Sunday, November 3, 2013

Mobile saturation means innovation will slow



Did someone's foot get stuck on the accelerator? The worldwide smartphone market raced ahead at an astonishing growth rate of 38.8 percent in the third quarter, a number that reflected shipments of 467.9 million units, according to a report released this week by IDC. To put that number in perspective, the population of the United States is just 316.9 million. So you could sell a smartphone to every single person in the U.S., plus one to each of the 142 million people living in Russia, and still have about 8.5 million left over.


That's great news for the five leading smartphone vendors -- Samsung, Apple, Huawei, Lenovo, and LG -- not to mention all the suppliers and developers that live in their ecosystems. Great news for now, that is. But I threw those statistics at you to make a point: The smartphone market could well be approaching saturation. "That rate of growth can't be supported, unless Verizon and AT&T start selling smartphones to extraterrestrials," quipped columnist Carl Weinschenk.


[ InfoWorld's Galen Gruman says trouble's brewing in Android land. | For quick, smart takes on the news you'll be talking about, check out InfoWorld TechBrief -- subscribe today. ]


Indeed, there are already early signs that the market is running out of headroom. In South Korea, home to Samsung and one of the most connected places on Earth, each quarter of this year has seen about 1.35 million new smartphone subscriptions, compared to nearly twice that number a year ago, according to that country's Ministry of Science. And smartphone sales in Australia and New Zealand actually shrank in the second quarter of the year. Meanwhile, profit growth at companies like Apple and LG Electronics is slowing as price competition takes hold.


The mobile industry is hardly on the edge of an abyss, and the sky is not falling. But all this reminds me of the PC market in the 1990s, which also grew at a phenomenal rate. When the PC market approached saturation, profits declined as vendors fought for market share, and innovation slowed to the point where PCs became commodities. We may be headed in that direction yet again.


The long upgrade cycle
There use to be a fairly regular PC upgrade cycle in business: Companies would upgrade their systems every three years or so, and individuals more or less followed suit. That's been changing. Although I don't have hard numbers on that, I suspect the cycle is moving closer to five years.


Maybe systems are somewhat sturdier these days. But more important is the lack of significant innovation. Laptops have gotten lighter and more powerful over the years, but until touchscreens and Windows 8 debuted, you could hardly tell one generation of PC from the other. (Not that Windows "Frankenstein," aka Windows 8, will revive the market; in fact, Windows 8 is hurting the PC market.)


Computer buyers are no dummies. Why spend money on a new PC when the old one does everything you need quite well? PC makers reacted by cutting prices, a fratricidal strategy that resulted in shrinking margins for everybody and the deaths of major companies (remember Gateway?) up and down the supply chain. Now, even Mac sales are declining.


Source: http://www.infoworld.com/d/the-industry-standard/mobile-saturation-means-innovation-will-slow-229874?source=rss_mobile_technology
Similar Articles: seahawks   Doug Martin   Keke Palmer   Washington Navy Yard   vince young  

Kim Kardashian Takes a Selfie While Screaming on a Roller Coaster -- Picture


Hold on to your phones, guys and ghouls! Here is a shot of Kim Kardashian taking a selfie while screaming on a roller coaster.


PHOTOS: Famous celebrity families


The Kardashian/Jenner family rented out a theme park on Oct. 29 to celebrate Kendall Jenner's upcoming 18th birthday. The birthday girl -- flanked by amicably separated mom and dad Kris and Bruce Jenner, big sisters Kim and Khloe, birthday girls Kendall, plus brothers Rob Kardashian, Brody and Brandon Jenner -- enjoyed a goofy afternoon filled with crazy rides, games and pictures to document the fun at Six Flags Magic Mountain in Valencia, Calif.


PHOTOS: The Kardashian family vacation album


Newly-engaged Kim, who like her family members posted social media updates from the bash, shared this Keek video while on a roller coaster. "Alright, I hope this isn't too scary," said the 33-year-old reality star as the caboose slowly inched its way up a steep incline. "We better not drop our phone." Like a true pro, even as the screaming commenced, the mom to 4-month-old North West managed to keep her phone and subsequently shared the experience on social media.


PHOTOS: KimYe's sweetest moments


Although her fiance Kanye West was unable to join the somewhat-private affair, Kardashian reciprocated the rapper's lovey-dovey, recent interview with Ryan Seacrest in her Oct. 30 appearance on The Tonight Show With Jay Leno. "I'm very happy right now," she shared. The star also confessed to Leno how the fat-shaming she endured while pregnant with her first baby was damaging to her soul.


"It changed how I am in public," said the bombshell. "I've tried to live more of a private life."


PHOTOS: Kim's post-baby body style


Source: http://www.usmagazine.com/celebrity-news/news/kim-kardashian-selfie-while-screaming-on-a-roller-coaster-picture-20133110
Category: BART strike   Jenna Wolfe   alex rodriguez  

Motorola Launches 'Have It Your Way' Smartphone Project

Tinkerers and designers, rejoice. Motorola's new open source Project Ara promises to let you play with the guts of your smartphone to your heart's content. There are other potential advantages to the modular hardware concept. Since parts can be easily swapped out, fewer phones -- which often contain toxic elements such as lead and mercury -- may end up in landfills.


Motorola's making a big splash with the launch of Project Ara, an ambitious, open source hardware initiative that allows consumers to customize their entire phone, down to the specific components and display.



Ara's modular approach to phone design centers around an endoskeleton, or "endo," that is the core frame holding the other components together. Consumers will be able to swap modules in and out however they like: an old processor ditched for a snappy new one; a large display excised for a smaller screen with a physical keyboard; an additional battery in place of a camera. They'll also have the option of toying with the aesthetics through different-colored modules.

"We know there are a number of folks who like to tinker with their devices," Ramon Lamas, research manager of mobile phones at IDC, told TechNewsWorld. "I think there's going to be some interest out there, but you're talking to a very select segment of the market as opposed to the mass market."


Open Source Hardware Ecosystem


Motorola, which is a subsidiary of Google, thinks of Ara as Android for hardware. It plans to facilitate a thriving third-party ecosystem with developers and reduce time to market while ramping up the pace of innovation. It expects to release an alpha version of a Module Developer's Kit this winter.


It's not yet clear whether developers will flock to Ara -- Motorola hasn't hinted at much direct incentive beyond the suggestion of prizes or, perhaps more enticingly, the opportunity for a hardware developer to make a name for itself on a new platform.


"Based on my initial impressions, I think there's going to be enough people with enough expertise to pull their resources together and create the pieces of the puzzle," telecommunications analyst Jeff Kagan told TechNewsWorld. "Whether it's going to be successful or not is the question."


Motorola has teamed up with Dave Hakkens, designer of the Phonebloks concept. His vision was for a modular, open source phone that consumers could customize however they liked, which dovetailed neatly with Motorola's vision for Ara, which it had been working on for more than a year.


Community Building


Motorola is cultivating the community Hakkens built after Phonebloks caught waves of press attention last month. It garnered more than 950,000 supporters after appearing on crowd-promoting site Thunderclap, and it will remain an independent organization. A successful open source project, Motorola has noted, requires both a robust platform and a thriving community.


