You are on page 1of 17

Identity theft is one of the fastest-growing cyber-crimes, and, as a result, 38

states have identity theft legislation -- with some states using encryption as a
safe haven," said Southwestern Illinois Community College CIO Christine Leja. "The
education market as a whole is becoming more serious about protecting student
information and is looking to encryption as the means to making that happen."

Free WiFi Hotspot Locator from TechNewsWorld


Wondering where to find the nearest publicly available WiFi Internet access? Our
global directory of more than 100,000 locations in 26 countries is a terrific tool
for mobile computer users.
Research into encryption technology is on the rise at universities and colleges,
spurred on by technological advances, pressing security needs, and new legislation
and regulations, as Part 1 of this series notes.
Investigators in both industrial and academic settings are now looking into a wide
range of areas where encryption can be applied.
"There is a 'productization' of the technology, where it is being used to protect
USB thumb drives, shared and virtual storage environments, and throughout the
supply chain," PGP President and CEO Phil Dunkelberger told TechNewsWorld.
"Encryption is also being used with nanotechnologies and quantum cryptography,
which can guarantee secure communication among two parties. Key management is the
cornerstone of encryption and true enterprise data protection."
While most research is aimed at finding ways of creating more robust encryption
algorithms, network performance is an area that should not be overlooked,
CipherOptics' Chief Marketing Officer Jim Doherty added.
"In general, stronger encryption means more processing, which almost always means
longer processing times," he explained. "Today's high-performance networks must be
able to meet the latency requirements of delay-sensitive applications such as
Voice and Video over IP. While there may be a niche market for security over
performance types of solutions, broad adoption of new encryption algorithms will
be determined by speed as much as they are by security."

Security vs. Performance


The Rochester Institute of Technology's (RIT) networking, security and systems
administration department is undertaking exactly that type of research. Last
October, members of a study team published a paper detailing the results of their
investigation into the comparative performance of Layer 2 and Layer 3 IPSec
Ethernet encryption.
Sponsored by SafeNet, which was looking for independent testing and benchmarking
of its Ethernet Encryptors, the study was designed to test and confirm significant
performance advantages associated with using Layer 2, as opposed to Layer 3,
encryption solutions, which were suggested by earlier research.
"Today's networks require encryption to secure data as it traverses the globe.
SafeNet identified early on that the overhead resulting from the use of IPSec to
secure these networks was detrimental to network performance," SafeNet's Matt Pugh
told TechNewsWorld.
"Finding a solution required us to re-evaluate how we typically go about
protecting networks," he continued. "At SafeNet, we learned that if we could push
encryption further down the network stack -- say to Layer 2 -- huge performance
benefits could be gained in terms of latency and available bandwidth. For most
organizations, this translates directly to reduced costs of expensive WAN links."
The RIT researchers also made recommendations for future studies.
"There are a number of factors that must be considered when choosing a WAN (wide-
area network) encryption technology," they wrote. "Performance is one such factor;
however, a careful analysis must be performed to ensure the solution meets all of
the needs of the organization. A future study might work to develop a quantitative
framework for analyzing these non-performance related factors. This study was
performed using discrete frame sizes for each test run. A future study might
analyze these performance characteristics with varying frame sizes as commonly
found in mixed Internet traffic."
ID Theft, Legislation
Southwestern Illinois Community College is among a growing number of higher
education institutions building encryption into their courses and curricula -- as
well as using it on campus to protect data.
In addition to offering a data assurance course that includes an encryption
component, "there is discussion about making the class a required course, given
the new student online self-services. [The] curriculum committee and the industry
advisory group for information sciences are discussing the infusion of encryption
throughout [the college's] curriculum offering," Christine Leja, chief information
officer, told TechNewsWorld.
Legislation and the introduction of payment card security standards, such as the
Payment Card Industry Self-Assessment Standard, are encouraging colleges and
universities, as well as public and private sector organizations, to curb the
growth of identity theft. The activity is also prompting them to find applications
for encryption technology, Leja noted.
"Identity theft is one of the fastest-growing cyber-crimes, and, as a result, 38
states have identity theft legislation -- with some states using encryption as a
safe haven. Higher education provides open and secure access for its students, and
encryption offers a clear path to secure sensitive data and support an open,
mobile environment. The education market as a whole is becoming more serious about
protecting student information and is looking to encryption as the means to making
that happen," she commented.
Given constraints on available funds and time, colleges and universities for the
most part are taking a phase-in approach to their adoption of encryption
solutions, choosing one area as a starting point and expanding usage from there,
Leja explained. "In the case of securing data, the most critical data is protected
first, followed by an augmentation in services."
Putting Encryption to the Test
Southwestern Illinois is making use of GuardianEdge's encryption solution to
secure its mobile data. The first phase of the implementation focused on securing
mobile data for a team of 30 IT project managers making use of student information
for their project.
"Because the 30 team members worked both in the office and remotely, each of them
were given laptops containing the student data they required to complete the
project, thus dramatically increasing the risk of having a laptop lost or stolen,
or of the data being exposed to a non-project team member," Leja elaborated.
The need for different approaches to encrypting static and dynamic data also
factors into Southern Illinois' encryption deployment plans.
"Static data -- data stored on databases -- will be encrypted when stored and stay
encrypted until decryption is required for readability. Dynamic data is 'on the
move' and may encounter change. Encryption for dynamic data involves sharing keys
and algorithms with trusted parties to prevent open data viewing should the data
fall into nefarious hands. First, a primary focus is protecting the static data.
Encryption of dynamic data will then follow the static data," Leja explained.
While database software for application systems, such as enterprise resource
planning, provides secure encryption for static data, there is a corresponding
lack of support for dynamic data.
"What is extremely difficult is protecting dynamic data on the move via laptops,
USB devices, iPods, etc.," noted Leja. "Encryption to the device and sustained on
the device is extremely important in an academic environment where data is very
mobile."
The University's Role in Advancing Data Encryption, Part 1
Next Article in Education: The University's Role in Advancing Data Encryption,
Part 1
Print Version E-Mail Article Digg It
Mac users who've steered their computers toward the Net's red light district may
wake up to find a nasty surprise if they've hooked up with the wrong site. Malware
targeting the Mac OS X platform, a rare find, has been spotted in the wild. The
malware relies on tricking the surfer into granting certain permissions, however,
meaning it doesn't exploit a flaw in the OS X; rather, it exploits a flaw in user
behavior.

