introduction circuit for actual communication is that no single relay should appear to be responsible for a given hidden service. This is why the rendezvous point never learns about the hidden service’s identity.

    In general, the complete connection between client and hidden service consists of 6 relays: 3 of them were picked by the client with the third being the rendezvous point and the other 3 were picked by the hidden service.

    Tor hidden service step six

    There are more detailed descriptions about the hidden service protocol than this one. See the Tor design paper for an in-depth design description and the rendezvous specification for the message formats.

     

    Enhanced by Zemanta
     
  • #AceNewsGroup 15:11 on January 1, 2014 Permalink
    Tags: , Google, Monopoly,   

    Ballmer calls Google a ‘monopoly’ that should come under antitrust scrutiny 


    #AceNewsGroup:

    AceNewsServices says ” Just How Powerful Does Google Have To Become – Before the Anti-Trust Lobbyists Stop Being Afraid of Their Own Shadow” #googleantitrust

    Like

    Originally posted on BGR:

    Microsoft has been flushing money down the drain trying to make Bing a legitimate threat to Google over the years but outgoing CEO Steve Ballmer says there’s a very good reason for it: If Microsoft doesn’t try to compete with Google in the search realm then no one will. The Verge reports that Ballmer on Thursday lashed out at Google and called its dominance over the search market a monopoly that should face some kind of antitrust regulations.

    View original 131 more words

     
  • #AceNewsGroup 15:13 on December 7, 2013 Permalink
    Tags: , , Al Gore, , , Google, , Intellectual Ventures, PAE, Patent, Patent Assertion Entities, patent infringement, Patent Office, Patent troll, software patents, United States Patent and Trademark Office   

    ” Rise of the Patent Trolls” 


    #AceGuestNews says this was provided by a guest and colleague who sends items to us on a regular basis, and asks should we like to feature the post. So we are pleased to give him a platform to air his article across our network .Hope you enjoy and please comment. Thanks, Editor.

    “A Good Patent is Good, a Great Lawyer is Even Better”

    “It’s a dangerous business, going out your door. You step onto the road, and if you don’t keep your feet, there’s no telling where you might be swept off to.” – Bilbo, “The Lord of the Rings: The Fellowship of the Ring,” New Line Cinema, 2001

    A friend and his partners recently received the first of three patents after more than three years.

    Maybe in the next 12 months they’ll get the other two.

    It’s a great concept and I’d tell you more but then I’d have to ….

    Patents are vital to keep innovation and competition moving forward.

    If you didn’t have some protection – personal and/or company – why pour all the brainpower, time, effort, money into an idea just to have someone rip you off?

    We get it!

    When companies get strapped for money, they often sell their patents to other companies.

    Kodak sold about thousand of their patents to a pool formed by Google, Facebook, Samsung and Apple for $527M.

    Oh, also in on the deal were Intellectual ventures and RPX (remember these names).

    Patents have always been used and abused as protection and clubs.

    Software Patents

    But things went wild when folks started getting software patents in the early ‘60s.

    In the late ‘90s things took off.

    Folks were getting patents for any concept or “what if” idea they could articulate in the filing – usually so broad you could drive a semi through sideways.

    As Elrond commented, “I was there the day the strength of Men failed.”

    Obviously, the Patent and Trademark Office (PTO) didn’t have a clue about software (few normal people do!) so they signed off on almost anything.

    While Al Gore said, “I took the initiative in creating the Internet,” he didn’t claim (as is widely asserted) he invented it and he didn’t try to patent it.

    Tim Bernes-Lee is widely credited with inventing the Web, but a firm called Eolas owned a patent covering the “interactive Web.”

    Eolas took millions from companies with the patent that was later invalidated.

    Patents like that never should have been filed or granted because of prior art (evidence the key concepts were widely known before folks even filed).

    The flow of vague patents created a new and very profitable ying/yang industry – patent licensing firms and patent assertion entities (PAEs).

    Trolls Emerge

    The latter are more commonly known by their less attractive name, patent trolls.

    As Gimli said, “Never trust an Elf!”

    Trolling – People who manage patents or have purchased tons of software patents may not necessarily be Patent Assertion Entities (PAEs) or more commonly known as patent trolls. However, if they spend most of their time sending out threat letters, being abusive on the phone (especially with a Texas drawl) then look out.

