31.3.03

Samsung SGH-T500 Features for Women: - Biorhythm - Fatness Index - Calorie Calculator - Pink Schedule - Menstruation
Use a firewall, go to jail, and send Bill Gates too
Consider a cure for pernicious infobesity: Fundamentally, a person can absorb only so much information. For many centuries, we have assumed there was a shortage of information and, like our hunter-gatherer bodies, we have always been anxious to absorb more. But maybe we have reached the point where we should begin restricting our information intake to avoid infobesity.

28.3.03

Japan's Generation of Computer Refuseniks: Most teens and young adults in Japan rarely use computers to surf the World Wide Web. Instead they use cell phones to access a scaled-down wireless Web. The result: A growing computer literacy problem among Japan's youth.
What's So Free About This DVD? The documentary film Revolution OS was released Friday on DVD. The film features interviews with Linus Torvalds of Linux fame; Richard Stallman of the GNU/Free software project; Eric Raymond, author of Cathedral and the Bazaar (a treatise on marketing and open source); Rob Malda of hacker discussion and news site Slashdot; Larry Augustin, co-founder of VA Linux Systems; and others. In the spirit of open source, the DVD was released without CSS, the content scrambling system used on most commercial DVDs.
What to Do With All That Information: Why is data growing so fast and what should we do about it? Can companies take advantage of it to gain strategic advantage? Who is doing it right? What about our identity and security as consumers? Who, if anyone, is responsible for gathering and maintaining the mountains of information about each of us that grows daily in corporate and government databases? These were the topics to which Esther Dyson devoted her cutting-edge Platforms for Communications conference this year. She called it "Who? What? Where? Data Comes Alive."

27.3.03

NY Press' hidden text: If you highlight the left side of the page in the NY Press article, you get the hidden text in the page designed to be picked up by search engines
When a Free Download Isn't Free: Last week, writer Glenn Fleishman offered his book, Real World Adobe GoLive 6, as a free download. But instead of the few hundred downloads Fleishman expected, the book was downloaded about 10,000 times in just 36 hours. And because he's charged incrementally for bandwidth, Fleishman estimates he could be billed $15,000 at the end of the month -- possibly a lot more. "It's a financial catastrophe," said Fleishman.
'Social software' effectively combines the best of real and virtual worlds: The smaller the group, the more immediate value in the relationship. That's one notion behind an emerging phenomenon called "social software,'' products that help groups work with each other more effectively.
3D holo video arrives: Researchers from the University of Texas have devised a three-dimensional video system that cuts down the compute power needed to project three-dimensional images by using an 800,000-mirror device designed for two-dimensional digital projectors as a sort of holographic film.

26.3.03

UK workers succumb to email paranoia: UK workers are becoming increasingly paranoid about who exactly is reading their e-mail and also accidentally forwarding personal mails.
HP Thinks in 3D for Web Browsing: You are traveling through a dimly lit maze of brick walls with various posters looming back at you. Suddenly, you turn to view one and with a click of a mouse, a movie starts playing. It's not the latest video game - it's Hewlett-Packard's future vision of shopping online.
Terms of Disservice: The arrogance of technology companies knows no bounds. Consider the Terms of Service at a new company called Mailblocks, which says it'll block spam (unsolicited commerical e-mail) for you, for a price that includes not just money but also the right to send you commercial e-mail.

25.3.03

News sites at risk from cyber warfare: As the number of malicious Internet attacks escalates as a knock-on effect of the Iraq war, security companies have warned that online news sites are at risk. "News sites are primary targets for counterattacks, especially given the focus placed on a 'war of words' in the lead up to the conflict," said Kevin Foster, strategy director for security tester NTA monitor.
Is the CIA spamming Iraqi generals? It's the latest in high-tech psychological warfare: E-mail and voice-mail invitations to surrender. But so far there are few signs that the strategy is working.
The changing face of search engines
Blair Tagged as Privacy Threat: London-based Privacy International announced Monday its 2003 U.K. Big Brother Awards, which the group presents annually to "the most persistent and egregious privacy invaders in Britain." Simon Davies, the director of the civil liberties group, said the pool of candidates for the unprestigious prize had greatly expanded since the Sept. 11 terrorist attacks.
Portable PC pioneer dead at 64: Adam Osborne, whose successes and failures pioneering the first portable computer became one of Silicon Valley's great cautionary tales, is dead at 64 after a long illness.