You don't have to break the bank to own powerful server technology. The HP
Proliant DL380 G5 Server with Systems Insight Manager (SIM). Comes equipped with
everything your business needs to succeed - including a smaller price tag.
Researchers at Intego, a maker of Mac-based security software, have announced they
have recently discovered malware targeting the Mac OS X on some adult-oriented Web
sites. The company dubbed the malicious Trojan software "OSX.RSPlug.A."
"A malicious Trojan Horse has been found on several pornography Web sites,
claiming to install a video codec necessary to view free pornographic videos on
Macs," Intego said.
The warning is significant because the find is relatively rare. Security
researchers have unearthed a miniscule number of Mac exploits in the wild compared
to the legions designed to attack more widely used operating systems like Windows.
"It is unusual. The number of malicious code samples for the Mac is lower than its
market share might suggest it should be. The number of malicious code threats for
Mac is in the low hundreds, most of them for versions of the OS that predate OS
X," said Andrew Jaquith, a Yankee Group analyst.

Virtual STD
Categorized as critical by Intego, OSX.RSPlug.A passes from porn sites to Macs
when users are told they need to download a new Quicktime codec.
"A great deal of spam has been posted to many Mac forums in an attempt to lead
users to these sites. When the users arrive on one of the Web sites, they see
still photos from reputed porn videos, and they click on the stills, thinking they
can view the videos, they arrive on a Web page that says the following: 'Quicktime
Player is unable to play movie file. Please click here to download new version of
code,'" Intego explained.
The deception continues when the phony program download requires users to consent
to a fake license agreement. Once users have agreed, they then must give
permission for the program to install, done by entering their user name and
password. Files are delivered as a Disk Image (DMG) file.
Once installed, the malware changes DNS server entries in order to direct Internet
users to phony Web sites where they will unwittingly divulge user names, passwords
and other sensitive information. Criminals could then take the data and use it to
commit phishing schemes, identity theft or "drive traffic to alternative Web
sites," according to Sophos .
Testing by Sophos has found that the Trojan changes DNS server settings -- used to
match up domain names with IP addresses and request information from that Web site
-- to point to "ones located in Belarus." On the other end, hackers are notified
that they have a new victim, the OS version and that it is a Mac user.
Mac OS X 10.4, or Tiger, users will have no way to tell that their DNS server has
been changed. Leopard users can go to their Advanced Network preferences, Integro
advised. The newly added servers are "dimmed and cannot be removed manually."
The Trojan also installs a root crontab that checks every minute to verify that
the DNS server is still active.
Your Worst Enemy
The problem, however, in this instance is not a deficiency or flaw in the Mac
operating system but more a case of human error. Users should never download
content from an unknown source. Since the Trojan is only downloaded from porn
sites, security experts said it actually poses little risk to the bulk of Mac
owners.
"This is relatively low risk. It's distributed by porn sites, apparently, so it's
really only a risk to porn-surfers who are also susceptible to social engineering.
It requires the user's consent to install," Jaquith explained.
The Trojan has larger implications for Mac users who up until now have only had to
deal with a small fraction of the malicious malware PC users contend with.
However, as Apple's (Nasdaq: AAPL) share of the computer market continues to
increase, Macs have been besieged by a growing number of exploits.
"This signals that Web threats and specifically Web exploits are going to be
cross-platform or cross-operating system. So there really isn't a user group out
there that is impervious to user threats," Mike Haro, senior security consultant
at Sophos, told MacNewsWorld.
"As Apple increases their market share you'll probably see a lot more hackers and
malware developers develop Trojans and viruses that will affect Mac users,"
Terrence Brewton, a Frost & Sullivan analyst, told MacNewsWorld.
Next Article in Security: Security Flaw Doesn't Discriminate
Print Version E-Mail Article Digg It
Think of a medical study that is backed by experimental data and statistical
analysis. This study gets published in an academic journal, and its findings are
picked up by the mainstream media. The coverage helps shape political debate,
policy, funding and public opinion. It is important that all of this information
-- both the mass-media sound bites and the original experimental data and raw
numbers -- is widely available.