    PAEs/trolls span the spectrum:

    -        Legal shell companies that shotgun letters to businesses claiming infringement, demanding payment

    -        Firms like Intellectual Ventures (remember the Kodak patent sale) which buy technology patents, assemble large portfolios and generate licensing  payments that run into the millions of dollars

    -        Firms that license patents on behalf of others, hammering out reasonable agreements like talent agents

    According to Eugene R. Quinn Jr., patent attorney with Zeis Widerman & Malek and founder of IP-Watchdog, the best business to be in is being a patent troll. The number of suits have doubled in recent years to 4,73l cases in 2012 from 2,304 in 2009 and the cost – to the firms and consumers who must ultimately pay the costs – has been tremendous.

    Filing Growth – While even PAE lawsuits were down during the past recession, they recovered rapidly–faster than the national economy. But instead of quietly settling, a growing number of firms are joining forces to fight the frivolous suits.

    The annual payouts for PAE lawsuits were estimated to be $29B in 2011. Only a fraction ($6B) went to the actual inventors.

    The rest?

    Well yeah!! Lawyers and troll expenses including overhead, marketing, profits.

    Most of the time, trolls go after small to medium-size businesses like in 2011, when a troll firm targeted coffee shops for setting up Wi-Fi networks for customers, “suggesting” they pay a licensing fee of $5-$20,000 (far less than going to court).

    Proving Innocence

    Hey, you’re guilty until you prove yourself innocent!!

    Big Targets – PAEs with questionable software patents are not afraid of taking on industry giants, especially when the patents are so ambiguous about possibly have a touch of validity. In addition, if their claims are “small” enough — $10,000 to $50,000, many organizations justify the payments as being less than the cost of a long trial with judges and juries ill-equipped to address the issues.

    Of course, they are equal opportunity suers, litigators.

    After all, trolls can’t be sued for patent infringement because they don’t make anything … just lawsuits.

    The PAEs usually have a complex shell company structure that is almost impossible to penetrate so it’s hard to figure out who’s doing what and where the money goes.

    Apple is not only more popular than Coke, they (and unfortunately, their partners) are also popular with the trolls.

    IPNav, for example – an ultra active PAE, has sued more than 1,600 companies in the United States.

    Bilbo saw what IPNav had done and said, “Gracious, you have been productive.”

    “Aggressive” – Some of the most aggressive PAEs are firms that if you’re fortunate you’ve never heard of – and we hope you never do. The software patents issued in the early ‘90s were so vague that they could cover web sites, the Internet and almost anything. The key for successful litigation is to find a friendly or unscrupulous judge and sue away.

    The overachiever has lawsuits pending with almost everyone in the industry including, Google, Hitachi and Adobe.

    Howdy Pardner

    Or take lowly little Lodsys that bought a patent in 2011 and went after iPhone app developers. Lodsys has sued about 200 end-users as well as developers and claims 500 firms have paid for its vague patents.

    And Lodsys has a sweet deal down there in Marshall, Tx.

    They can’t get US District Judge Leonard Davis since his son “Bo” Davis is Lodsys’ lawyer so the cases get redirected to the other Judge in the East Texas town … Gilstrap.

    Those Californicator lawyers are not going to ’ slip anything past this boy!!!

    Today, the Patent Office does a much better job of insisting software-patent applicants be specific.

    However, between 500,000 and a million software patents have been granted – some valid, some questionable.

    The legal system provides incentives’ for firms to pay the trolls to go away rather than prove the patents invalid.

    Fighting Back

    Increasingly though, firms like Rackspace, Martha Stewart, Apple, many more (large and small) are returning fire.

    The FTC (Federal Trade Commission) is taking a closer look at PAEs that spend most of their time in court, i.e., if they accounted for more than 60 percent of the 4,000 patent lawsuits filed in last year.

    Bilbo explained the FTC’s objectives, “I don’t know half of you half as well as I should like, and I like less than half of you half as well as you deserve.”

    Highly successful patent trolls, Intellectual Ventures, insists their business model actually helps inventors and many of their clients who have received payments agree.

    Adam Mossoff, law professor at George Mason University, says the PAEs are licensing firms practicing their property rights and their purpose isn’t to file lawsuits but license patents.

    But even if someone can straighten out the U.S. patent system, there are new issues on the horizon because The EU is working on a unified patent court system.

    Firms like Google, Apple, Microsoft and hordes of others that have spent millions defending themselves, have nightmares that Europe could become a similar battleground.

    Kevin Mooney, British patent lawyer and chairman of the EU court system drafting committee, doesn’t see a major problem, “It would be nonsense if we allowed one court, Romania perhaps, to become the Eastern District of Texas.”

    Thanks to Gilstrap; Marshal, Tx is known worldwide!!!!

    End ‘Em All

    Of course, there’s the other extreme that want to put an end to software patents. That’s tough to do because software, good software, does so much for us that the innovation and developer have to be protected/compensated.

    As Boromir said, “I ask only for the strength to defend my people!”