There's an environmental-awareness aspect to the project as well. Part of Hakkens' impetus in creating his project was the fact that mobile phones -- which often contain toxic elements such as lead and mercury -- end up in landfills. Phonebloks and Ara aim to reduce waste and create an ecosystem of more sustainable hardware.


At this stage, it is not yet clear if or how consumers will adopt the concept. The enthusiasm and support for the Phonebloks concept certainly suggests there's a market for simple phone hardware customization, yet the time, effort, and cost investment required in shaping an Ara device to personal preferences may prove too cumbersome for some customers.


"At the end of the day, you're going to get a phone. It's very easy to walk into AT&T and Verizon and walk out with a phone less than an hour later," IDC's Lamas said. "You've got to find those people who put that emphasis on design, who put that emphasis on customizability, and are willing to pay a little bit more for that capability."


Source: http://www.technewsworld.com/rsstory/79298.html
Related Topics: Cnn.com   Gta V Cheats   US News college rankings   9/11   ben affleck  

U.S. factory growth hits fastest pace in 2-1/2 years


By Rodrigo Campos


NEW YORK (Reuters) - The U.S. manufacturing sector expanded at its fastest pace in more than two years in October, according to an industry report, signaling a strong start to fourth-quarter factory activity despite a government shutdown during the first half of the month.


The Institute for Supply Management said on Friday its index of national factory activity rose to 56.4 in October, its best showing since April 2011, handily beating expectations of a slight slowdown in the growth rate.


Last month was the fifth in a row of quicker growth in the goods-producing sector, according to ISM's data.


"It certainly was a surprise, and a good one. We don't get that many of those on the data stream of late," said Art Hogan, managing director at Lazard Capital Markets in New York.


"This was supposed to be a government shutdown-affected number, and it certainly didn't show that."


Analysts expected weak economic data readings after a political stalemate in Washington forced a partial federal government shutdown through the first 16 days of October.


A separate reading from financial data firm Markit cast some doubt on the strength of factory activity growth. Markit said its final U.S. Manufacturing Purchasing Managers Index stood at 51.8 last month, beating the preliminary October reading but notching the worst final showing since October 2012.


The two surveys use several different methodologies, including one related to seasonal adjustment. Both figures indicated expansion in the manufacturing sector.


The ISM's employment component did show some weakness as it slipped to 53.2 after hitting a 15-month high of 55.4 in September.


Job growth in the broader U.S. economy was tepid in September, and economists polled by Reuters expect a government report due on November 8 to show hiring slowed further in October.


Treasuries prices fell after the factory data and stayed lower through the day. The U.S. dollar extended gains against both the euro and the yen. On Wall Street, stocks wavered but were slightly higher in afternoon trading, not far from record highs.


"It's hard to have a takeaway for the markets because we're at a point in time where we have to take all the data with a bit of a grain of salt. Some of it is old, some may not be affected by the shutdown yet," Hogan said.


Beyond factory activity, the government shutdown did appear to dampen consumers' appetite for new cars last month. Seven of the top eight automakers reporting monthly sales on Friday missed analysts' expectations.


Friday's factory figures came a day after a report showed business activity in the U.S. Midwest surged past expectations in October as new orders hit their highest level since 2004. Weekly unemployment claims also fell, in welcome news for the nation's battered labor market.


Still, the mixed results in the two factory readings on Friday underscored lingering uncertainty over the state of the world's largest economy. Earlier this week the Federal Reserve suggested it still sees a need for stimulus and maintained its $85 billion per month bond-buying program to prop up the economy.


(Reporting by Steven C. Johnson, Luciana Lopez, writing by Rodrigo Campos; Editing by Meredith Mazzilli)

Source: http://news.yahoo.com/u-october-manufacturing-activity-growth-hits-2-1-140622477--business.html
Similar Articles: pumpkin   Giraffe Riddle Answer   emmy winners   Washington Navy Yard   Richard Sherman  

Silent Circle, Lavabit unite for 'Dark Mail' encrypted email project





Two privacy-focused email providers have launched the Dark Mail Alliance, a project to engineer an email system with robust defenses against spying.


Silent Circle and Lavabit abruptly halted their encrypted email services in August, saying they could no longer guarantee email would remain private after court actions against Lavabit, reportedly an email provider for NSA leaker Edward Snowden.


Their idea, presented at the Inbox Love email conference in Mountain View on Wednesday, is for an open system that could be widely implemented and which offers much stronger security and privacy. As envisioned, Dark Mail would shield both the content of an email and its "metadata," including "to" and "from" data, IP addresses and headers. The email providers hope a version will be ready by next year.


"The issue we are trying to deal with is that email was created 40 years ago," Jon Callas, CTO and founder of Silent Circle, in a phone interview. "It wasn't created to handle any of the security problems we have today."


Silent Circle, Lavabit and at least one VPN provider, CryptoSeal, shut down their services fearing a court order forcing the turnover of a private SSL (Secure Sockets Layer) key, which could be used to decrypt communications.


Lavabit was held in contempt of court for resisting an order to turn over its SSL key, which in theory allowed the government to decrypt not only Snowden's communications but also those of its 400,000 users. Ladar Levison, Lavabit's founder, is appealing.


Callas said Dark Mail is a collaboration with Levison. Rather than create a closed email service, they decided to design Dark Mail with open-source software components that could be used by any email provider.


"We need 1,000 Lavabits all around the world," he said.


Representatives of Google, Microsoft and Yahoo who attended Inbox Love did not have an immediate comment on Dark Mail.


Dark Mail will be crafted around XMPP, a web messaging protocol known by its nickname Jabber, along with another encryption protocol created by Silent Circle called SCIMP (Silent Circle Instant Message Protocol), Callas said.


An adapter will be built that will enable Dark Mail within different email clients. "There's no reason why you couldn't modify Outlook and Exchange to do this," he said.


The private key used to encrypt email will be held on users' systems and not retained by a service provider. Even if the government forced a SSL key to be turned over, users would not be compromised "because all of the messages are encrypted to keys that are sitting in the hands of the recipient," Callas said.


In that case, the party interested in the communication would have to request the encryption key from a person or find another way to decrypt the message.


Snowden's documents showed the NSA was also collecting email metadata, which reveals a sender's and recipient's email addresses, subject line of the email, IP addresses and more. Dark Mail will encrypt the metadata, using the XMPP protocol to signal when a new message has arrived, Callas said.


The alliance is also considering longstanding problems around encryption keys, such as public and private key pairs that are in use for years. "The longer that a key stays around, the bigger of a vulnerability it is," Callas said.


One idea is to create a protocol that would only keep a static public key for just a few hours or a day and then refresh it. Older messages would need to be re-encrypted with a new key to maintain access, but it would provide much better long-term protection for sensitive messages, Callas said.


Also under consideration is "forward secrecy," an encryption feature that limits the amount of data that can be decrypted if a private key is compromised in the future.


Wide use of encrypted email has implications for companies such as Google, which displays advertisements based on email content. In industries such as financial services, companies are required to retain email for compliance regulations.