24.3.03

Now It's Really Space War And for satellite outfits, it's time to roll up their sleeves The Pentagon's tactical Internet - a war too early? The Pentagon is furiously buying up commercial satellite capacity in order to meet the bandwidth needs of a new kind of IT-driven war, reports the Washington Post. But Register sources suggest that the US military has other, rather larger problems in delivering on the digital battlespace vision. The Wired War Has Arrived: Unproven technology is seeing its first action as the U.S. Army outfits soldiers with latest computers and telecom devices
E-mail reveals real leaders: Want to know how your organization really works - who speaks to whom, who holds the power? Then study the flow of internal e-mail, say scientists at global technology firm Hewlett-Packard.

21.3.03

Cyberterror and professional paranoiacs: The U.S. war on Iraq has begun. Now wait for the hype about "cyberwar" and "cyberterrorism" to follow. Are We Vulnerable to Cyber-Attacks? Most organizations say they're getting more serious about security, but the risks are still growing. Feds Alert to Web Security Threat

20.3.03

it's all lost and stoof Ah cain't find th' page yer lookin' fer. - Southern American Wuhloss, man, de page yuh lookin for ent here!! - Bajan It's not there, eh? - Canadian j00 f001, 7|-|47 p4g3 d0|\|'7 eXi57! y0u sux0rz. - 1337/h4x0r Dude? - West Coast US A página que você procura não existe. - Brazilian Portugese A keresett lap vagy megszünt, vagy máshová került. - Hungarian La página que estás buscando no existe. - Spanish Essa página não existe. A última vez que a vi foi ali no bar da esquina.... - Portugese (Portugal) L'URL che avete richiesto non e' presente su questo server. - Italian E página ku bo ta buska no ta eksistí mas. - Papiamentu Pagina quam tu quaeris abest. - Latin Non podo atopa-la páxina que andas a procurar. - Galego a koalo ma pang pang sang no dja. - Surinamese Sócio, a página que tavas á procura fugio, foi de boca... - Portugese Slang
U.S. May Use 'E-Bomb' in Iraq Invasion, designed to render Saddam Hussein's forces blind, deaf, dumb and incapable of retaliation. The highly classified bomb creates a brief pulse of microwaves powerful enough to fry computers, blind radar, silence radios, trigger crippling power outages and disable the electronic ignitions in vehicles and aircraft.

19.3.03

Killer stalks cell phones in Europe: A short text message is spelling death for cell phones in Europe. The wireless e-mail, among the 1 billion sent each day on the continent, can freeze or completely disable two cell phones made by German handset maker Siemens, spokesman Jacob Rice said [...] The e-mails contain a single word, taken from the phone's language menu, surrounded by quote marks and preceded by an asterisk, such as "*English" or "*Deutsch", Siemens said. Opening the short text message on a Siemens 35 series cell completely disables it, Rice said. Siemens 45 series phones are less impacted and can be resuscitated after about two minutes of work, Rice said. Both phones are sold only in Europe.

18.3.03

Details on Matrix Phone Emerge: First details of the handset surfaced in February when Samsung opened a teaser Web site, at TheMatrixPhone.com, which provided no details of the telephone but did offer a chance to register for e-mail news on the device.
Spectrum for All: Why sell wireless spectrum to the highest bidder? Maybe the FCC should offer it up for free, columnist Lawrence Lessig suggests, redefining it as a form of public property—with minimum regulations.

