BBC NEWS | Europe | South Ossetia clashes intensify
...US Secretary of State Condoleezza Rice called on Russia to pull its troops out of Georgia and respect its territorial integrity...She probably says it without irony.
BBC NEWS | Europe | South Ossetia clashes intensify
...US Secretary of State Condoleezza Rice called on Russia to pull its troops out of Georgia and respect its territorial integrity...She probably says it without irony.
Gordon's Tech: GrandDialer: will this help my phone bill?
But what if I could use my GrandCentral account to call Canada, then GrandCentral connects me in?
GrandDialer would make that easier:
GrandDialer, an iPhone app for GrandCentral - The Unofficial Apple Weblog (TUAW)...GrandDialer (iTunes link) allows you to use your iPhone to call people using your GrandCentral telephone number....
This is using the GrandCentral "Click2Call" feature.Briefly, it works. For most people this is a curiosity, but free AT&T cell calls to Montreal will pay for my iPhone.
... AT&T guy: "Thanks for joining us today. We really admire the work you've done at Google. We know you appreciate the fiber services we provide, and you understand why it's only fair that Google pay a bit more for the quality of service only we can provide."AT&T is living off the big bucks they charge me for long distance calls. If they lost their long distance service they'd fall over dead.
Google guy's phone starts playing The Rolling Stone's "Under my Thumb".
Google guy: "Sorry about that. It's the ring tone I use for my GrandCentral calls. You understand ..."
AT&T guy: Would a 5% volume discount be ok?
BBC NEWS | Technology | Net address bug worse than fearedOf course they should. They should also lose 50 lbs, run ten miles a morning, study a new language every month, and master levitation.
... Mr Silva at VeriSign said even though patches have been put in place, this doesn't mean users can sit back and relax.
'The biggest gap in security rests between the keyboard and the back of the chair,' he said.
'The look and feel of a website is not what a consumer should trust. They should trust the security behind that website and do simple things like use more secure passwords and change their password regularly...
Gordon's Tech: How to steal my Google accountThis madness has to stop. The stupidity is hurting my brain.
... Yes, to steal my Google account, my primary digital identity, all you need to know is my first phone number...
- Passwords are a complete fail. Schneier has been saying this for years. We are now into the realm of madness. We need multi-factor authentication devices that handle our secondary authentication for us. Yeah, it's not perfect, but, really, this is s#$!@# insane.
- We live in the age of the tyranny of the mean. Even the vast majority of geeks aren't going to figure out how to sync 1Password with an iPhone. Regular folks are going to use one password everywhere and then forget it. Google, like everyone else with these asinine security question is bowing to the reality that humans didn't evolve to live in a digital world. We're maxing out right now.
Chuqui has almost as many typos as me, and that’s saying something. Read around ‘em though, because he’s written a very unusual post about how Apple does business. Shockingly, Apple is not Steve Jobs, though he is an amazingly hands-on CEO.
For the first time I’m actually thinking MobileMe might be get fixed before January 2009. That would be very good – especially Apple is also able to add calendar publish and subscribe features. I especially would like to see CalDAV sync with gCal (not entirely far fetched since CalDAV is built into OS X iCal).
My iPhone Address book, with about 400 entries, is pretty darned slow ...
Gordon's Tech: iPhone notes you won't read elsewhere
... The Address Book is very slow to launch (4 secs on my phone), but Google Mobile search also searches the Address Book -- and it's fast...
My Palm address book, with about 600 entries, launches instantly. There's no perceptible delay.
Time to select an address on the Palm? Maybe 1-2 sec. On the iPhone? Maybe 6-7 seconds. (Faster if you use Google Mobile.)
The iPhone has, of course, at least fifty times the processor speed and more than 1,600 times the memory capacity of the original Palm.
The Palm had essentially instantaneous responsiveness from day one. It was one of the design goals of the original team. The Palm was to have instant on, no user waiting for a system response, and no crashes. Incredibly, the original Palm team met those goals. Later ... well, that's a sadder story.
Apple will one day fix the iPhone Address Book problems. Heck, Google Mobile already has. It is a good example, however, of the random walk aspect of progress.
The iPhone does a lot that the Palm never could, but the original Palm did a lot of things well that the modern iPhone does poorly or not at all. Technological progress is squirrelly.
Schneier on Security: Why You Should Never Talk to the PoliceIt's very persuasive. In particular, there's a funny kink in American law. Whereas "anything you say may be used against you", the converse is not true; exculpatory statements are inadmissible hearsay.
This is an engaging and fascinating video presentation by Professor James Duane of the Regent University School of Law, explaining why -- in a criminal matter -- you should never, ever, ever talk to the police or any other government agent. It doesn't matter if you're guilty or innocent, if you have an alibi or not -- it isn't possible for anything you say to help you, and it's very possible that innocuous things you say will hurt you.
11 Charged in Theft of 40 Million Card Numbers - NYTimes.comIt's only the largest based on the number of accounts involved, sounds like a lot of the accounts haven't been hit ... yet.
BOSTON — The Justice Department said on Tuesday that it had charged 11 people in the theft of tens of millions of credit and debit card numbers of customers shopping at major retailers, including TJX Companies, in one of the largest reported identity-theft incidents on record.
TJX, of Framingham, Mass., which owns the Marshall’s and TJ Maxx chains, was the hardest hit by the ring, acknowledging in March 2007 that information from 45.7 million credit cards was stolen from its computers.
The charges focus on three people from the United States, three from the Ukraine, two from China, one from Estonia and one from Belarus.
The authorities said that the scheme was spearheaded by a Miami man named Albert Gonzalez, who hacked into the computer systems of retailers including TJX, BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21 and DSW Inc. The numbers were then stored on computer servers in the United States and Eastern Europe.
They then sold the information to people in the United States and Europe, who used it to withdraw tens of thousands of dollars at a time from automated teller machines, the authorities said...
... TJX has agreed to pay more than $60 million to credit-card networks Visa and MasterCard to settle complaints related to the incident, which is one of the largest on record based on the number of accounts involved.
Palm sells 2 million Centro’s - John at myITforum.comPalm Centro growth has been particularly strong among a demographic Apple wants to own - women.
So why isn’t this getting much press? The Apple cult media sure played up all the iPhone sales right? Why isn’t Palm getting the same recognition for selling 2 million Centro’s?Palm, Inc. (Nasdaq:PALM) today said it has sold its two-millionth Centro smartphone, confirming the $99 [jf: bogus new-contract price] product's growing momentum with traditional mobile phone users who want to move up to a phone that offers more functionality.(1) Palm is now offering Centro in more than 25 countries in North America, South America, Europe and Asia Pacific....
Crossing the line at the border | Good Morning Silicon ValleyThis is Bush appointee policy, so if you really don't like it you might consider the voting implications. The obvious recommendations are:
...Without explanation, we can seize your laptop or any device capable of storing information (including cell phones, thumb drives, video tapes, and old-fashioned analog paper). We can keep it as long as we want. We can look through the contents, and we can share them with other agencies or private entities. And we can do all this whenever and to whomever we want...