There's also a convenience factor, as email encryption isn't necessarily easy to implement, especially as people use multiple tablets and mobile phones and desktop computers. Callas said Dark Mail will be flexible, allowing users to send unencrypted email if they don't need an extra level of security.


Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk








Subscribe to the Daily Downloads Newsletter










Thank you for sharing this page.




Sorry! There was an error emailing this page




Source: http://www.pcworld.com/article/2059840/silent-circle-lavabit-unite-for-dark-mail-encrypted-email-project.html#tk.rss_all
Similar Articles: dallas cowboys   Kerry Washington   Gta V Cheats   Malcom Floyd   Xbox One Release Date  

No. 24 Michigan St batters No. 23 Michigan 29-6

Michigan quarterback Devin Gardner (98) runs on a keeper in front of Michigan State's Marcus Rush (44) and Taylor Lewan (77) during the second quarter of an NCAA college football game, Saturday, Nov. 2, 2013, in East Lansing, Mich. (AP Photo/Al Goldis)







Michigan quarterback Devin Gardner (98) runs on a keeper in front of Michigan State's Marcus Rush (44) and Taylor Lewan (77) during the second quarter of an NCAA college football game, Saturday, Nov. 2, 2013, in East Lansing, Mich. (AP Photo/Al Goldis)







Michigan State's Denicos Allen, left, and Isaiah Lewis celebrate a stop by Allen against Michigan during the second quarter of an NCAA college football game, Saturday, Nov. 2, 2013, in East Lansing, Mich. (AP Photo/Al Goldis)







(AP) — Mark Dantonio has always embraced Michigan State's rivalry with Michigan, but this week the confident coach took a fairly calm approach.

"Don't worry about all the things that are being said — just keep your mouth shut," Dantonio said. "Get ready to play, start the game and finish stronger than when you started. We were going to let the lion out of the cage at 3:30, and that's what happened."

Dantonio's Spartans battered their biggest rivals for the full 60 minutes Saturday, and 24th-ranked Michigan State remained unbeaten in the Big Ten with a 29-6 victory over the 23rd-ranked Wolverines. Michigan was sacked seven times and finished with minus-48 yards rushing, the worst output in the Ann Arbor program's lengthy history.

This after the Wolverines had vowed Saturday wouldn't be a repeat of the game in East Lansing in 2011, when Michigan State's physicality was too much for Michigan.

"Two years ago was nothing," Michigan State linebacker Denicos Allen said. "It was a lot worse today, and I think they felt it."

Michigan State (8-1, 5-0 Big Ten) has won five of the last six meetings with the Wolverines (6-2, 2-2), and this was the Spartans' most lopsided win in the series since 1967.

Connor Cook threw for a touchdown and ran for one, but this game belonged to Michigan State's defense, which solidified its spot among the nation's best with an overwhelming performance on a rainy afternoon at Spartan Stadium. Shilique Calhoun and Ed Davis had 2 ½ sacks each, and Allen added two more.

"We're going to bully people — that's the game of football," Michigan State defensive coordinator Pat Narduzzi said. "We didn't want any personal fouls — we had one stupid one, I think on special teams at the end — we talked really about not getting any penalties. ... They've got a good football team, but we've got a great football team."

Michigan State entered ranked No. 1 in the nation in total defense, and the Spartans looked positively dominating for most of the game. Michigan quarterback Devin Gardner was sacked four times in the first quarter, and things only got worse for the Wolverines on one drive in the second.

On first down from the Michigan State 49, a shotgun snap sailed over Gardner's head for a loss of 20. After a sack on third down and a Michigan penalty, the Wolverines finally punted on fourth-and-48.

"A lot of negative yardage plays. There were some pretty good runs once in a while, but when you snap the ball for a 20-yard loss and get sacked I don't know how many times, your yardage part of it isn't very good," Michigan coach Brady Hoke said. "You put yourself behind the 8-ball, not executing and then you're forced into doing things you don't want to do."

Thanks to the sacks and that bad snap, Michigan finished the first half with minus-41 yards rushing. The Wolverines' best hope was for Gardner to look for big chunks of yardage on deep passes. He completed a few, including a 58-yarder to Jehu Chesson that set up a field goal in the second quarter.

With the score tied at 6, Michigan State's slumbering offense finally broke through, driving 75 yards on 10 plays for the game's first touchdown. It came on a 14-yard pass from Cook to Bennie Fowler with 23 seconds left in the half.

Fowler's sliding catch came in the same back corner of the end zone where he was unable to hold onto a potential touchdown pass earlier in the quarter.

The second half was more of the same. Michael Geiger's third field goal of the day made it 16-6, and the Wolverines were stuck deep in their own territory for much of the third quarter.

Michigan finally caught a break when Cook's pass was intercepted by Raymon Taylor, giving the Wolverines the ball at the Michigan State 41. But that only gave the Spartans another chance to shine on defense.

"We're excited to play, we're excited to go out there," linebacker Max Bullough said. "In those situations, they think they have the advantage. They think they're going to score, it's a momentum change for them. If we go out there and we stuff them, and we keep them out of even scoring a field goal, it's double. It takes away theirs and it gives us momentum."

Gardner lost 5 yards on what looked like a designed run, then Allen sacked him for a loss of 9. Michigan called a timeout, and several Spartans danced to the sideline, motioning for the crowd to make more noise.

Gardner was sacked again on the next play for a loss of 7, leaving the Wolverines punting on fourth-and-31 to start the fourth quarter.

Michigan's previous low point for rushing was in 1962, when the Wolverines were held to minus-46 yards by Minnesota. The Wolverines have now lost 10 straight road games against ranked opponents — the last victory was in 2006 at Notre Dame.

The last team to be held to minus-48 yards rushing was actually Michigan State, which had exactly that total against Alabama in the 2011 Capital One Bowl.

This was Michigan State's most lopsided win over Michigan since a 34-0 victory in 1967, right before the Wolverines gained the upper hand in this rivalry and held onto it for about four decades. The Spartans have certainly pushed back lately.

Cook's 1-yard run in the fourth made it 22-6, and Jeremy Langford added a 40-yard scoring run in the final minutes.

Gardner was 14 of 27 for 210 yards with an interception. Cook was 18 of 33 for 252 yards.

Associated PressSource: http://hosted2.ap.org/APDEFAULT/347875155d53465d95cec892aeb06419/Article_2013-11-02-FBC-T25-Michigan-Michigan-St/id-e5c1a80fda1d403b8133a5eb51f383be
Related Topics: Captain Phillips   Jeff Daniels   Ozymandias   powerball winning numbers   paulina gretzky  

Cleveland kidnap survivor sits down with Dr. Phil


CLEVELAND (AP) — One of three women who escaped from a ramshackle Cleveland home after more than a decade in captivity is about to share her story.

Michelle Knight will appear on the "Dr. Phil" show Tuesday and Wednesday in a taped interview.

The show says Knight "describes the horrible conditions in the house" and discusses her physical, mental and sexual abuse. That includes "being tied up like a fish" and spending weeks chained and tortured in the basement, according to the show.