You don't have to break the bank to own powerful server technology. The HP
Proliant DL380 G5 Server with Systems Insight Manager (SIM). Comes equipped with
everything your business needs to succeed - including a smaller price tag.
Google (Nasdaq: GOOG) , Wikipedia and other information resources have changed the
world in many ways, but their users generally search via words, not numbers. Now,
those who think about and work with numbers are helping the world's numeracy catch
up with its literacy.
Web sites like MappingWorlds.com, Swivel.com and Data360.org are promoting data
availability so that anyone with access to a computer can browse data, visualize
it in a number of ways, learn from professionals in the field and share their
insights with the rest of the world.
Why is this important? Global health threats make the world seem ever smaller.
Viruses and other illnesses ignore borders and leapfrog from continent to
continent, exploiting new connections between nations, goods and people. Severe
acute respiratory syndrome (SARS) and multidrug-resistant tuberculosis (MDR-TB)
show how local outbreaks can have global impacts within days.

Information is Key
Yet the tools to combat these illnesses do not travel nearly as efficiently as
their pathogens. Information often moves slowly from wealthy nations to developing
countries, and too often it does not move at all, preventing appropriate medical
treatments from being implemented. Drugs and treatment regimens are not the only
tools needed to address global health issues. Numbers are the raw material of
science, and increasing access to data can lead to better health care worldwide.
Think of a medical study that is backed by experimental data and statistical
analysis. This study gets published in an academic journal, and its findings are
picked up by the mainstream media. The coverage helps shape political debate,
policy, funding and public opinion. It is important that all of this information
-- both the mass-media sound bites and the original experimental data and raw
numbers -- is widely available. While no one will dispute the importance of
publicity, access to the original data is equally critical so that research,
interpretation and experimentation will continue.
Much of the effort and infrastructure behind the Internet has focused on improving
access to information. Yet despite the Internet and other communications
technologies' profound impacts on the advancement of human knowledge, numbers have
been somewhat neglected.
A New Focus
The primary focus has been narrative text that interprets raw data. Access to the
data has only recently become a focus for innovation, tied to the growing
realization that without the numbers, research findings can easily be
misrepresented. Lack of raw data constrains further research that could save lives
worldwide. It also prevents informed discussion, as readers of narrative material
are forced to take claims about research at face value.
Consider the WHO/UNICEF guidelines for infant feeding by HIV-positive mothers in
Africa. When they are not implemented effectively under operational conditions in
the field, the result can be more infant deaths. Data and methodology can differ
from country to country, as in the case of Botswana and Kenya. Those making
recommendations in the field need access to all the facts for better decision-
making in individual circumstances.
Access to the best data is a critical component of improving population health.
Important findings are not confined to one indicator, methodology or organization.
As avian influenza and SARS have shown, useful analysis can link areas as diverse
as epidemiology, agriculture and weather. Yet philanthropists, policy-makers,
scientists, practitioners and students often lack access to basic data they need
to assess priorities for public health.
Data Access Saves Lives
How can public health professionals see the broader impact of their work? The key
is free access to data from many different sources. These data must be made clear
and engaging to spur insight, facilitate application and solve problems.
Tools are being developed to help more people use basic data and encourage fact-
based decision-making. These platforms provide ways to access and understand data
that were previously reserved for academics. New tools provide consistent and
constantly updated access to data culled from many domains. These numbers can
forge communities of similar interests and spark new public health perspectives.
Improving numeracy will improve health by keeping professionals involved,
governments honest and citizens informed. Data and tools accessible to all can
empower civil societies around the globe. Ultimately, this transparency leads to
better data, better debate, better policy decisions and longer lives.
? 2007 World Health Organization. All rights reserved.
Alibaba.com Ltd., one of China's fastest-growing technology companies, reached its
goal of raising $1.5 billion in its initial public offering Saturday, people close
to the deal said.
Alibaba, an e-commerce portal, sold 858.9 million shares, or a 17 percent stake,
at roughly $1.75 each, a source told Dow Jones Newswires on condition of
anonymity.
The shares will debut on the Hong Kong stock market on Nov. 6.
The IPO price translates to a multiple of 55 times its forecast 2008 earnings,
above the 34 times price-to-earnings ratio of Nasdaq-listed business-to-business
search engine Global Sources Ltd., analysts said earlier. But the ratio is much
lower than the 83 times price-to-earnings multiple of Chinese-language Internet-
search provider Baidu.com Inc.
The IPO has drawn huge interest in Hong Kong, with the retail tranche of 128.83
million shares more than 250 times oversubscribed by Friday, newspaper reports
said.
Alibaba drew $57.7 billion in orders for the retail shares -- the largest in the
territory's IPO history. The institutional tranche had locked up about $180
billion in subscriptions, The Standard reported, citing unnamed people involved in
the deal.
The underwriters have an option to release an additional 113.67 million shares.
Analysts said surging demand for Alibaba and other shares had pushed up the local
currency, prompting the monetary authority -- Hong Kong's de facto central bank --
to step in for the second time in a week to defend its peg to the U.S. dollar.
The monetary authority bought about $100 million on Friday when the U.S. currency
reached about $1, the upper limit of the narrow range in which it trades against
the greenback.
It sold a similar amount of Hong Kong dollars on Tuesday.
Alibaba Group founder, Jack Ma, has said proceeds from the IPO would be spent on
acquisitions and development, designed to grow the company's business both in
China and overseas.
Alibaba -- whose Web sites allow companies in China and overseas to trade with one
another online -- is one of China's fastest growing Internet companies. It has
seen its registered members soar from 6 million in 2004 to 24.6 million in 2007.
Paying members increased from 77,000 in 2004 to 255,000 by June 2007.
Yahoo! Inc., which holds a 39 percent stake in Alibaba's parent, Alibaba Group,
had agreed to subscribe to about $100 million worth of shares.
Alibaba said another seven investors had agreed to take a stake, representing
about $296 million, or 20 percent of the offering.

