Newswatch: Moving the Ball in Realtime -TechCrunchIT
Monday 8am Silicon Valley news report:
With Oracle swallowing Sun, the enterprise dynamics have swung hard to right, past cloud computing, and directly into the mobile identity landrush. It’s easy to pigeonhole smart phones as the latest version of Studio 54 society politics, but in fact our identities are being consolidated around the SIM chip, with our social graph around the Follow/Track architecture of Twitter and its subsidiaries.
"We found actual proprietary code areas within the Green Dam program itself which are incredibly suspicious because they use our proprietary encryption methods," he said. "There's a lot more to it than just a list of bad words."
Carnegie Mellon’s Noah Smith is getting a grant this year to study how “opinions are propagated through social communities” on political blogs, and “analyze how the vast amount of data can be leveraged for commerce, social advertisement and other commercial and statistical methods.”
The future of cloud networking, and the only way to enable the full value of cloud compute cycles, is in WAN optimization. It’s a strategy that has worked well for Intel and AMD — and it ought to work for Amazon EC2, Microsoft Azure, Rackspace Mosso, and even Google.
The western world's most feared government is shaking with insurrection in the streets after a contested election and the leading name in news, CNN, is shockingly absent from the story. Twitter, meanwhile, is how Iranians are communicating with the outside world.
Military officials say there may be a need to intercept and examine some e-mail messages sent from other countries to guard against computer viruses or potential terrorist action. Advocates say the process could ultimately be accepted as the digital equivalent of customs inspections, in which passengers arriving from overseas consent to have their luggage opened for security, tax and health reasons.
The case shows that hacking is no longer the province of teenagers or even organized crime, said Erez Liebermann, the assistant U.S. attorney who is prosecuting the case. "With the connections outlined in the Italian and Philippines side, we have now moved into the realm of hacking as a financing mechanism for terrorism,"
Google checks news feeds constantly but does not so easily pull in tweets. At a press event in London last month, Mr. Page was asked to comment on any plans that Google had to search Twitter in real time. After praising Twitter for doing a “great job” in showing information to users in real time, Mr. Page said he had long been pushing his search teams to index every second.
Members of San Francisco's Lighthouse for the Blind and Visually Impaired appealed to Twitter executives during the company's first business conference in late May to make changes to its CAPTCHA security software and make it more accessible for the blind and visually impaired.
The government leaves it to card companies to design security rules that protect the nation's 50 billion annual transactions. Yet an examination of those industry requirements explains why so many breaches occur: The rules are cursory at best and all but meaningless at worst, according to the AP's analysis of data breaches dating to 2005.
After Sweden tightened its anti-piracy laws and sentenced to jail the founders of a site called The Pirate Bay, the popularity of a political group dedicated to free file-sharing soared. The Pirate Party has won a seat in the European Parliament, and similar groups are springing up elsewhere in Europe.
Or perhaps the recovery of the real estate market isn't as close as Harrison thought. On Thursday afternoon he had four buyers interested in joint ventures - which he can't auction - he said, but no one willing to take the risk and buy the names on their own.
The Chinese version has thus been named “biying” (必应) which means “must respond/answer” and which Microsoft is marketing it as a“decision engine”– something that will provide information to assist Internet users with their decision-making processes.