    With software there’s black, white and a thousand shades of grey.

    If you get slapped with a suit – any large/small firm can – experts say to fight back, get support from others that have been targeted.

    Oh yeah…stay outta’ Marshall, Texas!

     

     
  • #AceNewsGroup 15:26 on December 4, 2013 Permalink
    Tags: , , Google, , NORAD, NORAD Tracks Santa, , Santa, Santa Claus   

    “Tracking Santa The Norad Way For Sixty Three Years” 


    English: NORAD Tracks Santa logo.

    English: NORAD Tracks Santa logo. (Photo credit: Wikipedia)

    #AceChristmasNews says it is 63 years ago since, the North American Aerospace Defense Command has tracked Santa Claus on Christmas Eve, as he makes his way around the world delivering gifts to all the good boys and girls.

    In 2012 the tradition continued, and showed even more ways that you and your little ones can follow Father Christmas‘ progress. A stunning 25 million people from around the globe are predicted to follow Santa in real-time on-line, on mobile phones and tablets, by email and phone.

    What makes the program so special is that more than 1,250 Canadian and American uniformed personnel and Defense-Department civilians volunteer their time on Christmas Eve to answer thousands of phone calls and emails. What’s more, organizations such as Microsoft, Analytical Graphics Inc., Verizon, Vision-box and over 50 others support NORAD.

    Interestingly, the popular tradition actually began by mistake, as Capt. Jeff Davis, director of NORAD and the U.S. Northern Command Public Affairs, recently revealed in a guest post on Microsoft’s official blog:

    t’s hard to believe it all started with a typo. A program renowned the world over — one that brings in thousands of volunteers, prominent figures such as the First Lady of the United States, and one that has gone on for more than five decades — all started as a misprint.

    That error ran in a local Colorado Springs newspaper back in 1955 after a local department store printed an advertisement with an incorrect phone number that children could use to ‘call Santa.’ Except that someone goofed. Or someone mistook a three for an eight. Maybe elves broke into the newspaper and changed the number. We’ll never know.

    Official seal of the North American Aerospace ...

    Official seal of the North American Aerospace Defense Command. Note that the oceans’ colour is supposed to be “turquoise” http://www.norad.mil/about_us/heraldry.htm but has consistently been rendered, in recent years, as frankly greenish. Older memorabilia uses a bluer colour, ranging up to light blue. (Photo credit: Wikipedia)

    But somehow, the number in the advertisement changed, and instead of reaching the ‘Santa’ on call for the local department store, it rang at the desk of the Crew Commander on duty at the Continental Air Defense Command Operations Center, the organization that would one day become the North American Aerospace Defense Command, or ‘NORAD.’

    And when the commander on duty, Col. Harry Shoup, first picked up the phone and heard kids asking for Santa, he could have told them they had a wrong number.

    But he didn’t, instead, the kind-hearted colonel asked his crew to play along and find Santa’s location. Just like that, NORAD was in the Santa-tracking business.

    2012 Improvements Are Made:

    Santa is already on his way across the globe delivering presents to the boys and girls on his Nice List. The 2012 NORAD Santa Tracker is currently tracking good ol’ Saint Nick as he makes  his way across the world to deliver presents on Christmas.

    You can watch a live video of Santa’s journey below thanks to Norad’s hightech Santa Tracker, but you can also interact with the Santa tracking team via Facebook and Twitter. NORAD will be posting a constant stream of updates via social media sites today.

    If you want to talk to the team first hand, you can even give NORAD a call.

    Santa’s navigation team can be reached at 877-HI-NORAD (877-446-6723). They’ll be able to give you Santa’s current location and may even be able to tell you when to expect your  presents.

    2013 Technology Steps Up:

    For the second straight year, Microsoft has partnered with the North American Aerospace Defense Command (NORAD) to monitor Santa’s progress around the globe. Microsoft redid the site this year, however, to allow excited children armed with Surface tablets to spin an interactive Claymation-styled globe around (beginning Dec. 24) and pinpoint when the jolly old elf will arrive in their neighborhood.

    The site, now live, offers several holiday-themed games (unlocked using an Advent calendar motif), holiday videos, and music. There’s also “secret Santa” files that talk about the tracker’s history, which began when an advertisement offering to help kids track Santas accidentally published the phone number of CONAD, NORAD’s predecessor. The Director of Operations when, Colonel Harry Shoup, had his staff check the radar for indications of Santa making his way south from the North Pole, according to NORAD.