? 2007 Associated Press/AP Online. All rights reserved.


? 2007 Top Tech News. All rights reserved.
SEATTLE, Washington (AP) -- Some academics cringe when students turn to Wikipedia
as a reference for term papers.
University of Washington-Bothell professor Martha Groom has more of an "If you
can't beat 'em, join 'em" response to the online encyclopedia that anyone can
write or edit.
Instead of asking students in her environmental history course to turn in one big
paper at the end of the semester, she requires them either to write an original
Wikipedia article or to do a major edit on an existing one.
The inspiration came to her as she prepared teaching materials for her class.
"I would find these things on Wikipedia," she said, and would think, "Gosh, this
is awfully thin here. I wonder if my students could fill this in?"
Wikipedia has been vilified as a petri dish for misinformation, and the variable
accuracy of its articles is a point Groom readily concedes. Since the advent of
the Web, she said, the quality of sources students cite has deteriorated.
For her students, the Wikipedia experiment was "transformative," and students'
writing online proved better than the average undergrad research paper.
Knowing their work was headed for the Web, not just one harried professor's eyes,
helped students reach higher -- as did the standards set by the volunteer
"Wikipedians" who police entries for accuracy and neutral tone, Groom said.
The exercise also gave students a taste of working in the real world of peer-
reviewed research.
Most of the articles were well received, but Groom said some students caught heat
from Wikipedia editors for doing exactly what college students are trained to do:
write an argumentative, critical essay.
"Some people were a little rude," she said of the anonymous Wikipedia editors.
Ultimately, she had to teach the students the difference between good secondary
research and the average college paper.
"You don't get to say that last little bit on, 'This is why this is the truth and
the way,"' she
LucasArts, owner of the "Star Wars" franchise of video games, has announced a
partnership with BioWare, a veteran of massively multiplayer online role-playing
games. Though details on what their "interactive entertainment" offering will
actually be are scarce, watchers are loudly buzzing that it may be a "Star Wars"
MMO.

Vendor White Papers �C Featured Listings


ECT News Network's directory of e-business, IT and CRM white papers provides
resources you need to make informed purchasing decisions. Browse Listings.
"Star Wars" fans got a lot to think about following the announcement Tuesday from
LucasArts and BioWare that the two companies have teamed up on what they call an
"interactive entertainment" product.
"LucasArts has a deep commitment to developing compelling stories and characters
for the unique medium of interactive entertainment, and we have been searching for
a developer that shares this value. We found this in BioWare," said Jim Ward,
president of LucasArts.
The project, few details of which where divulged, will be the second collaboration
between the two. In 2003, a BioWare and LucasArts partnership resulted in the
release of "Star Wars: Knights of the Old Republic" ("KOTOR"). BioWare's Odyssey
Engine, developed for "KOTOR" was also used for the second version, "Star Wars:
Knights of the Old Republic II: The Sith Lords," released in 2004.
"Through our previous collaborations, we know that BioWare has an impressive
ability to blend gripping stories with technological advancements, and we believe
that our upcoming product will deliver an experience that will span the
traditional boundaries of video game entertainment," Ward continued.
'KOTOR' MMORPG?
Details in the release were kept to a minimum, but the game collaborators did say
the product "will push the boundaries of the gaming market by utilizing the
strengths of both companies to deliver an innovative, high-quality experience."
The release promises more information "at a later date," but that has only served
to fuel the rumor mill in the gaming blogosphere. General consensus from gaming
pundits is that the deal strongly points to the creation of a massively
multiplayer online role-playing game (MMORPG) that takes gamers into the "Star
Wars" universe.
LucasArts brings its overall focus on reality and creating very beautiful games
with its visual expertise, said Rob Enderle, principal analyst at the Enderle
Group. BioWare, meanwhile, tells great stories and can take a good idea and weave
it into something that is compelling and powerful.
"In the combination of the two, you get beauty and the power of the story," he
noted. "[LucasArts has 'Star Wars'], and clearly this is tied to that."
"BioWare made the "Star Wars: Knights of the Old Republic" games; both were RPGs,"
Michael Pachter, a Wedbush Morgan analyst, told TechNewsWorld. "BioWare is working
on an MMORPG -- not yet announced -- according to Electronic Arts (Nasdaq: ERTS)
(EA)," said Michael Pachter.
As BioWare will soon join Pandemic under the EA umbrella, a move that cost EA
US$860 million, bets are fairly good that the software publisher knows of what it
speaks.
"Putting two and two together, it's likely that BioWare is working on 'SWKOTOR' as
an MMORPG," Pachter said.
Strong Competitor
LucasArts could barely be blamed for thinking a Star Wars MMORPG might be a good
idea, judging the massive success of "World of Warcraft" (WoW) and its sequel "The
Burning Crusade," not to mention the legions of "Star Wars" fans worldwide.
"The idea that they might do a massively multiplayer online game is probably a
good one," Enderle continued. "With 'World of Warcraft' remaining dominant even in
the face of properties using 'Lord of the Rings' and others, there is an
opportunity to at least create something that is as compelling using the
capabilities of both firms a combination of stories, visual effects and the 'Star
Wars' franchise."
Since its debut in 2004, WoW has attracted more than 9 million gamers to its
online universe, according to Blizzard Entertainment. A "Star Wars" MMO will not
come close to those numbers, Pachter told TechNewsWorld, but it will still do
well.
"No MMORPG will rival WoW in terms of popularity," he stated. "Two million
subscribers would be a humongous win, or less than 25 percent of WoW's number."
Dough-Nu Matic Makes a Dozen Donuts in Less Than Six Minutes
Posted Nov 1st 2007 4:07PM by Terrence O'Brien