Knight, Amanda Berry and Gina DeJesus escaped May 6 when Berry pushed out a door and yelled for help.

Their kidnapper, Ariel Castro, pleaded guilty and was sentenced to life in prison. He hanged himself Sept. 3.

On "Dr. Phil," Knight will also discuss how she was able to survive her ordeal. She was 20 years old when she was kidnapped in August 2002.

"Three women were taken, three women were rescued, but only two went home," said Phil McGraw, referring to Knight's decision not to reunite with her family.

The Knight interview was announced earlier as three segments but was trimmed.

"Out of respect for Ms. Berry and Ms. DeJesus, she chose to speak about their shared experiences only from her own point of view," McGraw told The (Cleveland) Plain Dealer (bit.ly/1aR5f9c) in comments published Saturday.

"When you listen to her describe the horrible living conditions and how she was treated, you wonder how anyone lasted a day let alone more than a decade. In the 12 years of doing the 'Dr. Phil' show, no one has changed me like Michelle Knight and her story of survival."

Knight, the only victim to appear at Castro's sentencing, told him, "You took 11 years of my life away, but I've got my life back! I spent 11 years in hell. Now your hell is just beginning."

McGraw said he found Knight "very bright, well-spoken and eager" to have her own voice after suffering years of abuse.

Castro was found dead in his cell just a few weeks into his sentence. A coroner ruled his death a suicide but an Ohio prisons report indicated he may have died accidentally while choking himself for a sexual thrill.

Source: http://news.yahoo.com/cleveland-kidnap-survivor-sits-down-dr-phil-154919195.html
Category: calvin johnson   Dumb and Dumber 2   nbc news   aaron hernandez   Bryan Cranston  

Officials: 2 French journalists killed in Mali

This combination of undated photos provided by Radio France International shows journalists Ghislaine Dupont, left, and Claude Verlon. French and Malian officials said gunmen in Kidal, northern Mali abducted and killed the two French radio journalists on assignment Saturday, Nov. 2, 2013, grabbing the pair as they left the home of a rebel leader. (AP Photo/RFI)







This combination of undated photos provided by Radio France International shows journalists Ghislaine Dupont, left, and Claude Verlon. French and Malian officials said gunmen in Kidal, northern Mali abducted and killed the two French radio journalists on assignment Saturday, Nov. 2, 2013, grabbing the pair as they left the home of a rebel leader. (AP Photo/RFI)







In this picture taken July 26, 2013, Malian soldiers traveling in convoy across the desert arrive at the entrance to Kidal in northern Mali. Gunmen abducted and killed two French radio journalists on assignment in northern Mali on Saturday, Nov. 2, 2013, French and Malian officials said, grabbing the pair as they left the home of a rebel leader. (AP Photo/Rebecca Blackwell)







FILE - In this July 27, 2013 file photo, a French soldier patrols at dusk in a central market in Kidal, Mali. Mali's military chief in Kidal said Saturday, Nov. 2, 2013, that two journalists working for French radio station RFI have been kidnapped. RFI confirmed the kidnappings on its website, saying that journalists Ghislaine Dupont and Claude Verlon were taken at 1 p.m. Saturday by armed men in Kidal and have not been heard from since. (AP Photo/Rebecca Blackwell, File)







(AP) — Gunmen abducted and killed two French radio journalists on assignment in northern Mali on Saturday, French and Malian officials said, grabbing the pair as they left the home of a rebel leader.

The deaths come four days after France rejoiced at the release of four of its citizens who had been held for three years by al-Qaida's affiliate in North Africa.

It was not immediately clear who had slain the Radio France Internationale journalists. France launched a military intervention in January in its former colony to try and oust jihadists from power in Kidal and other towns across northern Mali. Separatist rebels have since returned to the area.

French President Francois Hollande expressed his "indignation at this odious act."

Claude Verlon and Ghislaine Dupont were grabbed by several armed men in a 4x4 after they finished an interview, officials said. Their bodies were later dumped a dozen kilometers (miles) outside the town on the road leading to Tinessako, a community to the east of Kidal, according to a person who saw the bodies and four officials briefed on the matter.

RFI described Dupont, 51, and Verlon, 58, as professionals with long experience in challenging areas.

Dupont was a journalist who was "passionate about her job and the African continent that she covered since joining RFI in 1986," it said in a statement. Verlon was "used to difficult terrain throughout the world."

Staff members "are all in shock, profoundly saddened, indignant and angry," it said.

France opened a judicial investigation into the kidnappings and deaths "linked to a terrorist enterprise," the prosecutor's office said.

Suspicion in Saturday's killings immediately fell on Islamist militants.

"From the information I have, their throats were cut. We don't know for sure who took them, but the reports we are hearing indicate that they were Islamists," said Lassana Camara, the deputy prefect of Tinessako.

Several Kidal officials interviewed by telephone said that the RFI journalists were abducted after an interview at the house of Ambeiry Ag Rhissa, the acting head of the National Movement for the Liberation of the Azawad, or NMLA, a Tuareg separatist movement whose rebels invaded northern Mali last year. Those rebels were later chased out by al-Qaida's fighters in the region but have returned to prominence in Kidal in recent months.

Rhissa said in telephone interview with the France 24 TV station that he heard sounds and walked outside, where a vehicle had pulled up beside the journalists' car. A man pointed a gun at him and said "Go inside, go inside."

When they took off, "I heard a single gunshot," he said. Rhissa said he didn't see how many men were in the vehicle but said he was told by several people there were four.

Lt. Col. Oumar Sy, a Malian officer stationed in Kidal and involved in the investigation, said that everything pointed to the NMLA.

"We are in a town that is in the de facto hands of the NMLA. We learn that these poor people are taken in front of the house of an NMLA leader. No one lifts a finger to help them. What conclusion would you come to?" he said.

The French-led military operation succeeded in restoring government rule in all the regions formerly held by al-Qaida, with the exception of Kidal. Although the Malian military returned this summer, they remain mostly confined to their military base, largely unable to patrol the streets, where the NMLA rebels can still be seen zooming through the sand-enveloped paths aboard pickup trucks bearing the NMLA flag.

The French president called key ministers for a Sunday meeting in a first step to find out how and why the journalists were killed.

Hollande and Malian President Ibrahim Boubacar Keita agreed in a phone call "to follow without let-up the fight against terrorist groups that remain present in northern Mali," according to a statement from Hollande's office.

The executive director of Reporters Without Borders, Christophe Deloire, expressed disgust in an interview with The Associated Press that "two experienced journalists can lose their lives because nefarious militias consider it normal to shoot."

Since 2003, northern Mali also has acted as a rear base for al-Qaida's North African branch, which has used the country's vast deserts north of Kidal to train fighters, amass arms and prepare for war. They have bankrolled their operations by kidnapping Westerners, especially French nationals.

According to global intelligence unit Stratfor, al-Qaida in the Islamic Maghreb has carried out at least 18 successful kidnappings of foreigners in the past decade, netting at least $89 million in ransom payments.