    Years later, Google provided the first “data” that established the Santa Tracker Web site.(For the record, NORAD says its joint radar and satellite tracking system, together with a network of “Santa-Cams” and U.S. and Canadian jet fighters, provide up-to-the-minute alerts on Santa’s progress.) But two years ago, Google and NORAD parted ways, for unexplained reasons, and went with Microsoft instead.. Last year, Google’s revamped Santa tracker offered an opportunity to chat with Santa, download an Android app, and track him via Google+.

    NORAD Santa Tracker’s Santa VillageNORADSANTA.ORG

    The Santa Village hides videos and games.

    For Microsoft, it’s another opportunity to show off how sites designed for Internet Explorer and touch can mimic the apps that its platforms have unfortunately lacked. Microsoft has archived other, similar sites at its ”Reimagine the Web” site. Bing Maps will track Santa this year.

    It looks like Google will be directly competing with NORAD this year, however.

    “On Christmas Eve we’ll be proudly showcasing a preview of Santa’s dashboard—the technology that powers his sleigh during his around-the-world journey,” Google says. “We have received this special preview from one of Santa’s many developer elves, who are hard at work in the North Pole helping Santa prepare for his big day. Santa’s dashboard—featuring the latest and greatest in Google Maps technology and sleigh engineering—will allow you to follow his progress around the world, and also learn a little about some of his stops along the way.”

    Don’t worry, though. As Stefan Weitz, Bing’s general manager, tweeted last month (as noted by Search Engine Land) Microsoft and Google have teamed up to avoid placing Santa in different locations throughout Christmas Eve night.

    NORAD OFFICIAL SITE:

     
  • #AceNewsGroup 16:14 on November 25, 2013 Permalink
    Tags: , 23andme, Google, ,   

    DNA Testing Startup 23andMe Hits A Snag As FDA Shuts Down Sales Of Home Testing Kit 


    #AceNewsGroup:

    #AceHealthNews says that 23andme in mire as US-FDA prevents use of “Home Testing Kits even after Google poured 23 million into project #healthcare
    QUOTE: Part of 23andMe’s mission is to help people assess their risk and the risk of their offspring for genetic, inheritable diseases and conditions, and that’s what the FDA has apparently taken issue with!

    Like

    Originally posted on TechCrunch:

    The U.S. Food and Drug Administration has ordered 23andMe, the genomic startup co-founded by Anne Wojcicki, Linda Avey and Paul Cusenza in 2006, to stop selling its at-home DNA testing kits as of November 22. As Bloomberg reports, a letter from the FDA sent to the company made public today classifies the kit as a medical device and outlines that it required regulatory approval before being sold.

    Part of 23andMe’s mission is to help people assess their risk and the risk of their offspring for genetic, inheritable diseases and conditions, and that’s what the FDA has apparently taken issue with. Determining medical risk classifies the kit as a medical device, the organization says, even if that’s not the sole use 23andMe’s service (many get tested simply out of curiosity, or to help support ongoing research initiatives). 23andMe’s database of 400,000 total individuals is a veritable treasure trove of info for…

    View original 318 more words

     
  • #AceNewsGroup 20:41 on October 3, 2013 Permalink
    Tags: , , , Google, OCR,   

    Can Optical Character Recognition Software – Provide Answer to Security with Emails 


    Just months after Edward Snowden controversially lifted the lid on digital surveillance being conducted by the U.S. and other governments, the issue of on-line privacy is back in the spotlight.
    Earlier this month Facebook CEO Mark Zuckerberg expressed concern that users’ trust in internet companies had been damaged by the revelations. Google’s Eric Schmidt also called for greater transparency from the U.S. government over surveillance.
    Sang Mun’s response was more direct — the Korean designer has created four new fonts called ZXX that aim to disrupt the Optical Character Recognition (OCR) systems used by Google and others to analyze text.http://edition.cnn.com/2013/09/30/tech/web/nsa-contractor-surveillance-proof-font/

     
  • #AceNewsGroup 19:52 on September 14, 2013 Permalink
    Tags: , ConsumerWatchdog, Google, Street-View,   


    SANTA MONICA, CA – A federal appeals court ruled a few days ago that Google’s interception of messages from private Wi-Fi networks is not exempt from federal wire-tap laws, opening the way for a class action suit in the Wi-Spy case to move forward with possible damages amounting to billions of dollars.

    A three-judge panel for the U.S. Court of Appeals for Ninth Circuit Court upheld the decision of Judge James Ware, who refused Google’s motion to dismiss the suit when he denied Google’s claim that their activities were exempt from the wiretap law because data transmitted over a Wi-Fi network is a “radio communication” and is “readily accessible to the public.”