We're ordering one for the Switched offices. That's all there is to it. AOL will
just have to foot the bill for our out of control cholesterol levels. The Dough-
Nu-Matic forms, fries and dispenses mini donuts automatically.
This might the greatest invention since the wheel. Think about it. No more runs to
Dunkin' Donuts to get your fill of deep fried sugary goodness. You can sit around
and get fat with out the help of a drive-through window.

This symbol of American ingenuity (or gluttony) can be had for $130 through the
most appropriate of retailers, SkyMall.

From Boing Boing

Related Links:
* Mousetrap Gases Rodents, Texts You When It's Done
* Dog Shaped Dog Cooker
* Automated Pet Feeder Also Talks
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Is 'Manhunt 2' the Most Violent Video Game Ever?
Posted Nov 1st 2007 2:34PM by Terrence O'Brien
Filed under: Video Games

Rockstar, maker of the ever popular 'Grand Theft Auto' series, got in on the
Halloween action yesterday and released its new ultra violent and extremely
controversial title 'Manhunt 2.' After being banned in Britain, twice, a greatly
toned down version of the game is seeing the light of day in the US.
In the game you play a patient in a mental institution with some, um... violent
tendencies. Some are in fact claiming that 'Manhunt 2' is the most violent video
game ever. The Wii version might be the most disturbing, requiring you to
pantomime the deadly acts with the motion sensing controller.

Feel a need to rip out a skull with a sickle? Beat a cop to death with a his own
night stick? Or perhaps caving in a person's head with a fire extinguisher is more
your style. If any of these three things sounds exciting to you, then you are a
sick person.

The title is rated 'M' for mature audiences, meaning that no one under the age of
17 can purchase it. However, these rules are easy to circumvent and rarely
enforced. We normally don't buy into the dangers of video games mumbo-jumbo, but
the idea of small children physically acting out acts of such brutal violence is a
little shiver-inducing. Parents may want to be extra vigilant and keep their young
away from this title.
What do you think? Is this just over-hyped hysteria about what is essentially a
fictional game? Or do you think 'Manhunt 2' has gone too far?

From CBS.

Related Links:
* 'Manhunt2' Banned Again in UK
* Judge Strikes Down Violent Video Game Law
* Violent Video Games a Visual History
Add your comment ?
* Permalink
* Comments (4)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Citing High Price, Kmart Stops Selling Blu-ray Players
Posted Nov 1st 2007 1:14PM by Tim Stevens
Filed under: Audio/Video
In the war of Blu-ray vs. HD-DVD, each of the opposing camps seems to think that
having an exclusivity deal is a powerful weapon.
It started in June, with Blockbuster making a big deal about going exclusive for
Blu-ray in its brick-and-mortar stores (despite still offering both formats in its
Netflix-like online rental service). Most recently, it was Paramount going
exclusive to HD-DVD, meaning that, at least for the moment, the only place to get
'Transformers' in high definition is with that format.
Now comes an intriguing new twist. According to BetaNews, It looks like Kmart has
chosen to stop selling Blu-ray players. The discount retailer cited the high cost
of Blu-ray players (compared to HD-DVD players), which doesn't end up being a good
value for its customers.
As we reported earlier this week, you can currently buy an HD-DVD player for under
$200, and before the end of the year, they should be available for under $170 (you
can get one for $100 tomorrow only at select Wal-marts). By comparison, the
cheapest Blu-ray player currently clocks in at around $375.
Given that both formats offer the same video quality, Kmart is of the opinion that
Blu-ray just doesn't make sense. Of course, given that this announcement is being
made by the HD-DVD Promotion Group also suggests that some of this might be spin.
Also, when it comes to influencing the minds of many shoppers, the name "Kmart"
doesn't exactly have quite the ring it used to.

What is clear is that this war, if it can be called that, is destined to rage on
for quite some time yet. HD-DVD players are definitely taking the value route
while Blu-ray advertising seems to be targeting higher-end customers. Still, with
Blu-ray players finally adding the ability to have tricks like picture-in-picture
and other next-gen extras, which HD-DVD players have long-since offered, it looks
like these formats are only getting more alike. With that in mind, the question of
cost may be the deciding factor for many in the long run.