17.3.03

Surveillance Nation: Webcams, tracking devices, and interlinked databases are leading to the elimination of unmonitored public space. Are we prepared for the consequences of the intelligence-gathering network we’re unintentionally building?
Best Tech Blogs
Who's Winning Privacy Tug of War? If you opt to protect your privacy, you'll regret it. That's what some businesses apparently would like consumers to think. Privacy is set to become even more of a key issue for businesses and government over the next few months, as some firms fight to retain what they believe is a key provision of the Fair Credit Reporting Act, a federal law that restricts who can access credit information and how it can be used.
Table Manners for Geeks: In Virginia, graduating IT students get lessons in good manners.

14.3.03

Internet Fixes: Sneakier spam, wilier worms, more aggravating ads...no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay.

13.3.03

Frog Design/Motorola Offspring Wearables Concept: The design is only a concept at this point, although Motorola is preparing for user testing, and plans to bring a product based on the design to market within two years.
Are Windows Broadband Users at Risk? Attackers may be targeting home users with high-speed access.
Big Blue Meets Big Brother: IBM details plans to offer digital video surveillance systems The new services are designed to help companies make a transition from older, videotape-based surveillance systems to IP-based surveillance networks, IBM said in a statement.
The Way We Were: Wired's 10th anniversary

11.3.03

Software Pioneer Quits Board of Groove: Mitchell D. Kapor, a personal computer industry software pioneer and a civil liberties activist, has resigned from the board of Groove Networks after learning that the company's software was being used by the Pentagon as part of its development of a domestic surveillance system.

10.3.03

Sony to Introduce PlayStation 3 in 2003, two years ahead of schedule, to widen its lead over rivals
PC Magazine Top 100 Web Sites
Wireless net offered with a pint: People will soon be able to surf the internet from the comfort of their local pub as wireless hotspots reach out to the country's favourite location. There are already around 200 so-called wireless hotspots in cafes, hotel and service stations across the UK. In July, this network will extend to 3,000 pubs in the UK. [act.:] McDonald's to Offer Wireless Internet: By year's end, McDonald's will extend the access to 300 McDonald restaurants in New York City, Chicago and a yet-unannounced California town
O poder das portas USB: uma escova de dentes, um aquecedor de canecas e uma coberta!!! [via Harrow Group]
Military Now Often Enlists Commercial Technology: Technology like fiber optic-laced clothing, head-mounted computer displays, global satellite phones, impromptu wireless networks and rugged laptop computers that the military may use in Iraq or future conflicts have largely descended from ideas originally conceived in Silicon Valley and other commercial enclaves.

7.3.03

World of Ends: What the Internet Is and How to Stop Mistaking It for Something Else. 1. The Internet isn't complicated 2. The Internet isn't a thing. It's an agreement. 3. The Internet is stupid. 4. Adding value to the Internet lowers its value. 5. All the Internet's value grows on its edges. 6. Money moves to the suburbs. 7. The end of the world? Nah, the world of ends. 8. The Internet’s three virtues: a. No one owns it b. Everyone can use it c. Anyone can improve it 9. If the Internet is so simple, why have so many been so boneheaded about it? 10. Some mistakes we can stop making already
Usability News: a free web newsletter that is produced by the Software Usability Research Laboratory (SURL). The SURL team specializes in software/website user interface design research, human-computer interaction research, and usability testing and research.
New Cornell U. System Will Meter Network Use and Charge for 'Extreme' Amounts: Cornell University officials have developed a new "pay by the drink" billing system that will charge students and employees incrementally for Internet use as a way of controlling what officials call "irrational consumption" of bandwidth. Cornell's costs for providing Internet services - currently about $1.4-million a year - are going up by more than 40 percent annually, and the university says it had to do something to moderate that spending, or at least find a fairer way to recover its expenses. [Acabaram-se os almoços gratuitos?...]
Next Windows leaks onto Net: Microsoft did not identify the source of the leak, which is still circulating on the Web and on Internet relay chat. But Jim Cullinan, Microsoft Windows lead product manager, said the leaked version of Longhorn is authentic.
Net speed record smashed: Scientists have set a new internet speed record by transferring 6.7 gigabytes of data across 10,978 kilometres (6,800 miles), from Sunnyvale in the US to Amsterdam in Holland, in less than one minute
Computer Made from DNA and Enzymes: Israeli scientists have devised a computer that can perform 330 trillion operations per second, more than 100,000 times the speed of the fastest PC. The secret: It runs on DNA.
nU fonetics: duz txt msgN mAk U :-) o :-( ? [Translation]
Microsoft promises end to 'DLL hell': When Windows Server 2003 ships in April, it will use .Net Framework 1.1 to get rid of one of the biggest headaches for Windows users and administrators alike, says Microsoft. [Não!!!!...]
Lost in cyberspace: The Bush administration’s war against a bogus threat [with the "National Strategy To Secure Cyberspace"]
Lucro da Portugal Telecom subiu 27% para 391 milhões de euros em 2002: Este valor é superior ao previsto pelos analistas contactados pela agência Lusa, que antecipavam uma subida entre 20 e 24% dos resultados líquidos, para entre 357 e 381 milhões de euros.
Net Cafe to Make Camp on Everest: Fifty years after two men conquered Mount Everest, a native Sherpa is determined to set up a cybercafe at the 17,400-foot-high base camp of the world's highest mountain. Besides freezing temperatures and storms, there is no electricity or plumbing at the site. There aren't any permanent buildings, either.
Tavern owner shoots his computer 4 times: How many times have you wanted to shoot your computer? Well, George Doughty was plenty PO'd and blasted his P.C. Doughty says his laptop crashed once too often. So, he allegedly shot it four times as customers watched in his Sportsman's Bar and Restaurant in Lafayette, Colo. The dead computer is now hanging as a trophy on the wall of the tavern.
Password Strength Meter: Your password will be checked for complexity against the guidelines [...]. In addition, your password will also be checked against a hacking dictionary containing commonly used passwords and keystroke combinations.