    Google’s Street View Cars not only were photographing the roads they travelled around the world, but were also collecting “payload” data – including emails, documents, photos, passwords, and other private information — transmitted over Wi-Fi networks as the cars drove by.

    http://www.consumerwatchdog.org/newsrelease/us-appeals-court-rules-google-not-exempt-wiretap-law-wi-spy-suit

     
  • #AceNewsGroup 22:05 on July 7, 2013 Permalink
    Tags: , Google, , , internet surveillance, , , , , , ,   

    No PRISM. No Surveillance. No Government Back Doors. You Have our Word on it. 


    Giant US government Internet spying scandal revealed

     

    Ixquick

    Ixquick (Photo credit: Wikipedia)

     

     

     

    The Washington Post and The Guardian have revealed a US government mass Internet surveillance program code-named “PRISM”. They report that the NSA and the FBI have tapped directly into the servers of nine US service providers, including Facebook, Microsoft, Google, Apple, Yahoo, YouTube, AOL and Skype, and began this surveillance program at least seven years ago. (clarifying slides)

     

    These revelations are shaking up an international debate.

     

    StartPage has always been very outspoken when it comes to protecting people’s Privacy and civil liberties. So it won’t surprise you that we are a strong opponent of overreaching, unaccountable spy programs like PRISM. In the past, even government surveillance programs that were begun with good intentions have become tools for abuse, such as tracking civil rights and anti-war protesters.

     

    Programs like PRISM undermine our Privacy, disrupt faith in governments, and are a danger to the free Internet.

     

    StartPage and its sister search engine Ixquick have in their 14-year history never provided a single byte of user data to the US government, or any other government or agency. Not under PRISM, nor under any other program in the US, nor under any program anywhere in the world.

     

    Here’s how we are different:

     

    • StartPage does not store any user data. We make this perfectly clear to everyone, including any governmental agencies. We do not record the IP addresses of our users and we don’t use tracking cookies, so there is literally no data about you on our servers to access. Since we don’t even know who our customers are, we can’t share anything with Big Brother. In fact, we’ve never gotten even a single request from a governmental authority to supply user data in the fourteen years we’ve been in business.
    • StartPage uses encryption (HTTPS) by default. Encryption prevents snooping. Your searches are encrypted, so others can’t “tap” the Internet connection to snoop what you’re searching for. This combination of not storing data together with using strong encryption for the connections is key in protecting your Privacy.
    • Our company is based in The Netherlands, Europe. US jurisdiction does not apply to us, at least not directly. Any request or demand from ANY government (including the US) to deliver user data, will be thoroughly checked by our lawyers, and we will not comply unless the law which actually applies to us would undeniably require it from us. And even in that hypothetical situation, we refer to our first point; we don’t even have any user data to give. We will never cooperate with voluntary spying programs like PRISM.
    • StartPage cannot be forced to start spying. Given the strong protection of the Right to Privacy in Europe, European governments cannot just start forcing service providers like us to implement a blanket spying program on their users. And if that ever changed, we would fight this to the end.

     

    Privacy. It’s not just our policy, it’s our mission.

     

    Sincerely,

    Robert E.G. Beens
    CEO StartPage.com and Ixquick.com

     

     

     
  • #AceNewsGroup 12:33 on June 11, 2013 Permalink
    Tags: , , , Google, , , , , , , , Skpe, , , , Washigton-Post, ,   

    Giant US government Internet spying scandal revealed! 


    The Washington Post and The Guardian have revealed a US government mass Internet surveillance program code-named “PRISM”. They report that the NSA and the FBI have been tapping directly into the servers of nine US service providers, including Facebook, Microsoft, Google, Apple, Yahoo, YouTube, AOL and Skype, and began this surveillance program at least seven years ago. (Imageclarifying slides)

     

    These revelations are shaking up an international debate.

     

    Start Page has always been very outspoken when it comes to protecting people’s privacy and civil liberties. So it won’t surprise you that we are a strong opponent of overreaching, unaccountable spy programs like PRISM. In the past, even government surveillance programs that were begun with good intentions have become tools for abuse, for example tracking civil rights and anti-war protesters.

     

    Programs like PRISM undermine our Privacy, disrupt faith in governments, and are a danger to the free Internet.

     

    StartPage and its sister search engine Ixquick have in their 14-year history never provided a single byte of user data to the US government, or any other government or agency. Not under PRISM, nor under any other program in the US, nor under any program anywhere in the world. We are not like Yahoo, Facebook, Google, Apple, Skype, or the other US companies who got caught up in the web of PRISM surveillance.

     

    Here’s how we are different:

     

    • StartPage does not store any user data. We make this perfectly clear to everyone, including any governmental agencies. We do not record the IP addresses of our users and we don’t use tracking cookies, so there is literally no data about you on our servers to access. Since we don’t even know who our customers are, we can’t share anything with Big Brother. In fact, we’ve never gotten even a single request from a governmental authority to supply user data in the fourteen years we’ve been in business.