Just last week, four Frenchmen kidnapped three years ago in neighboring Niger were released by the terrorist group in the deserts of northern Mali, allegedly for ransom of more than 10 million euros ($13.5 million), according to Pascal Lupart, the head of an association representing the friends and families of hostages held by the group.

Al-Qaida in the Islamic Maghreb embedded itself in northern Mali in part by forging alliances with the Tuareg people, who have agitated for independence for the past half-century. Several of al-Qaida's local commanders are believed to be Malian-born Tuaregs, with ties to both Kidal and the local separatist movement, the NMLA.

____

Ganley reported from Paris. Bastien Inzaurralde contributed from Paris.

___

Follow Ganley on Twitter at: https://twitter.com/Elaine_Ganley

Associated PressSource: http://hosted2.ap.org/APDEFAULT/cae69a7523db45408eeb2b3a98c0c9c5/Article_2013-11-02-Mali-Kidnapping/id-9731507cbee44824b29960567df4677b
Category: glee   The Crazy Ones   911 Memorial   us open tennis   ashton kutcher  

Saturday, November 2, 2013

ConnectedText 6 review: Personal wiki adds long-requested features









  • ConnectedText 6 screenshot ConnectedText 6

    $40.00

    If you've used and liked older versions of ConnectedText, this upgrade is well worth it. If you think you might need a personal wiki, check out the trial.


    Download Now



Offline personal wiki tool ConnectedText is ideal for college students, researchers, writers, and anyone else who needs the ability to mix freeform text with keywords and structure, or to perform queries and aggregations based on arbitrary criteria. The new version 6 adds long-needed enhancements to content aggregation, display, and searching.


ConnectedText 6 screenshotAt long last, you can open multiple views of the same project in ConnectedText.

With ConnectedText ($40. 30-day free trial), you create projects composed of topics. Editing a topic requires toggling into edit mode and using a simple markup language that rapidly becomes second nature. Flipping out of edit mode renders the topic according to a style sheet. Those who know CSS can edit the style sheet or enhance it in many ways, but I've found the default to be perfectly fine.


Enclosing any word or phrase in brackets marks a link. Click the link to create a topic (if it exists already, you just jump to it). This makes content creation highly dynamic, for people who tend to think while they write. At the same time, those with more organized minds can create a topic fully, then go back and mark up keywords that deserve topics of their own.


ConnectedText 6 screenshotThe built-in browser lets you drag URLs into your topic.

Flexibility is a watchword in ConnectedText. You can use attributes, categories, and properties to organize or find topics, or rely on full text queries. You can create very long topics, or split information into dozens of small topics, which can then be displayed as a single large topic by using queries or by explicitly including a set of topics, or both.


ConnectedText 6 adds a new feature named "blocks." You can surround a block of text with tags to give it a name, then include this block, by name, in another topic—or all blocks with the same name. For example, you might have many topics which all contain some text relevant to "London". You can enclose those blocks in the "London" tag, then create another topic which shows all the blocks with that name (or only the blocks with that name, which also appear in a topic in the category "England", or a wide range of other options.)


ConnectedText 6 screenshotConnectedText allows you to view your project as a web of connections.

For any given project, you can only have one editing window, but you can now open multiple views into a single project in floating windows. This much-needed enhancement makes working with large projects much easier. Anyone who has used ConnectedText extensively would probably find this feature alone worth the upgrade.


There are many other enhancements as well, such as a "trash can" to allow recovery of deleted topics, and the usual round of bug fixes and small upgrades.


ConnectedText is not intended for group or online use. Its primary audience is individual users who manage a lot of non-tabular information (though clever use of properties, attributes, and queries can produce an approximation of a structured database, doing so is like using a screwdriver as a hammer). As a consequence, it really shows its strength in how many ways it offers to present, organize, and collate disparate bits of information, and the features in ConnectedText 6 play to those strengths.


ConnectedText 6 screenshotIf you prefer, you can view your project as an ordered tree.

A 30-day trial with no feature limitations (just a watermark and a startup reminder) should provide anyone curious about the potential of ConnectedText to test it thoroughly.










Subscribe to the Business Brief Newsletter










Thank you for sharing this page.




Sorry! There was an error emailing this page





Source: http://www.pcworld.com/article/2056540/connectedtext-6-review-personal-wiki-adds-long-requested-features.html#tk.rss_reviews
Category: Miley Cyrus Halloween Costume   cleveland browns   miley cyrus snl   carrie underwood   usain bolt  

NextDoor, The Facebook For Your Neighborhood, Lands $60M From John Doerr, Tiger Global And More To Go International


The “local space” has long held sway over the imagination of entrepreneurs, who have produced everything from travel apps to city guides, neighborhood news sites and event planners in pursuit of local dollars. But local is a tough nut to crack, with many high-profile companies stumbling along the way, including EveryBlock, Patch and YardSellr to name a few.


Nextdoor is one of a handful of companies that has managed to thrive in the local market, and a growing list of investors are betting that the “Facebook for your neighborhood” could be the next big social network.


With 22,500 neighborhoods (and one-in-seven in the U.S.) now using Nextdoor to create private websites where locals can ask questions, get to know one another and exchange advice and recommendations, Nextdoor is ready to go international. To do so, the startup has secured a whopping $60 million round in Series C financing from veteran investors, like John Doerr and Mary Meeker of Kleiner Perkins Caufield & Byers (KPCB) and Lee Fixel of Tiger Global Management.


The round, which brings the startup’s funding to over $100 million, also included investors like Comcast Ventures, as well as previous investors, Benchmark, Greylock Partners, and Shasta Ventures.


Developing


Screen Shot 2013-10-29 at 4.57.31 AM



Source: http://feedproxy.google.com/~r/Techcrunch/~3/_oprVkyeYeI/
Related Topics: jordy nelson   Malcom Floyd   Kendrick Lamar Verse  

Report: NSA broke into Yahoo, Google data centers

WASHINGTON (AP) — The Washington Post is reporting that the National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world. The Post cites documents obtained from former NSA contractor Edward Snowden and interviews with officials.

According to a secret accounting dated Jan. 9, 2013, NSA sends millions of records every day from Yahoo and Google internal networks to data warehouses at the agency's Fort Meade, Md., headquarters. In the last 30 days, the report Wednesday on the Post website said, field collectors had processed and sent back more than 180 million new records — ranging from "metadata," which would indicate who sent or received emails and when, to content such as text, audio and video.

The NSA's principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency's British counterpart, GCHQ. The Post said NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.

White House officials and the Office of the Director of National Intelligence, which oversees the NSA, declined to comment, the Post said.

In a statement to the Post, Google said it was "troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity."

At Yahoo, a spokeswoman said: "We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency."

Associated PressSource: http://hosted2.ap.org/APDEFAULT/386c25518f464186bf7a2ac026580ce7/Article_2013-10-30-NSA-Yahoo-Google/id-9579db3496be491da0bbef7d0f207d7b
Tags: jordy nelson   big bang theory   Ozymandias   Insidious 2   september 11  

Ugandan shilling seen range bound ahead of inflation data


By Elias Biryabarema


KAMPALA (Reuters) - The Ugandan shilling was flat on Monday and expected to trade in a tight range ahead of October inflation data this week, with some traders forecasting a surge in prices that could pressure the central bank to raise its key interest rate.