From BetaNews

Related Links:
* HD-DVD Players Drop to Sub-$200 Price Tag
* Xbox 360 With Built-In HD-DVD Capability On Its Way?
* Headaches for Blu-ray Owners
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
HD-DVD Players Drop to $100, For One Day
Posted Nov 1st 2007 12:17PM by Terrence O'Brien
Filed under: Audio/Video, TV

No that photo is not doctored. The Toshiba HD-A2 that we reported just a few short
days ago had dropped to $200 is being marked down even further at select Wal-Mart
stores. Check here to see if the sale is coming to a store near you. The sale is
this Friday (tomorrow) only.

Price-wise, Blu-ray's back is against the wall at this point. The fight for HD
supremacy is far from over, but with the cheapest Blu-ray players coming in at
almost $400, HD-DVD has scored a clear victory just in time for the holidays.

From Engadget

Related Links:
* HD-DVD Players Drop to Sub $200 Price Tag
* Headaches for Blu-ray Owners
* Xbox 360 With Built-In HD-DVD Capabilities On the Way?
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
MacBooks Get Upgrades -- Should You Have Waited?
Posted Nov 1st 2007 11:14AM by Tim Stevens
Filed under: Computers
Not content to sit back and bask in the praise for Leopard, Apple has given its
MacBook line a bit of a freshening. None of the specs are a huge boost, but they
will bring some welcome performance increases to the slick portables, and, like so
many of Apple's surprise updates, will be enough to make anyone who purchased last
week wish they'd waited.

All the MacBooks have moved to the Santa Rosa architecture. This is a new(er)
offering from Intel that offers a better blend of performance and power efficiency
for mobile computers.
More important, though, is the shift to a new graphics processor, the GMA X3100,
which should offer much better performance in games and other graphics-intensive
applications than the GMA 950 processor found in older MacBooks.
Finally, the MacBook Pro series top speed has been upped to 2.6-gigaherz from the
previous 2.4-gigaherz, though that upgrade comes at a $250 premium. The base
MacBook still starts at a quite economical $1,099. The MacBook Pro starts at
$1,999, though if you want that 2.6-gigaherz chip, you'll have to spend at least
$2,749.

So, if you were thinking of moving on to a new MacBook, now would probably be a
good time -- before Apple upgrades again and you're one of the poor suckers who
bought a week too early.

From Engadget

Related Links:
* Apple's New Leopard Hits Illegal Download Sites
* Leopard Out Tomorrow, and the Reviews Are Positive
* iMac Touch-Screen on the Way?
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Coming Soon -- the Fully-Customizable Linux Phone
Posted Nov 1st 2007 9:07AM by Terrence O'Brien
Filed under: Cell Phones, Computers, iPhone

The Linux revolution is making a run for the smart phone market. This isn't
exactly new news. In fact, Linux started taking off in the cell phone market in
about 2003. Major companies from NEC to Samsung are shipping phones loaded with
the open source OS, though primarily in China, and Motorola seems to be slowly-
but-surely letting Linux take over its hand-held line up. Certain versions of the
RAZR 2, the ROKR, the SCPL, and the China-only Ming all run a custom version of
Linux designed by Motorola.

The problem is that all of these companies run their own customized, closed, and
incompatible versions of Linux. Luckily, two companies are working on open,
standardized, and in the case of OpenMoko (pictured above), completely free and
open sourced versions of Linux for hand-helds. This doesn't mean much to those of
us who can't program, but all those intrepid programmers and hackers out there are
usually very willing to share the fruits of their labor with the rest of us.

A standardized mobile Linux would have many advantages. For one, an almost endless
supply of applications are bound to pop up, and no convoluted hacking is required
(as is the case with the iPhone). Additionally, the low overhead required for
Linux means a much faster and more responsive device than anything out there
running Windows Mobile. As for Palm OS (which has an oft-delayed Linux based
successor in the works), well, it's showing its age and simply unable to compete
with the capabilities of a Linux phone.

Wired writer Paul Adams ordered himself a pre-alpha (which means it's just past
the conceptual stage) version of the OpenMoko Neo1973. The Neo1973 is currently
intended for developers, but anyone can order it for $450. The device is small and
rounded on both ends, and features a large bright touch screen. It doesn't skip on
other features either, Bluetooth, GPS, MicroSD slot, and globe-hopping quad-band
GSM so it can work on all five continents. In essence, these are all the goodies
you've come to expect from high end smart phones. Future versions of the phone
will feature Wi-Fi as well.

Sadly for Adams, and OpenMoko, the first "tussle" with the Linux-based supposed
iPhone-killer was less than smooth, to put it lightly. At first, the phone
wouldn't boot at all. Then Adams discovered he had to download the software
separately to install on the phone. Once booted, he found the GPS only functioned
through obscure text commands from the terminal, and that the phone couldn't
connect to his T-Mobile network for some reason.

In the end, Adams opted to install OpenMoko's primary competitor, Trolltech's


Qtopia, the more mature, but partially proprietary hand-held Linux variant. After
installing Qtopia, the phone worked almost perfectly allowing Adams to send text
messages and make calls.
So, OpenMoko's software platform isn't quite usable yet, so we certainly don't
suggest buying one any time soon. However, the ability to simply replace the OS on
the OpenMoko is certainly an attractive feature. Imagine picking up the latest LG
handset, deciding you don't like preloaded interface, and simply downloading a
replacement that seems more your style. That's a cell-phone future we can get
behind.

From Wired

Related links:
* Intel Shows Off Prototype iPhone Killer
* Are Your Ready to Ditch Windows?
* Dell Selling Linux Based Computers
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Wearable Antenna Uses Your Body to Get Better Reception
Posted Nov 1st 2007 8:01AM by Evan Shamoon
Filed under: Audio/Video, Cell Phones, TV

Humans are a weird species. Check this out: NEC has just announced its wideband
wearable antenna, which essentially turns a a person (wearing a special suit) into
a high-performance mobile antenna. The prototype apparently works in either open
space or when using the human body for conduction. The plan is to use it for
digital terrestrial broadcasts, so presumably for live TV broadcasts to your cell
phone?

Seriously, though. You don't see goats or chimpanzees pulling these sorts of
shenanigans.

At least we know what we're dress up as for Halloween next year. (A human
antenna).

From Engadget

Related Links:

* William Shatner to appear in next Star Trek movie


* Regis and Kathy Lee go 3D
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Even Search Engines Dress Up for Halloween
Posted Oct 31st 2007 6:03PM by Colin McDonald
Filed under: Top Lists, Google, YouTube
It's no secret that the Web's heavy hitters like to show their seasonal spirit
with mods of the subtle and not-so-subtle variety to their brand identities.
Google's logo has become especially known for its Google Doodles, and this year's
full-on ghoulish painting logo continue that fine, quirky tradition.

The search giant has even dressed up its significant new addition to the family in
some festive holiday threads (though if our TV became a pumpkin we'd be a little
upset). BooTube, anyone?

Our last spooky Google shoutout comes via our friends at Geeksugar - we've been
flying a witch through Google Street View all day! Head over and give it a try �C
a little rehearsal of the trick or treating route through your neighborhood for
the evening can't hurt!

Google's not the only one having fun with logo ornamentation, though. In fact, our
research indicates that Halloween logo competition may be just as fierce as
competition for your search queries. Yahoo, for one, has made their logo the
center of an entire bone-rattling animation. We only have a still to show you
here, so check out its homepage for the show!

However, we think that Ask has won our haunted hearts by placing its entire
homepage in a Jack-O-Lantern lit night. Can you think of a better setting for your
last minute costume questions?

Until next year (or Thanksgiving, at least), thanks for indulging our logo lust,
and stay safe out there tonight!

Related Links:
* How to Print Your Own Halloween Mask

Add your comment ?


* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
The 10 Most Annoying Things On the Internet
Posted Oct 31st 2007 4:37PM by Terrence O'Brien
Filed under: Computers, Top Lists

There's plenty to love about the Internet. But there is also plenty to loathe.
Ridiculous banner ads, the crappy quality of the vast majority of Web video, and
complex Web 2.0 services without any support.

PC World surveyed its readers and found out what they think the Top 10 Web
Annoyances are. From Ticket Master to trolls (those people who post annoying,
nonstop comments on forums), there's plenty of annoying stuff you'll recognize in
this piece.
Online forms -- a pet peeve of ours -- makes the list. These overly complex forms
that ask for a head scratching amount of personal information just to read an
article or post on a forum are, to put it lightly, a bit pain in the ___. We can't
count the number of times we've spent five minutes filling out a form, only to
have missed a "required field" that wasn't marked clearly. Or the instances where
we've input an answer in an unsuitable format that had no instructions, only to
have the form clear itself completely and tell us we messed something up (but not
tell us what!).

For all the convenience it has brought us, the Internet sure is annoying.
How about you? What do you think is the most annoying stuff on the Internet?

From PC World

Related Links:
* Top 11 Celebrity Messes Online
* Top 11 Geek T-Shirts
* Best Gadgets for New Moms
Add your comment ?
* Permalink
* Comments (21)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
British Army Testing Tech That Makes Tanks and Troops Invisible
Posted Oct 31st 2007 2:51PM by Tim Stevens
Filed under: Computers

So you may be able to earn college credit learning to speak Klingon, and you can
order yourself replicas of many bits of Klingon weaponry. But even though you may
wish it otherwise, you have to face facts: Klingons are not real. That other bane
of the Starfleet's existence, the cloaking shield, isn't real either.

That said, it seems we may be getting closer to invisibility becoming a reality,


at least if results from a recent British test are to believed. According the
Daily Mail, British forces recently demo'd technology that can "make a vehicle
seem to completely disappear."

Unlike the Klingon technology, which is said to form a field that bends light
around the ship, the British cloaking technology relies on cameras and projectors
to actually project a picture of what's behind the vehicle onto the vehicle
itself. The tanks, such as the ones pictured above, are said to have been painted
in a highly reflective paint that effectively turns them into big, rumbling movie
screens.
In true science-project style, the technology is loosely demonstrated with what
looks like a small volleyball in this random video from Japan.
The system is being developed by QnetiQ, which has worked on other random cool
tech projects that range from a long-distance solar powered aircraft to a machine
that can measure your feet in 3-D. Cloaking apparently is just the company's
latest experiment ... at least the latest one that we've been allowed to hear
about.

From Daily Mail (via Engadget)

Related Links:
* Video Game Trains Airport Security Guards
* Gay Bomb Makes Love, Not War
* The Defense Department's New Robot Dogs
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
New 'Simpsons' Game Is Actually Good
Posted Oct 31st 2007 1:49PM by Switched Staff
Filed under: Video Games

'The Simpsons' game has finally touched down at retai (well, tomorrow, anywayl,
and the reviews, such as GameDaily's, are starting to trickle in. Meanwhile, IGN
says it's got "a sense of humor that can only be described as equal to Simpsons
episodes of old," and 1up notes that "while the action can be uneven -- though
never bad -- creativity and charm carry the game to a higher level."

Our hands-on take? It's easily the best Simpsons game since the original arcade
rendition Konami put out in 1991; Simpsons fans will find tons to love, as the
game is peppered with an amazing number of characters, references, and in-jokes
from the show. Those simply looking for a great action game may have some better
options, though; The combat is a bit simplistic, and there are quite a few obtuse
puzzles that will slow your progress (read: frustrate the living daylights out of
you).

Definitely worth a rental for casual fans, and if you're a Simpsons junkie, go
ahead and spend the sixty bucks.
Related Links:
* 'The Simpsons' On Your Cell Phone
* 'CSI' and 'The Office' Coming to Second Life
* 'Guitar Hero III' Is Ready to Rock, Say Reviews
Add your comment ?
* Permalink
* Comments (0)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Five Percent of U.S. Electricity Wasted By "Vampire" Electronics
Posted Oct 31st 2007 12:27PM by Terrence O'Brien
Filed under: Audio/Video, Cell Phones, Computers, TV, Green Tech

You may not know it, but your electronics use electricity even when they're "off."
Most home electronics, including your microwave, TV, and DVD player, continue to
consume small amounts of power even after you're done using them. Why? Because
rather than switch off all electronic circuits, gadgets and devices often switch
into "standby" mode.

This small amount of power adds up over time. It's estimated that five percent of
all electricity in the United States is wasted powering devices that are not in
use, and that figure could rise to 20 percent by 2010, according to the Department
of Energy.

California, which is usually at the forefront of conservation efforts, passed the


Vampire Slayers Act last year, which requires that electronics have a tag
detailing the amount of energy used not only during normal use, but also in
standby mode, as well as when turned off.

Even chargers, such as those for cell phones, are a major drain on the system.
They use up a trickle of energy after the phone is completely charged, or even if
the phone is disconnected.

You can avoid adding to the problem with some simple tips:
* Unplug any devices you can when not in use. If you're done charging your phone,
don't simply disconnect the phone, but unplug the charger completely. The same
goes for laptops, electric razors and toothbrushes. When you're done watching TV,
unplug the set from the wall.
* Utilize power strips. Plug your home entertainment system, as well as your
computer, monitor and other peripherals into power strips or surge protectors so
that you can easily shut off the whole set up when you're done. You can try
"Smart" power strips, which shut off automatically if a device isn't on for a
certain period of time, as well as shut off, say, all your peripherals if you turn
off your computer. (That said, make sure to keep your cable box plugged in to a
separate, always-on power strip, since the cable box often de-authorizes itself if
left unplugged for too long.)
* Look for the Energy Star logo. The government backed program rates electronics
on energy efficiency. Looking for electronics with the highest Energy Star rating
possible will guarantee you waste as little electricity as possible.

Vampire electronics not only drive up your electricity bill, but also drive up the
price of energy in general and pollute our environment. These tips along with
switching your light bulbs to compact fluorescent bulbs will make sure you
contribute as little as possible to global warming.

From AOL News (AP)

Related Links:
* Earth-Friendly Tech
* Earth-Friendly Tech Tips
* iPhone Bad for Environment, Says Greenpeace
* Internet Eats Up Nearly 10% of US Electricity
* Ford Developing 100 MPG Escort Hybrid
Add your comment ?
* Permalink
* Comments (24)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Rover Video of Mars "Dust Devil"
Posted Oct 31st 2007 11:38AM by Tim Stevens
Filed under: Cameras

You've probably seen dust devils swirling about on a windy day. They're basically
mini-tornadoes that form when turbulent air sucks up some dust or snow or other
debris into a column. Usually they're only a few feet high, but sometimes they can
be much, much larger.
On Mars, apparently, they can apparently be several kilometers high, as attested
by the above image captured by Spirit, one of the Mars Rovers. The animation
(based on a series of pictures and available in a larger version here) shows a
dust devil travelling from left to right across the Martian landscape. The surface
there is so dusty that these columns of air are particularly noticeable, even from
sattelite images as shown in this NASA article on the subject.

This is a graphic display that Mars does indeed have an atmosphere, and a strong
one at that, despite having less than one percent of the pressure of our
atmosphere here on earth.
The footage is a few months old, but we're huge Mars nuts and haven't seen it yet.
If anybody's got any other similar clips or links to similar videos, let us know
below.

From NASA

Related Links:
* William Shatner to Appear In Next 'Star Trek' Movie
* X-Wing Rocket Succumbs to The Force (Of Gravity)
* Real-Life 'Star Wars' X-Wing To Launch Next Week
Add your comment ?
* Permalink
* Comments (50)
* Email this
* IM this
* Share
o Add this post to...
o Netscape
o Digg
o Del.icio.us
Mo Rocca Talks About Baring It All, Online
Posted Oct 31st 2007 10:51AM by Switched Staff
Filed under: <a href="/category/editors-pick

You might also like