    • StartPage uses encryption (HTTPS) by default. Encryption prevents snooping. Your searches are encrypted, so others can’t “tap” the Internet connection to snoop what you’re searching for. This combination of not storing data together with using strong encryption for the connections is key in protecting your Privacy.

    • Our company is based in The Netherlands, Europe. US jurisdiction does not apply to us, at least not directly. Any request or demand from ANY government (including the US) to deliver user data, will be thoroughly checked by our lawyers, and we will not comply unless the law which actually applies to us would undeniably require it from us. And even in that hypothetical situation, we refer to our first point; we don’t even have any user data to give. We will never cooperate with voluntary spying programs like PRISM.

    • StartPage cannot be forced to start spying. Given the strong protection of the Right to Privacy in Europe , European governments cannot just start forcing service providers like us to implement a blanket spying program on their users. And if that ever changed, we would fight this to the end.

     

    Privacy.

     

    It’s not just our policy – it’s our business.
    ~~~~~~~~~~~~~~~

    Courtesy of

    Robert E.G. Beens
    CEO StartPage.com and Ixquick.com

     
    • click the next internet page 20:13 on June 22, 2013 Permalink | Reply

      Your means of explaining all in this article is genuinely good, all be able to
      without difficulty understand it, Thanks a lot.

      Like

    • raspberry ketone burn 18:13 on June 21, 2013 Permalink | Reply

      Wonderful, what a web site it is! This web site gives valuable data to us, keep
      it up.

      Like

    • projects 14:57 on June 17, 2013 Permalink | Reply

      I will be fairly certain We have check this out exact same sort of declaration somewhere else, it should be gaining interest while using world. projects.

      Like

  • #AceNewsGroup 11:55 on June 3, 2013 Permalink
    Tags: , , Google, , NSL   

    Judge orders Google to comply with FBI’s secret NSL demands | Politics and Law – CNET News 


    A federal judge has ruled that Google must comply with the FBI’s warrantless requests for confidential user data, despite the search company’s arguments that the secret demands are illegal.

    CNET has learned that U.S. District Judge Susan Illston in San Francisco rejected Google’s request to modify or throw out 19 so-called National Security Letters, a warrantless electronic data-gathering technique used by the FBI that does not need a judge’s approval. Her ruling came after a pair of top FBI officials, including an assistant director, submitted classified affidavits.

    The litigation taking place behind closed doors in Illston’s courtroom — a closed-to-the-public hearing was held on May 10 — could set new ground rules curbing the FBI’s warrantless access to information that Internet and other companies hold on behalf of their users. The FBI issued 192,499 of the demands from 2003 to 2006, and 97 percent of NSLs include a mandatory gag order.

    via Judge orders Google to comply with FBI’s secret NSL demands | Politics and Law – CNET News.

     
    • chwilówka przez internet 14:28 on June 22, 2013 Permalink | Reply

      It’s awesome to go to see this site and reading the views of all mates concerning this paragraph, while I am also eager of getting knowledge.

      Like

    • Automaty Do Gry Hazardowej Za Darmo 10:26 on June 21, 2013 Permalink | Reply

      Hey there! I could have sworn I’ve been to this website before but after reading through some of the post I realized it’s new to me.
      Anyways, I’m definitely happy I found it and I’ll be bookmarking
      and checking back often!

      Like

    • Automaty Hazardowe Download Za Darmo 06:19 on June 21, 2013 Permalink | Reply

      Great post. I was checking constantly this blog and I’m impressed! Extremely useful information specially the last part :) I care for such information a lot. I was seeking this certain info for a long time. Thank you and best of luck.

      Like

    • Automaty Hazardowe Przez Internet Za Darmo 01:04 on June 21, 2013 Permalink | Reply

      Hey there I am so thrilled I found your blog, I really found you by accident,while I was searching on Google for something else, Regardless I am here now and would just like to say thanks for a incredible post and a all round, entertaining blog (I also love the theme/design), I don’t have time to look over it all at the moment but I have bookmarked it and also included your RSS feeds, so when I have time I will be back to read a great deal more,

      Please do keep up the awesome work.

      Like

    • plytki lazienkowe 00:09 on June 21, 2013 Permalink | Reply

      Hello, i think that i saw you visited my site thus i came to “return the favor”.
      I am trying to find things to enhance my site!I suppose its
      ok to use a few of your ideas!!