6.3.03

Where Are They Now? Search Engines We've Known & Loved
A Decade on the Net by Greg R. Notess, Reference Librarian Montana State University On this tenth anniversary of that first column proclaiming the meeting of the Internet with the online searching world, much has changed. Looking back over 10 years' worth of columns gives a snapshot of the growth of the Internet as a major information resource and a look at how it has changed.
Portugal: Acesso à Internet atinge 5,17 milhões de subscrições no final de 2002 A banda larga assumiu-se como o segmento deste mercado com as taxas de crescimento de adesões mais elevadas, ainda que, no universo de todas as subscrições de serviço, a sua representatividade não ultrapasse os 5%. Ainda assim, o número de clientes de serviços de banda larga – ADSL e cabo incluídos – atingiu os 260 mil no final de 2002, contra menos de 97 mil no final do ano anterior, consubstanciando um crescimento que rondou os 169%. O acesso por cabo, oferecido comercialmente desde 1999, representou por si só 80% de todos os acessos à Internet por banda larga, o equivalente a 207 mil clientes no final de 2002, contra menos de 94 mil no final de 2001. O acesso por ADSL, iniciado em 2001, representou os restantes 20%. Em valores absolutos, o número de clientes ascendeu a 52 mil no final de 2002, contra 18 mil no final de 2001. O crescimento da base de clientes ADSL cresceu, assim, num ano, cerca de 189%. Os acessos via dial up – aqueles que inicialmente eram designados por acessos “gratuitos” - continuam, todavia, a ser os mais utilizados em Portugal, representando 95% de todos os acessos registados, tendo crescido cerca de 46% entre os quartos trimestres de 2001 e 2002.

3.3.03

Hacker hacking could be legal: Striking back at computers that are attacking a company or home network could be legal under federal nuisance laws, a technology-law expert [Curtis Karnow] said [...] However, Karnow warned that counterattacks would have to be used judiciously and only to a limited extent. "The real problem is collateral damage," he said. "Suppose you screw up - you hit the wrong machine (or) you shut down an entire computer rather than just a process. What happens if you are sued, not by a bad guy, but by an intermediary who was affected by your counterstrike?" Such issues should continue to deter anyone considering hacking back, he said.
Latest ID theft scam: Fake job listings Internet job board Monster.com, acknowledging a growing problem for online career sites, is e-mailing millions of job seekers, warning that fake listings are being used to gather and steal personal information.