At 0923 GMT commercial banks quoted the currency of east Africa's third-largest economy at 2,525/2,530, unchanged from Friday's close.


"Inflation is likely to edge up but it's the level of increase that will likely determine whether the central bank will tighten its stance," said David Kamugisha, trader at Stanbic Bank.


"If the increase in prices is significant then Bank of Uganda (BoU) might be forced to increase the CBR (central bank rate)."


Inflation data is due to be released on October 31.


An increase in the CBR would push up already high borrowing costs and support the local currency, which has traded on a largely strong footing this year, underpinned mostly by companies' sluggish appetite for hard currency.


This month the central bank kept the CBR at 12 percent despite a surge in headline annual inflation to 8 percent last month, from 7.3 percent in August.


"If this week's auction draws inflows the shilling could be biased toward a stronger side but the 2,520-2,530 range is likely to hold," a trader at a leading commercial bank said.


On Wednesday the central bank is due to sell 145 billion shillings worth of Treasury bills of all maturities.

Source: http://news.yahoo.com/ugandan-shilling-seen-range-bound-ahead-inflation-data-103810337--business.html
Similar Articles: happy halloween   boston red sox   mrsa   Apple.com   kim zolciak  

In midst of Syrian war, giant Jesus statue arises

This Oct. 14, 2013 photo provided by the St. Paul's and St. George's Foundation shows workers preparing to install a statue of Jesus on Mount Sednaya, Syria. In the midst of a civil war rife with sectarianism, a 12.3-meter (40-foot) tall, bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions - Syrian forces, rebels and gunmen in the Christian town of Sednaya. (AP Photo/Samir El-Gadban, St. Paul's and St. George's Foundation)







This Oct. 14, 2013 photo provided by the St. Paul's and St. George's Foundation shows workers preparing to install a statue of Jesus on Mount Sednaya, Syria. In the midst of a civil war rife with sectarianism, a 12.3-meter (40-foot) tall, bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions - Syrian forces, rebels and gunmen in the Christian town of Sednaya. (AP Photo/Samir El-Gadban, St. Paul's and St. George's Foundation)







This Oct. 14, 2013 photo provided by the St. Paul's and St. George's Foundation shows workers preparing to install a statue of Jesus on Mount Sednaya, Syria. In the midst of a civil war rife with sectarianism, a 12.3-meter (40-foot) tall, bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions - Syrian forces, rebels and gunmen in the Christian town of Sednaya. (AP Photo/Samir El-Gadban, St. Paul's and St. George's Foundation)







This Oct. 14, 2013 photo provided by the St. Paul's and St. George's Foundation shows workers preparing to install a statue of Jesus on Mount Sednaya, Syria. In the midst of a civil war rife with sectarianism, a 12.3-meter (40-foot) tall, bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions - Syrian forces, rebels and gunmen in the Christian town of Sednaya. (AP Photo/Samir El-Gadban, St. Paul's and St. George's Foundation)







This Oct. 14, 2013 photo provided by the St. Paul's and St. George's Foundation shows workers preparing to install a statue of Jesus on Mount Sednaya, Syria. In the midst of a civil war rife with sectarianism, a 12.3-meter (40-foot) tall, bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions - Syrian forces, rebels and gunmen in the Christian town of Sednaya. (AP Photo/Samir El-Gadban, St. Paul's and St. George's Foundation)







(AP) — In the midst of a conflict rife with sectarianism, a giant bronze statue of Jesus has gone up on a Syrian mountain, apparently under cover of a truce among three factions in the country's civil war.

Jesus stands, arms outstretched, on the Cherubim mountain, overlooking a route pilgrims took from Constantinople to Jerusalem in ancient times. The statue is 12.3 meters (40 feet) tall and stands on a base that brings its height to 32 meters (105 feet), organizers of the project estimate.

That the statue made it to Syria and went up without incident on Oct. 14 is remarkable. The project took eight years and was set back by the civil war that followed the March 2011 uprising against President Bashar Assad.

Christians and other minorities are all targets in the conflict, and the statue's safety is by no means guaranteed. It stands among villages where some fighters, linked to al-Qaida, have little sympathy for Christians.

So why put up a giant statue of Christ in the midst of such setbacks and so much danger?

Because "Jesus would have done it," organizer Samir al-Ghadban quoted a Christian church leader as telling him.

The backers' success in overcoming the obstacles shows the complexity of civil war, where sometimes despite the atrocities the warring parties can reach short-term truces.

Al-Ghadban said that the main armed groups in the area — Syrian government forces, rebels and the local militias of Sednaya, the Christian town near the statue site — halted fire while organizers set up the statue, without providing further details.

Rebels and government forces occasionally agree to cease-fires to allow the movement of goods. They typically do not admit to having truces because that would tacitly acknowledge their enemies.

It took three days to raise the statue. Photos provided by organizers show it being hauled in two pieces by farm tractors, then lifted into place by a crane. Smaller statues of Adam and Eve stand nearby.

The project, called "I Have Come to Save the World," is run by the London-based St. Paul and St. George Foundation, which Al-Ghadban directs. It was previously named the Gavrilov Foundation, after a Russian businessman, Yuri Gavrilov.

Documents filed with Britain's Charity Commission describe it as supporting "deserving projects in the field of science and animal welfare" in England and Russia, but the commission's accounts show it spent less than 250 pounds ($400) in the last four years.

Al-Ghadban said most of the financing came from private donors, but did not supply further details.

Russians have been a driving force behind the project — not surprising given that the Kremlin is embattled Assad's chief ally, and the Orthodox churches in Russia and Syria have close ties. Al-Ghadban, who spoke to The Associated Press from Moscow, is Syrian-Russian and lives in both countries.

Al-Ghadban said he began the project in 2005, hoping the statue would be an inspiration for Syria's Christians. He said he was inspired by Rio de Janeiro's towering Christ the Redeemer statue.

He commissioned an Armenian sculptor, but progress was slow. A series of his backers died, including Valentin Varennikov, a general who participated in the 1991 coup attempt against then President Mikhail Gorbachev. He later sought President Vladimir Putin's backing for the statue project.

Varennikov died in 2009.

Another backer, Patriarch Ignatius IV, the Lebanon-based head of the Greek Orthodox Church of Antioch and All the East, died in 2012. He had donated the land for the statue, according to church official Bishop Ghattas Hazim.

By 2012, the statue was ready, but Syria was aflame, causing the project's biggest delay, al-Ghadban said.

Majority Sunni Muslims dominate the revolt, and jihadists make up some of the strongest fighting groups. Other Muslim groups along with the 10-percent Christian minority have stood largely with Assad's government, or remained neutral, sometimes arming themselves to keep hard-line rebels out of their communities.

Churches have been vandalized, priests abducted. Last month the extremists overran Maaloula, a Christian-majority town so old that some of its people still speak a language from Jesus' time.

On Tuesday a militant Muslim cleric, Sheik Omar al-Gharba, posted a YouTube video of himself smashing a blue-and-white statue of the Virgin Mary.

Al-Ghadban and the project's most important backer, Gavrilov, weighed canceling it.

They consulted Syria's Greek Orthodox Patriarch John Yaziji. It was he who told them "Jesus would have done it."

They began shipping the statue from Armenia to Lebanon. In August, while it was en route, Gavrilov, 49, suffered a fatal heart attack, al-Ghadban said.

Eventually the statue reached Syria.

"It was a miracle," al-Ghadban said. "Nobody who participated in this expected this to succeed."

___

Associated Press writers Raphael Satter in London and Albert Aji in Damascus contributed to this report.

Associated PressSource: http://hosted2.ap.org/APDEFAULT/3d281c11a96b4ad082fe88aa0db04305/Article_2013-11-02-Syria-Jesus%20Statue/id-f95c1a1cffcf4931960cc854ba134784
Tags: Geno Smith   tommy morrison  

What data does Microsoft's Xbox services collect? We break it down






Ever since a Microsoft executive turned on the Xbox One with a voice command—“Xbox on”—potential customers have wondered what Microsoft’s new console will see, hear, and report back to Redmond.


On Thursday night, Microsoft filed an updated privacy policy that lays it all out—in the sort of exhaustive detail that typifies a legal document. We’ve dug through it and tried to summarize the most relevant bits.


What’s new? Microsoft offers more information on how the Xbox One’s Kinect sensor uses your data, plus an explicit “Kinect Off” command in case you want to be sure the console’s camera isn’t watching you. And there’s an explicit warning that anything you say during a multiplayer session may be heard by other players. (Well, duh.)


The bottom line: How Microsoft uses your data appears reasonable, at least to us. And at the time we wrote this, of course.



Want to know everything that TechHive knows, thinks, and has written about the Microsoft Xbox One? Check out our dedicated Xbox One page, constantly updated with new content.




How old do you have to be to use Xbox services?


Kids under 13 are not allowed on the Xbox services without a parent’s permission. Kids under 17 can’t create an account without a parent’s permission.


What information does Microsoft collect on signup?


Signing up for a Microsoft Xbox account requires four pieces of information: gender, country, birthdate, and postal code. You’ll also need to provide an email account where Microsoft can contact you.


When you sign in, however, Microsoft also collects a bit more: your IP address, your web browser version, and a time and date. Further, if you use a Microsoft account to sign into a device or into software that is installed on a device, a random unique ID is assigned to the device. None of this data is assigned to you, meaning you as a distinct person. Not surprisingly, it’s all used to create a profile that Microsoft can sell to advertisers, who will send you personalized ads.


Apps that allow you to sign in with your Microsoft account can share that email and unique ID with other services. That unique (though anonymous) ID can only be used to complete a business transaction, though.


Sunset Overdrive, one of the many Xbox One games.

What information does Microsoft collect as you use its services?


Whew. Quite a bit, basically. But this should be what you’d expect Microsoft to know about as you used its services.


Once you log on and start playing games on the Xbox, Microsoft collects information regarding the number of times you sign in and sign off, games you have played, and game-score statistics. Also, Microsoft will pull Xbox console hardware and operating performance data, manufacturing codes from game discs, network performance data, and data that indicates the quality of the Xbox service itself. And, to prevent cheating, Microsoft reserves the right to collect your IP address, operating system, and Xbox Live software version. If you use Bing for searches, expect Microsoft to record search terms and also samples of any voice commands you used to perform the search. This is all used to improve your experience, according to Microsoft.


Microsoft may also collect information about what you watched using the Xbox One’s television service, and what music and videos you watched or listened to using Xbox Live.


And if you actually use the Xbox One to play games, this next bit may come as a surprise: “If you participate in leaderboards, live-hosted gameplay, achievements, tournaments, and gamer-profile sharing, Microsoft and such partners as game publishers and service providers may collect, disclose and share your game scores; game play sessions; your presence on the Services; the time you spend on or within particular portions of the Services; portions of the Services that are displayed on your monitor or screen and the duration of that display; rankings, statistics, gamer profiles, avatars, and content that you may submit; and other usage information.  These may be provided with or without attribution to you, your gamertag or avatar.”


Yikes.


How does Microsoft use all this data?


In a word, advertising. Naturally, Microsoft’s advertisers will also add cookies to your computer or console.


“Microsoft provides many of our sites and services free of charge because they are supported by advertising,” Microsoft’s privacy policy states. “In order to make these services widely available, the information we collect may be used to help improve the advertisements you see by making them more relevant to you.”


In general, Microsoft won’t share this data to a third party without your consent. Some exceptions include law enforcement requests, mergers, and “to protect life and safety.” And if you’re concerned about what data the company is accessing (and whether you can control any of it), you can always go to the My Account page.


What data does each Xbox service use?


Kinect: Xbox One’s motion camera can log you in by recognizing your face. To do so, however, it “measures distances between key points on your face to create a numeric value that represents only you”. For gameplay, Kinect will map distances between your body’s joints to create a stick figure—a “skeleton”—whose data will be stored on your console, then destroyed at the end of the session.


Sidelighting Microsoft’s Xbox One camera uses the Kinect sensor to “see” you.

Kinect is also aware of your expressions, which can be used to control a game. Like the skeleton, this data is stored locally, then destroyed at the end of your game. Some games will also photograph you. You can choose whether to keep the photos, share them, or erase them.


Microsoft does not record Skype calls. But Microsoft takes pains to note that your multiplayer sessions can be recorded. “You should not expect any level of privacy concerning your use of the live communication features such as voice chat, video and communications in live-hosted gameplay sessions offered through the Services,” Microsoft says. “We may monitor these communications to the extent permitted by law, but we cannot monitor the entire Service and make no attempt to do so.  You understand that others can record and use these communications. Communications in live-hosted gameplay sessions may also be broadcast to others.”


Xbox Music

Some games (such as Xbox Fitness) will also store fitness information on the console. You’ll have the option of providing height, weight, age, and gender to improve Xbox Fitness and its estimates of your heart rate, but that information won’t be shared with other Xbox users unless you allow it.


Finally, there’s the option to turn the Kinect on or off by using the “Kinect Off” command, or else a similar “Xbox On/Off” command. Microsoft’s said before that the Kinect sensor could be turned off, but how it’s doing it is new.


Xbox Music/Video/TV: Microsoft may display recommandations based on the content you play. It may send your device IP address, device software version, your regional and language settings, and an identifier for the content back up to Microsoft. It’s not quite clear what that ID will reveal about the source of those “shared” MP3s you acquired way back in the day. What you watch on television may be shared with your friends, but Microsoft won’t collect this information for teens and children.


GameDVR: You can choose to record a gameplay session and share it. Not surprisingly, someone else can record your multiplayer game, too.


Xbox on Windows Phone: Your location may occasionally be stored. “For example, games may use your location to award an achievement based on the distance traveled between game sessions,” Microsoft says.


SmartGlass: Microsoft’s “second-screen” SmartGlass app may pass along what games you’re using in conjunction with SmartGlass.


Xbox Social: This catchall term basically tells you that your Xbox Live Gamertag will be shared with others, as well as any high scores. Achievements—accomplishing something cool—will be shared, while “Magic Moments” (such as a perfect dance routine) will be shared only if your privacy control allows it.


Is there anything to be worried about?


While the amount of data that Microsoft is collecting is a little shocking, much of it seems like a natural offshoot of your normal interactions with its products and services. Nevertheless, you’re still “paying” above and beyond the $60 or so Microsoft and its partners will charge per game.


Still, some of you will never be satisfied. If you’re worried, for example, about the NSA peering over Microsoft’s virtual shoulder, consider a more drastic step: unplugging it when not in use. Or try wearing a mask.








Subscribe to the Daily Downloads Newsletter










Thank you for sharing this page.




Sorry! There was an error emailing this page




Source: http://www.pcworld.com/article/2060363/what-data-does-microsofts-xbox-services-collect-we-break-it-down.html#tk.rss_all
Similar Articles: breast cancer awareness   seattle seahawks   Spring High School   Sloane Stephens   taylor swift  

Inside KitKat: Changes to the lock screen widgets

Lock screen wdgets

A little extra security is added to your Android as lock screen widgets can be disabled in the system settings

Kit Kat brings a change to one of the features from Jelly Bean that everyone has an opinion about —  the lock screen widgets. On one hand, they offer a bit of information from any application that supports them (quite a lengthy list) and can be great for things like music controls or messages. On the other hand, they were kind of clunky, required at least as much interaction as unlocking the phone, and for many, seemed like a unnecessary security risk, where anyone could pick up your phone and add widgets for access to private information.

securityLock screen widgets are still present in Kit Kat, but you'll need to enable them in your settings should you wish to use them. Nestled appropriately under the "Security" section of the device settings, you'll see a line item for Enable widgets. While you're not really told as much — Google often has "issues" communicating well — the group of settings there for Owner information, Enable widgets, and Screen lock all have to do with the lock screen. An Android pro would figure it out, but not everyone's an Android pro.

Anyhoo, check the box next to Enable widgets and you'll be able to add lock screen widgets in the same way you did for Jelly Bean devices. Leave it unchecked, and you'll not be able to. If it's unchecked, and you're using a secure lock method, nobody else will be able to, either. This is how a feature like this should be offered. Nicely done, Google.


    






Source: http://feedproxy.google.com/~r/androidcentral/~3/jynE7n202m4/story01.htm
Tags: LAX shooting   Ed Sheeran   bart   nascar   legend of korra  

No. 4 Ohio St rolls past Boilermakers 56-0


WEST LAFAYETTE, Ind. (AP) — Urban Meyer thought Ohio State needed a pregame wake-up call Saturday. The Buckeyes answered with a quick flurry.

Interception return, touchdown. Two plays, touchdown. Six plays, touchdown. Two plays, touchdown. And that was just in the first quarter.

Doran Grant picked off the first pass of the game, scoring on a 33-yard return, and Braxton Miller threw for 233 yards and four touchdowns as No. 4 Ohio State extended the nation's longest winning streak to 21 with a record-breaking rout 56-0 of Purdue.

"I saw, not necessarily a sleepy look, but I just didn't like what I saw in our pregame," said Meyer, the Buckeyes' coach. "So we brought them in here and kind of rattled them up a little bit and made sure they woke up."

Did they ever.

The Buckeyes produced the highest scoring total and most lopsided victory margin in the 56-game series, surpassing marks they set in a 49-0 victory in 2010. They handed Purdue (1-7, 0-4) its first back-to-back shutouts in six decades, and the 56-point loss matched the worst in Boilermakers history. Purdue lost 56-0 to Iowa on Oct. 28, 1922 and 56-0 to Chicago on Nov. 9, 1907.

It was hardly a surprise.

Ohio State (9-0, 5-0) hasn't lost in 22 months. Meyer tied a personal best by winning his 22nd consecutive game, which includes his final victory at Florida.

Miller went 19 of 23 before giving way to Kenny Guiton for good in the second half. Guiton was 8 of 11, throwing one TD pass and running for two more. He finished with 98 yards rushing on nine carries, second only to Carlos Hyde who ran for 111 yards on eight carries.

Tight end Jeff Heuerman caught five passes for a career-high 116 yards and was one of five different Ohio State receivers to score.

Plus, the Buckeyes defense forced two turnovers, added six more sacks to their Big Ten-leading number and limited the Boilermakers to 116 total yards as a large contingent of scarlet-and-gray clad fans turned the road game into a pseudo home contest in the second half when most of the Boilermakers fans left. The combination was enough to keep Ohio State on track for a second straight perfect season and a potential berth in the BCS title game.

But the Buckeyes, admittedly, needed some early help.

"It was an early morning, we had to get up early, we had to get prepared, we had to eat well," Miller said. "We had to get the guys going and the coaches talked to us and got us hyped."

Purdue certainly didn't need that.

The game that was billed as a blackout turned into a washout.

How bad was it?

Etling, the freshman, was 13 of 29 for 89 yards.

Purdue's mistake-prone secondary was gouged so often by the Ohio State quarterbacks that the Boilers gave up a record-breaking scoring total in Ross-Ade Stadium for the second time this season.

The Boilermakers head into next week's game against Iowa with eight consecutive scoreless quarters and with the dubious achievement of failing to reach the red zone for the third consecutive game. Purdue hasn't taken a snap inside the opponents' 20-yard line since late in a Sept. 28 loss to Northern Illinois, and still hasn't beaten a Football Bowl Subdivision since Darrell Hazell took over the program after last season.

"We didn't tackle very well, we had guys out of place quite a few times (on defense) and we need to get off the blocks," Hazell said. "We can't get a quarterback beat up the way we did. We had problems in pass protection."

Miller & Co. made them pay for those miscues, seemingly every time.

On the game's second snap, Grant stepped in front of B.J. Knauf, picked off Etling's pass and sprinted 33 yards to make it 7-0.

Miller then threw a 40-yard TD pass to a wide open Jeff Heuerman on the Buckeyes' second offensive play to give Ohio State a 14-0 lead. Before the first quarter ended, Miller threw an 8-yard TD pass to Nick Vannett and a 2-yard shovel pass for a TD to Corey Brown to make it 28-0.

Not enough?

Guiton threw a 1-yard TD pass to Chris Fields midway through the second quarter, and Miller hooked up with Ezekiel Elliott on a 10-yard scoring pass later in the first half to make it 42-0 at the half. Guiton ran for two scores in the second half to close out the milestone victory.

"We're just playing Ohio State ball," Hyde said after the Buckeyes rolled up 640 yards in offense. "I expect this out of the offensive group, you know. Just come out and be explosive all day and put points up and put up yards. That's what I expect from us."

Source: http://news.yahoo.com/no-4-ohio-st-rolls-past-boilermakers-56-210043244--spt.html
Similar Articles: BBM   danielle fishel   Tony Gonzalez   remembering 9/11   freedom tower