      Like

    • sizzling hot deluxe 23:21 on June 20, 2013 Permalink | Reply

      My developer is trying to persuade me to move to net from PHP. I have always disliked the idea because of the costs. But he’s trying none the less. I’ve been using Movable-type on several websites for about a year and am worried about switching, to another platform. I have heard excellent things about blog engine.net. Is there a way I can import all my WordPress posts into it?

      Any kind of help would be greatly appreciated!

      Like

      • acefinance 17:22 on June 23, 2013 Permalink | Reply

        Hello Roderick,

        Just visited your site at http://www.atcbox.com and thought it looked pretty good, but l personally will eventually build my own site using WordPress.Org as l would like to control the plugins and of course using php, depends if you intend a change of direction! You can always email me at bloggeradmin@aceworldwideservices.com for more and l will consultant with our website designer and offer advice! Also can show you some of his sites to get an idea?

        Let me know,

        Regards, Ian {Editor}

        Like

      • acefinance 21:08 on July 1, 2013 Permalink | Reply

        Hi Roderick, Hope that is your name left comment on my site and asked if l knew anything about various platforms ,such as Movable-type! I took a look at your site and it look great, so if you consider a change, keep the one going you have and practice with WordPress.org and build your own site, with you developers help and guidance! You can email me any time at wordpress@aceworldwideservices.com

        Regards, Ian [Editor} Ace News Group

        Like

    • Automaty Do Gier Hazardowe Za Darmo 07:54 on June 20, 2013 Permalink | Reply

      A fascinating discussion is definitely worth comment.
      I do believe that you need to publish more on this subject, it may not be a taboo matter but generally people don’t discuss these issues. To the next!
      Kind regards!!

      Like

    • Video Automaty Hazardowe Gra Za Darmo 00:48 on June 20, 2013 Permalink | Reply

      Nice blog! Is your theme custom made or did you download it from somewhere?
      A theme like yours with a few simple adjustments would really make my blog shine. Please let me know where you got your design. Bless you.

      Like

    • Automaty Hazardowe Za Darmo 20:42 on June 19, 2013 Permalink | Reply

      There is certainly a lot to learn about this issue. I love all
      the points you’ve made.

      Like

    • pożyczka bez bik 14:08 on June 19, 2013 Permalink | Reply

      I blog frequently and I genuinely appreciate your information.
      This article has really peaked my interest. I will book mark
      your site and keep checking for new details about once per
      week. I opted in for your RSS feed too.

      Like

    • najlepsza agencja reklamowa w gdańsku 01:16 on June 19, 2013 Permalink | Reply

      There is definately a great deal to learn about this issue.
      I love all the points you have made.

      Like

    • automaty do gier online 18:47 on June 18, 2013 Permalink | Reply

      Excellent way of describing, and nice piece of writing to take information on the topic of my presentation topic, which i am going to present in school.

      Like

    • betsson Kampanjakoodi 12:03 on June 18, 2013 Permalink | Reply

      Have you ever thought about including a little bit more than just your articles? I mean, what you say is important and everything.
      Nevertheless imagine if you added some great graphics or video clips to give your posts more,”pop”! Your content is excellent but with pics and videos,this site could definitely be one of the most beneficial in its field.
      Fantastic blog!

      Like

    • lawsuit loan companies 23:25 on June 17, 2013 Permalink | Reply

      Hey There. I found your blog the use of msn. That is an extremely smartly written article. I’ll make sure to bookmark it and return to read extra of your useful info. Thanks for the post. I will certainly return.

      Like

    • Moskitiery ramkowe Warszawa 10:08 on June 17, 2013 Permalink | Reply

      I like what you guys are usually up too. This sort of clever work and exposure!

      Keep up the amazing works guys I’ve included you guys to our blogroll.

      Like

    • chwilówka 07:48 on June 16, 2013 Permalink | Reply

      Hey There. I found your blog using msn. This is a really
      well written article. I will be sure to bookmark it and return to read
      more of your useful info. Thanks for the post.
      I will definitely return.

      Like

    • settlement loans 23:27 on June 14, 2013 Permalink | Reply

      Excellent blog you have here.. It’s difficult to find good quality writing like yours these days. I really appreciate individuals like you! Take care!!

      Like

    • Adipex retard 13:34 on June 14, 2013 Permalink | Reply

      Good day I am so glad I found your weblog, I really found you by error, while I was browsing on Digg for something else, Nonetheless I am here now and would just like to say thanks a lot for a tremendous post and a all round thrilling blog (I also love the theme/design), I don’t have time to browse it all at the minute but I have saved it and also added in your RSS feeds, so when I have time I
      will be back to read a lot more, Please do keep up the excellent job.

      Like

    • %anchor_text% 06:20 on June 14, 2013 Permalink | Reply

      Hello, l think that l saw you visited my weblog thus l came to “return the favour”.I’m trying to find things to enhance my site!I suppose its OK to use a few of your ideas!

      Like

    • jak szybko schudnac 14:49 on June 13, 2013 Permalink | Reply

      Hi! I’m at work browsing your blog from my new iphone 3gs! Just wanted to say I love reading through your blog and look forward to all your posts! Carry on the excellent work!

      Like

    • Linras.com.pl 06:33 on June 13, 2013 Permalink | Reply

      The bank always design the country’s database with supreme security. Universities and online trade schools offer quite a few Microsoft training packages.

      Like

    • kamerzysta warszawa 23:37 on June 12, 2013 Permalink | Reply

      I’d like to thank you for the efforts you have put in penning this site. I am hoping to see the same high-grade content by you later on as well. In truth, your creative writing abilities has encouraged me to get my own website now ;)

      Like

    • Berstal 13:53 on June 12, 2013 Permalink | Reply

      Unquestionably believe that that you stated. Your favourite justification appeared to be at the net the simplest
      thing to take note of. I say to you, I definitely get irked while folks think about worries that they just don’t understand about. You managed to hit the nail upon the highest and outlined out the whole thing without having side-effects,folks could take a signal. Will probably be again to get more. Thanks

      Like

    • odchudzanie 03:43 on June 11, 2013 Permalink | Reply

      You could definitely see your enthusiasm within the work you write.The sector hopes for even more passionate writers
      such as you who are not afraid to say how they believe. All the time go after your heart.

      Like

    • Siatki do okien przeciw owadom Warszawa 16:17 on June 10, 2013 Permalink | Reply

      I do not even know how I ended up here, but I thought this post was good. I don’t know who you are but certainly you’re going to a famous blogger if you are not already ;) Cheers!

      Like

    • wyjazdy na urlop 09:58 on June 8, 2013 Permalink | Reply

      Some of these terms include Copyrights, Publishing, Licenses, etc.
      As the parent, you should know the threat at online predators is real.

      Like

  • #AceNewsGroup 18:13 on December 29, 2012 Permalink
    Tags: , cash cow, Companies, gadgets, Google, Google TV, , lab rats, , Searching, smart meters, , ,   

    Love Of Money And The Route Of All Evil Comes Home To Roost In 2013-2016 


    Are banks still too big to fail?

    The worship of Mammon

    The worship of Mammon (Photo credit: Wikipedia)

    Of course they are, as the banks were allowed to build a system designed only to favour themselves! Based on the premise they will eventually not need us, as we and our debts created by them, will bring them down! It is true that we funded their corrupt system, but we are now their biggest liability, and not the cash cow we once were! So to stop that happening, we will become surplus to requirements and they will close their doors to us, and using their system control this world from their ivory towers!

    There are three areas of control in this world that holds the very fabric of society together, these are food, clothing and our homes! By invading the privacy of our homes, with Smart TV’s and Google Glasses they begin to spy on us! By watching us like lab rats in our own environment the way we eat, what we eat and how we live our lives ,using smart fridges, smart meters and smarter computers , they will control our very existence!

    Once they have amassed all this information in servers bigger than 10 story buildings, they will know how we think and using this information, sell it to the highest bidder! This will then allow those that buy it, to control our lives like never before, deciding not just what we eat, wear or what house we live in, but designing the environment around us, to fit their design, not ours!

    If and when they control our food, clothes and homes ,they will control our lives and by controlling our lives ,will control all of us! Then if we step out of line refuse to toe the line or just disagree with their design, we will become surplus to their requirements! We become the pestilence that needs eradicating, that is using up all the “Earths” resources thus not leaving enough ,for the “Haves” our foraging turned into greed, to be stopped anyway they can!

    This is when the “ Love Of Money Becomes The Root Of All Evil” and the world of man becomes the world of haves controlling the have-nots ,by their so-called “Power” thus eradicating “God” from our conscience and leaving “Evil” to rule the “Earth” in the name of “Mammon” !

    Our news desk receives many such links to documents worth sharing one such can be found at this link:

    Machines Begin Taking Social Out of Social Media https://docs.google.com/document/d/1IJX_gKqwpNhDvgv9lxjfhdiR81Dlp7aYLmrR8Z7gmKk/edit

     
  • c
    Compose new post
    j
    Next post/Next comment
    k
    Previous post/Previous comment
    r
    Reply
    e
    Edit
    o
    Show/Hide comments
    t
    Go to top
    l
    Go to login
    h
    Show/Hide help
    shift + esc
    Cancel
    Follow

    Get every new post delivered to your Inbox.

    Join 654 other followers

    %d bloggers like this: