Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 09 Issue 12
Volume 9, Issue 12 Atari Online News, Etc. March 23, 2007
Published and Copyright (c) 1999 - 2007
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
Greg Goodwin
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #0912 03/23/07
~ 'Search Spam' Exposed! ~ People Are Talking! ~ 'Wiki' Goes Legit!
~ New Atari BBS Gateway! ~ Porn Law Struck Down! ~ MIT Courses Online!
~ Internet Names Privacy ~ Virus Writers Team Up! ~ Google Suit Tossed!
~ MySpace Goes Politics! ~ Fortran Pioneer Dies! ~ "xxx" Domain Vote?
-* Clinton and Obama Video War! *-
-* Online Anonymity Begets Nastiness! *-
-* Most Computer Attacks Originate in the US! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
Again, it's hard to imagine that a week ago we got "buried" in almost a
foot of snow! As usual, another great round of forecasting (we were only
to expect up to six inches of the white stuff!). And the rain that was
to follow and wash it all away turned out to be a heavy drizzle that ended
up freezing everything overnight. We survived - we're New Englanders! I
am now looking out my study window and the snow is almost gone, again.
The temps are getting more close to normal for this time of the year now
also. And hopefully they'll continue to stay up there. Hey, it's Spring
you know!
I've commented on this a number of times over the years; and it's
happened again. I usually have my commentary written by Thursday night,
before I receive Joe's column. Many, many times over the years, Joe and I
have taken similar paths with our comments. This is one of those weeks.
For those of you who don't know, Joe and I have known each other for many
years now. I don't remember whether it was an Atari show held in
Connecticut, or a WAACE show, but we met face to face at one of them. I
think that we had corresponded prior to that via online on Delphi and
GEnie. We were fairly outspoken in those days on all things Atari. We
both ended up writing for STReport, as well as some of the mainstream
paper magazines. But it was STReport and the Atari shows that really made
us close(er). We probably haven't seen each other in 15 years or so, but
we have stayed in touch throughout the years. So, when I see Joe getting
nostalgic - and at this particular week again, I got a kick out of.
You see, it's been 20 years since I first got my first Atari computer.
It was mid to late 1987 when I see my first Atari computer - and 800.
It belonged to my sister-in-law's husband (boyfriend at that time). He
had a couple of them, and I watched him play a couple of simple games and
run a couple of simple programs. I borrowed it for a couple of weeks. I
had always enjoyed my Atari 2600, so an opportunity to see a machine that
would allow me to play more "advanced" games on an Atari machine left me
amazed. I was also looking for the means of writing and printing, rather
than trying to fix an old Royal typewriter that I had. A computer to
write with AND play games? I was excited.
After a couple of weeks, my enthusiasm waned. I wasn't a "computer
person" I didn't like having to type in lines and lines of code and
record them on a cassette recorder to run. I wasn't crazy about using a
small television set for a monitor. It was all too cumbersome on my,
floor. I wanted something easier to use, someplace where I could be more
organized. Some months went by. I had returned the computer, and forgot
all about computers. A couple of more months went by and the guy asked
me if I was still interested in an Atari computer, but in something with
a bit more power and ease of use. He mentioned that Atari had recently
come out with a faster machine, and that he had one. At that time, he
was talking about the 520ST. The 1040ST had just come out and he was
interested in upgrading to the new machine. We took a ride to one of the
few Atari dealers that had sprung up in the area to look at the "new"
machine. We played around with both models, and I was hooked. The guy
had me totally sucked in - I wanted one. I couldn't afford a new
computer (which he was counting on!) and he offered to sell me his 520.
I bought it (and I still have it among my other machines). I
immediately bought WordWriterST, DataManagerST, and a few other titles
(a game or three were in that initial bunch of software, I'm sure!). I
was hooked. I eventually added a few peripherals - a Panasonic
dot-matrix printer, a second floppy drive. I was constantly taking a
ride to that dealer, or others, in search for new software. Eventually
I wandered in the dealer's shop while a user group meeting was going on
inside. I joined. I went to a few local computer shows where Atari
vendors were in attendance. I eventually added my first modem and an
Atari SH-204 hard drive (wow, a whole 20 megs!). I was now online to
the local bulletin boards, and then moved on to Delphi and GEnie, and
later onto CompuServe.
The user group was flourishing, and I was meeting all kinds of new
friends. I took over doing the group's newsletter, so I now needed a
more powerful machine. I upgraded my machine with a meg of RAM, and
bought a Panasonic laser printer ($1300 for that printer!!!), which I
still have and use on my Falcon. My interests expanded beyond our local
area due to my online capabilities. I started reading national magazines
and became aware of various Atari shows. We went to some of those shows,
hence eventually meeting Joe. Similar interests, and eventually similar
paths on the Atari road.
Like Joe, I wasn't a programmer. Sure, I took a computer course in
college - basic Fortran. I remember writing a program to generate the
sum of the numbers from 1 to 100 (the total is 5050). While I was
running an upgrade of the MichTron BBS software, I had to learn a little
MCL programming. MCL was "MichTron Command Line" programming, which I
learned was a derivative of C-programming. While I couldn't write that
code from scratch, I could take existing code and change it around to
fit my needs with the BBS. Not great, but it got the job done.
Otherwise, I didn't have a head for programming. But I was always amazed
to see the results of others' work! I still am. Programmers are
special people as far as I'm concerned.
And look how far we've come in the last 20-plus years of computer
technology! It's amazing. And throughout all this time, I'm still
fascinated every time I turn on my Atari computer and do something with
it - whether it's to work on A-ONE or play a round of Dungeon Master,
Space Quest, or Leisure Suit Larry! On a simple 8 or 16 MHz powered
computer. The thrill is still there, after all these years. In
today's world, I'd be amazed if people kept there machine for more than
20 months, much less 20 years! Atari is special, in many ways.
Until next time...
=~=~=~=
New Service... Atari BBS Gateway!!
A long time & stable Dallas BBS has offered to provide a "Favorites page"
for the Atari BBs users. Basically I provided a up to date BBS list of
the active Atari sites out there, and he created a place you can go to,
bring up an Atari telnet menu, and go to an Atari BBS. :)
Ever been curious to see the online world of Atari computers? Come check
out the Prison Board BBS:
972-329-0781 (this number good for people want to try out Atari modems,
and dialup means.)
216.62.20.217 (This IP number is great for Lantronix users, and has not
changed for a considerable time.)
Never has the online Atari world been so easy to access from your Atari
computer. Simply call up the above system, get to the main menu, X for
the internet menu, and then A for the Atari menu. From there, it is
simply a matter of hitting 1 through 9 for the Atari BBS's. Atari BBS's
in many cases run on real Atari computers like the one you're calling
with.
And the Prison board makes a great E-mail service too. :)
Let me know here if you have any questions, and many thanks to the
Prison Board BBS for this awesome service.
FamilyNet <> Internet Gated Mail
http://www.familynet-international.org
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho friends and neighbors. First of all, let me thank those of you
who wrote to me to offer job hunting advice or job leads. I appreciate
it. I'm not having much luck, but there's no such thing as too much
information, and it'll probably come in handy down the road.
In the meantime, between following job leads that don't pan out and
spit-shining my resume, I've been thinking a lot about the road that's
led me to this point.
Way back in the dark mists of time, when the hottest computer out there
was the Apple ][ (not even the ][+, mind you), I strolled into my
college's computer lab to wait for a friend to finish his lab work so
that we could go to lunch, I happened to sit down in front of one of
the machines (and its 9" monochrome Sony monitor) and wondered exactly
what it took to make the machine do anything.
"Is there an instruction book or something?" I asked my friend. He
simply pointed to the drawer built into the table. I pulled out the
manual, which said "Apple LOGO Programming Manual" or something like
that.
By the time my buddy had finished his lab work, I had written a little
program that would ask you for a number between 1 and 180 and do a
little 'Spirograph' dance on the screen. I was hooked. I knew from that
moment on that I'd forever have a love of computers. But at the same
time, I knew that I'd never be a programmer. It just didn't 'feel'
right. I later came to realize, as I met more actual programmers, that
they don't think exactly like the rest of us do. Not necessarily better
or worse, just different. When I took my first actual programming class
(UCSD Pascal), my opinion was confirmed. I could write a program that
would do the same thing as the programmer (a REAL programmer-type
personality) sitting next to me had come up with, but mine was... for
lack of a better word, ugly. It didn't 'flow', it was usually much
longer than the other guy's, it was slower, and it just generally
looked and felt like it was limping along through its purpose.
Yep, the good lord gave me the ability to recognize elegant code, but
not the ability to write it. I can look at a printout of someone's code
and say that it's either elegant or kludgy, and tell (in a general way)
if it's a fast or slow program... or if it's a half-fast program (inside
joke, folks), but I can't write the elegant stuff myself. And that's
okay with me. I know too many people who took jobs doing something they
genuinely like (programming) only to burn out and end up hating it.
It'd really bother me if I had that ability and I burned out at it.
So, after college, I scraped enough money together to buy a
Timex-Sinclair ZX81 computer. It was a miracle of technology. Small,
fast (for its time), and fairly cheap, it allowed me to deal not only
with writing BASIC programs, but got me ready for a future of dealing
with computer problems... overheating, sudden shut-downs and lock-ups
were very common with that machine because of the 'rickety' electrical
connections.
From there, I moved on to the Commodore 64. I was happy enough with
that, because I'd moved up in the world and graduated for the first
time from data storage on cassette tape to 5.25" single sided floppies.
Now, instead of taking 8 minutes to load in a 6K program, it only took
a minute and a half!
Now we get to the part about the road that led me to where I am now.
While I was happy enough with the C64, I had the bad fortune to order
the 1541 disk drive just before they disappeared from the market for
months. There were rumors that the owner of Commodore, a guy named Jack
Tramiel, had caused the shortage to raise the price of the darned
thing. I didn't quite believe that, but I didn't like the way the whole
thing was handled, so I vowed that I'd never buy another
Tramiel/Commodore computer.
The local computer store that I'd taken to visiting (the second one,
actually. The first was an Apple dealer. But they went 'corporate' and
switched from bluejeans and rolled-up shirt sleeves to starched collars
and power ties, so I moved on) was a registered Atari dealer. I saw the
800 as about equal to the C64 (right or wrong, that's how I saw it),
and I'd heard a little bit about this new machine they were coming out
with... the ST... which, I'd been told, stood for Sixteen/Thirty-Two.
It was supposed to run at an astounding 8 MHz, have a built-on OS,
built in floppy drive (eventually), and a half a megabyte or a full
megabyte of RAM. This machine was going to be a monster! Commodore was
readying their Amiga, but there was that vow I'd made. Plus, I didn't
like the name 'Amiga'. In Spanish, Amiga meant a female friend. Not a
girlfriend, just a friend who happened to be a girl. Who the hell
needed that?? <grin>
Of course, I didn't realize that the other half of my no-purchase thing,
Jack Tramiel, had gotten out and away from Commodore, and had purchased
Atari from Warner.
I went to that computer store at least once a week to hang around,
drinking coffee and shooting the bull with the owner. When it came time
to take orders for the first 1040 STs, I was one of the first. A shiny
new 1040STfm with a SC1224 monitor was mine. Built-in double-sided
floppy drive and all. It was so cool! I was in hog heaven, and had no
intention of ever leaving.
Well, things change and Atari computers really didn't. The 'Power
Without the Price' had indeed come with a price. In order to keep the
cost down, they'd boxed themselves into several tight spots all at
once. Instead of actually making the line evolve, they simply kept
dropping the price. By the time they'd gotten around to serious
advances with the ABAQ, the TT and the Falcon030, the handwriting was
on the walls, and it was too late.
Well, that's the road I've traveled, and I'm glad and grateful of every
single step. It's what led me to the point I'm at now. If even one
thing had been different, I wouldn't be who I am now, and I probably
wouldn't be typing this to you right now.
I'm just glad that the road that YOU'VE traveled brought you to the
same place, and that we've spent some time traveling together. "Don't
ya know we're all just travelers on the road to kingdom come".
Now let's get to the news, hints, tips and info from the UseNet.
From the comp.sys.atari.st NewsGroup
====================================
Ross Kuipers asks for information on replacing his floppy drive:
"I just bought an old Atari ST, with a shitload of discs.
Just powered up the beast, but the beast is a bit ill, it doesn't want
to read discs.
So, first conclusion, disk drive failure. Is it possible to just add an
"normal" pc style disc drive?"
Jerome Balti tells Ross:
"Last week I just revived my own ST after years in the attic (very clean
but long storage). The disk was not good at the beginning, could not
read anything properly, seemed to run slower.
Then, after a few days, and several tries with non important disks, it
just recovered then worked fine again!
I also had it extended from 520 to 1040 but it seems that the memory
extension is gone, because it works like a 520 now ...
I may have a look inside ..."
Our friend Hallvard Tangeraas adds:
"Yes, with a few minor modifications you can simply add a PC disk drive:
ftp://gem.win.co.nz/hall/hardware/sony_144.zip "
Guillaume Tello posts this about the latest update to his Sudoku solver:
"Another update, 1.03. Now the program can generate HARD puzzles.
http://perso.orange.fr/gtello/downld_e.htm#prog
In fact, each time a MEDIUM one is created, the program tries to convert
it to a HARD one. Not always possible! (because there must be only one
solution!). Let's say that 1 MEDIUM out of 5 is converted into HARD.
It's written under the grid with the difficulty level.
Generating a HARD grid lasts between 0"98 and 1"68 on my TT and between
5"49 and 8"55 on the Mega STE (and around 0"03 with Aranym...)"
Jean-Luc Ceccoli tells Guillaume:
"(Answer in english here to match the forum, but as we're both french,
I'll post on fcsa in our native language)
O-kay, here are statistics :
- easy-level grids generated in 0.01 second,
- generates medium-level grids within 0.12 to 0.19 second,
- hard-level ones take 0.16 to 0.18 second, and
- all levels grigs are solved in 0.00 second !
That is, on my FalCT60 running at 96 MHz and secondary clock at 50 MHz.
So, maybe ought you to increase the accuracy of your count."
Guillaume replies:
"I use the system clock at 200 Hz. So, if the solution is found in less
than 0,005 s, it will be ZERO, that's what happens.
Using another Timer with interruptions (for example at 1000Hz for
milliseconds) would slow down the system, most of all on a Mega STE!
Another solution would be to play a blank DMA sound with a one second
buffer. Each time the end of the buffer is reached, an interruption
happens and you can count the seconds. Then, when the solution is
found, reading the pointer into the buffer would give a precision of
50000Hz without slowing down the system.
But is it really worth it? And what about the machines without DMA
sound? Thanks for your tests! Hope I'll have a "CTT"060 one day!
I uploaded version 1.04 with a better interface to manage the options.
http://perso.orange.fr/gtello/downld_e.htm#prog"
Well folks, the messages petered out early this week, so that's it for
this time around. Tune in again next week, same time, same station, and
be ready to listen to what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - Sony Names PS2 Titles for Euro PS3!
""""""""""""""""""""""""""""" Racing Games Cause Risky Driving?
More Games, Fewer Books?
And much more!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Sony Names PS2 Titles for PS3 Euro Launch
For Euro gamers jonesing to know which PlayStation 1 and PlayStation 2
games will work on the European version of the soon-to-launch PlayStation
3, the wait is over. Sony Computer Entertainment released the titles of
over a thousand games that will operate on the Euro PS3 when it hits store
shelves on March 23.
The move comes in the wake of a public-relations snafu for the
electronics giant. Last month, Sony reported that the PlayStation 3
version to be released in Europe won't carry a dedicated chip for
PlayStation 2, and will instead use special emulation software to play
older games, a move designed to reduce manufacturing costs.
According to Sony, one million PS3s will be available for the European
launch. But as the console battle heats up with gaming rivals Nintendo
and Microsoft, any PlayStation 3 problems, including a potential
public-relations nightmare, might hit Sony hard.
Paul Jackson, principal analyst at Forrester Research, called Sony's
console situation "not great" because of the PS3's delayed launch date in
Europe and the fact that the PS3 in Europe will be more expensive than it
is elsewhere.
Jackson explained that while there is backlash about the compatibility
with earlier PlayStation titles, the lateness and the price are more
significant. The U.S. model sells for $499 for the 20-GB version and $599
for 60-GB model. In Europe, the prices will be significantly higher.
"They're producing a Mercedes class product," he said. "A premium brand
that's more than a mainstream Ford type box. They have to run with that
despite these issues."
But Jackson did call attention to potential issues with Sony's marquee PS2
games, such as God Of War II, Grand Theft Auto, and FIFA. "One would hope
these are the games that will work seamlessly," he said, as opposed to the
more obscure titles from a few years ago. (All three titles are posted on
Sony's list of compatible games at http://faq.eu.playstation.com/bc.)
In order to play the older games, owners of the new console will have to
be running the latest version of the PlayStation 3 software, which is
available as a free downloadable update.
A new downloadable update expected this Thursday for the PS3 will offer
several new features. For example, it will allow users to help fight cancer
and other diseases by taking part in a distributed-computing project from
Stanford, and will support the use of Bluetooth peripherals, such as
keyboards and mice.
According to Sony, all PlayStation 1 and more than 1,200 PlayStation 2
games will be compatible with the PS3 as a result of latest software
updates. Sony also said that 30 PS3 titles would be launching on Friday.
Video Racing Games May Spur Risky Driving
People who play car racing video games may be more prone to drive
recklessly and get into accidents, according to a study that adds to
evidence that video games can influence the behavior of some players.
The study by German researchers published on Sunday examined the effect
these games, featuring realistic driving environments with players often
racing through city and suburban traffic, affect people who play them.
"Driving actions in these games often include competitive and reckless
driving, speeding and crashing into other cars or pedestrians, or
performing risky stunts with the vehicle. In short, most actions in racing
games imply a very high risk of having an accident or severe crash in a
highly realistic virtual road traffic environment," the researchers wrote.
The researchers first questioned 198 men and women. Those who played the
games most often were more likely to report engaging in aggressive and
risky driving and getting in auto accidents. Those who played these games
less often reported driving more cautiously, the researchers said.
The researchers then studied 68 men and found those who played even one
racing game took more risks afterward in traffic situations on a computer
simulator than those who played another type of game.
Then the researchers had 83 men play either a racing game or another type
of game, and found that those who played the racing game reported more
thoughts and feelings associated with risk-taking than the others.
"Risk-acceptance is one of the most prominent and important factors in the
discussion of the origin of accidents caused by young drivers," Joerg
Kubitzki of the Allianz Center for Technology, who conducted the study
along with researchers at Munich's Ludwig-Maximilians University, said by
e-mail.
The researchers cited previous research involving the "shooter" genre of
games, in which the player shoots at adversaries, that found an increase
in aggression-related thoughts and actions among people who played these
games. But they said little had been known about the influence driving
games might have on actual driving behavior of players.
"The question of age restrictions, legally or voluntary, should be
discussed not only for "shooter" games but also for this kind of games,
which have an impact on traffic safety," Kubitzki said.
The study appeared in the Journal of Experimental Psychology: Applied,
published by the American Psychological Association.
Atari's Silverfall in Stores Now
Atari, Inc. announced that Silverfall, a dynamic 3D action role-playing
game (RPG), has arrived at retailers across North America. Developed by
Monte Cristo Games, Silverfall is rated T for Teen and is available for
the Windows platform at a suggested retail price of $39.95.
Silverfall casts players into a world torn between science and nature,
forcing gamers to choose between the two in order to save the principal
city from total destruction. The player must take on quests and defeat
slews of opponents during the journey through the fascinating world of
Nelwe. Two non-playing character (NPC) companions accompany and assist
the player throughout the Silverfall adventure. Decisions made during each
quest will be key as choices impact storyline, environment and
accumulation of skills.
"Engaging, immersive and imaginative, Silverfall is a unique addition to
the genre of role-playing games," said Stephen Baer, senior product
manager, Atari, Inc. "Having been among the top five of GameSpot.com's
'Top 10 PC games' list for the last week, Silverfall is certainly a
must-have for PC and RPG fans alike."
Silverfall offers a unique character building system of advancement and
equipment that allows for complete customization of characters. Gamers can
develop distinctive characters such as scientist troll magicians,
elemental elf warriors, or mercantile goblins. Fighting and magic are
employed throughout, and vary from melee, ranged, and technical, to light,
elemental and dark. Gamers will play through a 25-hour main quest,
numerous side quests and two multiplayer modes, player-versus-player and
co-operative; and can further extend their experience with the included
game editor, allowing would-be level designers to create their own
adventures to play alone or with friends.
With four races to choose from, nine skill sets encompassing more than 130
individual skills, over 100 monsters, and advanced 3D graphics, Silverfall
replenishes the RPG genre with a memorable hack-and-slash action
adventure.
For more information on Silverfall, Atari and its entire product line-up
please visit www.atari.com <http://www.atari.com>.
Video Games' Reach Bigger Than Thought
Video games reach more players than retail sales figures suggest, according
to a report issued on Wednesday by private research and measurement firm
Interpret.
The firm's Gameasure report comes as video game makers try to woo
advertisers, who are looking for new ways to connect with young males -
an audience that plays a lot of video games and is watching less network
television.
"Retail sales capture only a portion of the total audience playing
individual game titles, suggesting current in-game advertising deals,
which are primarily tied to these sales figures, undervalue the medium,"
Michael Dowling, Interpret's CEO said in a statement.
Dowling said the report shows advertisers should consider the impact of
social game play, game rentals, used game sales and pass-around.
For example, NPD Group research showed Activision Inc.'s "Call of Duty 3"
sold 2 million units in the United States as of February 3. According to
the Gameasure report, that game was played by 9 million people.
Electronic Arts Inc. has sold more than 6 million units of "Madden NFL
2007," but 14 million have actually played the game, the report said.
Microsoft Corp., maker of the Xbox 360 video game console and the
blockbuster "Halo" game series, paid $200 million last year for in-game ad
company Massive Inc. - lured by Massive's agreements to dynamically place
ads on such things as billboards and vending machines that appear within
online games from Ubisoft Entertainment SA, THQ Inc. and Take-Two
Interactive Software Inc.
Google said on Friday it bought video game advertising firm Adscape.
Technology Web site Red Herring, citing individuals close to the deal,
said the price tag was seen at around $23 million.
Independent in-game advertising start-ups Double Fusion and IGA Worldwide
have already signed deals with major video game publishers.
Parks Associates said 2005 revenue from dynamic in-game ads was $80
million in 2005 and forecasts it could grow to $605 million by 2010.
More Video Games, Fewer Books at Schools?
Of all of the proposals aimed at improving America's failing schools,
there's one idea kids will really like: More video games and fewer books.
At least a number of educators hope so, arguing that children would get
more excited about school and that video games can present real-life
problems to solve.
Nobody is talking about putting violent video games such as "Doom" or
"Mortal Kombat" into classrooms, particularly given concerns they may
encourage aggressive behavior.
Instead, educators such as Indiana University associate professor Sasha
Barab are developing alternative video games that can teach as well as
entertain.
In one game designed by Barab, the player assumes the role of an
investigator seeking to find out why fish are dying in a virtual park.
Various theories are offered such as excessive logging or farm
fertilizers, and the players share data about water quality and compare
hypotheses. If they recommend kicking out the loggers, the park may go
bankrupt, giving students a real-world dilemma.
"I believe in digital media literacy. If we don't make changes in the way
we educate our children, they will be left behind in world markets," said
Barab, a former high school teacher. "Right now, I'm not that optimistic
about where schools are headed."
Another backer of video games as educational tools is Katie Salen. A game
designer, Salen is working with a group called New Visions for Public
Schools to establish a school in New York City for grades six through 12
that would integrate video games into the entire curriculum.
"There's a lot of moral panic about addiction to games. There's a
negative public perception and we know we have to deal with that. But
teachers have been using games for years and years," Salen said.
"We're looking at how games work and we want to think about ways to
redeliver information. It's quite unknown territory."
The MacArthur Foundation is investing $50 million to investigate whether
video games promote learning, and last month sponsored a panel discussion
on the subject in Chicago.
"Kids don't just play games. The games inspire so they then turn to
books," said Connie Yowell, director of education at the Chicago-based
foundation. "There are bad games, but people tend to blame the tools
instead of learning about the tools."
To be sure, there are plenty of questions about the educational value of
video games, as compared with books and traditional tools.
Dr. Joshua Freedman, a neuropsychiatrist at the University of California,
Los Angeles, said video games are interactive and can help with spatial
concepts.
"But there's still a question about the value to the extent that most of
the world is not a video game. They're not getting problems in real world
situation," he said.
Video games engage children with continuous action, a concept known as
"enthrallment," that raises the threshold for engagement, Freedman said.
"It's the equivalent of giving kids a lot of sweets and then wondering why
they don't want to eat regular food," he said.
Several studies have shown that video-game playing corresponds to higher
rates of attention deficit disorder (ADD) among children and are
associated with aggressive behavior. Freedman noted, however that cause
and effect are difficult to prove.
"I wouldn't say that using more games in education shouldn't be done, I'm
just saying that it should be done with our eyes open," he said.
One teen, Shelby Levin, a tenth grader with a 3.5 grade point average at
North Farmington High School in Farmington, Michigan, acknowledges that
he plays games mostly for fun.
A fan of sports games and violent games like Grand Theft Auto, Levin,
says: "I don't think you can learn more from playing video games than
from reading a book or doing an assignment."
But Levin, 16, also participates in the virtual world online called Second
Life, and says he does pick-up some important skills from his
time on it.
"In Second Life, I'm playing with kids from France, Italy and Germany. We
all come together and hang out online. You learn about entrepreneurship
because you have to hustle people and make money," he said.
That's one reason some are advocating classroom time to be teaching
children how to build virtual worlds - much like archeologists, engineers,
and others do - and to play games alongside others on the Web.
What's more, the trend toward administering more standardized tests does
not prepare children for a digital future, said David Williamson Shaffer
of the University of Wisconsin-Madison, and author of "How Computer Games
Help Children Learn."
"We've organized our schools using methods from the Middle Ages," Shaffer
said. "We should start to have a discussion about what needs to be
learned."
Barab marvels at the skills her son has mastered from video games, but
limits him to six hours a week, fearing addiction.
"My 6-year-old, Julian, can step into a video game and a world of rules
and figure them out. He's not scared of the unknown or scared of failing.
I think that's something valuable that video games provide. But, I want
him to experience much more, and relationships outside of games," Barab
added.
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
Judge Strikes Down Internet Porn Law
A 1998 law designed to block children from viewing pornography Web sites
violates free speech rights, a U.S. federal court ruled on Thursday, in a
blow to government efforts to restrict Internet smut.
The ruling sided with a challenge brought by the American Civil Liberties
Union, which had argued that the provisions of the Child Online Protection
Act were too restrictive and violated the First Amendment of the U.S.
Constitution that protects free speech.
Judge Lowell Reed of the U.S. District Court in Philadelphia wrote in his
ruling that while he sympathized with the goal of restricting minors from
seeing pornography, other means that were less restrictive of free
speech, such as software filters, were available to block such content.
"I may not turn a blind eye to the law ... to protect this nation's youth
by upholding a flawed statute, especially when a more effective and less
restrictive alternative is readily available," the judge wrote in his
ruling.
Government lawyers had argued during the four-week trial that Internet
filters were ineffective tools since most parents did not actively use
them.
Supporters of the law predicted the ruling will be appealed or that new
legislation would be passed by Congress.
"It doesn't matter if the Republicans are in the majority or the
Democrats. This issue is something both sides of the aisle feel strongly
about," said Donna Rice Hughes of Enough Is Enough, an Internet
pornography watchdog group.
John Morris, a lawyer for the Center for Democracy and Technology, told
reporters in a teleconference, "This law is not really aimed at
commercial pornography but really reaches far beyond that to a broad range
of valuable content."
The Child Online Protection Act made it a crime for any person to provide
minors access to "harmful material" over the Internet. Violators could be
fined up to $50,000 and imprisoned for up to 6 months.
The law was never enforced because it was immediately challenged in court
after being signed into law by former President Bill Clinton.
MySpace Enters Politics
MySpace launched a U.S. presidential campaign site Monday, and it has the
potential of reaching millions of people who don't otherwise go to
political Web sites, one analyst said.
MySpace, a division of Fox Interactive Media Inc., launched MySpace
Impact, featuring MySpace pages for 2008 presidential candidates.
Candidates with pages on MySpace Monday were Democratic Senators Hillary
Clinton of New York; Barack Obama of Illinois; Joe Biden of Delaware; and
Dennis Kucinich of Ohio; John Edwards, a former North Carolina senator
and 2004 vice presidential candidate, along with Republicans Senator John
McCain of Arizona; former New York City Mayor Rudy Giuliani; and former
Massachusetts Governor Mitt Romney. Libertarian Ron Paul also has a page.
MySpace hopes to play a "powerful role" in the 2008 elections, CEO Chris
DeWolfe said in a statement. The site plans to give users easy-to-use
information in a format they can relate to, he said.
MySpace, with 64.4 million unique visitors from the U.S. in February, has
the potential to play a major role, said Andrew Lipsman, a senior analyst
at ComScore Networks, a Web traffic measurement firm. MySpace users
represented about 37 percent of all U.S. Internet users, he said.
In addition, people ages 18 to 24 remain the heaviest users of MySpace and
the age group least likely to go to other political sites. "There's
certainly the opportunity to drive new traffic to that channel... because
the site is so large," he said.
As of Monday afternoon, "friends" were already on board various candidate
sites. For instance, Romney, McCain and Clinton each had more than 1,000
MySpace friends, while Obama had more than 68,000. Paul, also running for
president, had about 350 friends. Giuliani's profile was set to "private"
and so it could not be publicly seen.
The candidates themselves will have a hand in determining what traffic
comes to the MySpace Impact site, he said. "The real test will be
determined on how good the content is," he said.
MySpace will roll out an Impact-specific profile, which will allow
candidates to use the network's first "viral" fund-raising tool, within
weeks, MySpace said. MySpace will also host a series of online political
events through the 2008 presidential elections.
Video War Erupts Between Clinton and Obama
Ten months before the first 2008 U.S. presidential primary, a video war
has erupted between supporters of Democratic Sens. Hillary Rodham Clinton
and Barack Obama (news, bio, voting record), their opening skirmish on
the new campaign battleground - the Internet.
The supporters have posted their own political versions spoofing a 1984
commercial in which Apple Computer introduced its Macintosh personal
computer by attacking larger rival IBM as totalitarian.
The anti-Clinton video, dubbed "Vote Different," has been splashed across
the television news and been viewed almost 1.4 million times on the
popular video Web site YouTube since it was posted on March 5.
The anti-Obama clip, "Barack 1984," posted on the same site three days ago
has had more than 250,000 viewings.
"This is the opening round," said Carol Darr, director of the Institute
for Politics, Democracy and the Internet at George Washington University.
"The Internet is going to be the main event."
"Anything that gets the attention of millions of eyeballs - and
particularly millions of eyeballs of people who at this early stage are
watching - matters," she said, comparing the videos with the popular
JibJab Web videos of the 2004 campaign that poked fun at President George
W. Bush and Democratic challenger Sen. John Kerry.
Apple's commercial aired during the Super Bowl in 1984 and spoofed George
Orwell's book "1984," which portrays a totalitarian society.
The spliced clip of Clinton shows virtual clones with shaved heads walking
with military precision while she lauds the start of her presidential bid,
which she has dubbed as a conversation with America.
As she speaks, armed guards chase a woman in tight shorts and a tank top
through the crowd as she throws a sledgehammer shattering the screen.
"On January 14th, the Democratic Primary will begin. And you'll see why
2008 won't be like "1984," says the video, which then shows the old Apple
computer logo in the form of an "O" with the Internet address for Obama's
campaign below: barackobama.com.
Obama has disavowed any connection to the clip and Clinton has reportedly
laughed it off, suggesting it was better than her recent off-key
rendition of the Star Spangled Banner national anthem that also has been
shown on YouTube.
The rival clip parodies the same Apple commercial and uses a speech by
Obama of Illinois to unveil his support for the Chicago Bears professional
football team in the Super Bowl.
"The Bears Lost So Will Obama. Clinton for President," it said.
A spokesman for Clinton, of New York, declined comment and a
representative for Obama was not immediately available for comment.
'Wiki' Goes Legit
Six years after Wikipedia.org debuted, editors at the Oxford English
Dictionary (OED) have finally deigned to add the word "wiki" to the OED's
online version.
The term joined a handful of other technology-related entries added to the
online OED as part of the dictionary's quarterly update. Also added:
"Infobahn," "malware," "undelete" and "virtualize."
"[Wiki] joins a small but distinguished group of words which are directly
or ultimately borrowings into English from Hawaiian," noted Graeme
Diamond, OED's principal editor of new words, on the dictionary's site. He
also laid claim to a connection between the OED and the new entry.
"It has been suggested that in some ways the OED itself resembles a wiki:
its long tradition of working on collaborative principles means it has
welcomed the contribution of information and quotation evidence from the
public for over 150 years," Diamond said.
Although wiki has been in use since at least 1995 - Ward Cunningham
created the WikiWikiWeb that year as the first collaborative, user-edited
resource - the word was popularized by Wikipedia.org, the Internet's
largest encyclopedia, founded in January 2001.
Nontechnical entries just added to the OED include "ixnay," "RICO,"
"ta-da" and "scooby."
The previous update in December 2006 lacked much action on the tech side -
"groupware," "superminicomputer" and "webcast" were about it - but it did
give the OED such upper-crust entries as "heinie" and "hinky."
Access to the online edition of the OED costs US$29.95 monthly, or $295 a
year, for users in North or South America.
Computing Pioneer Backus Dies
John Backus, whose development of the Fortran programming language in the
1950s changed how people interacted with computers and paved the way for
modern software, has died. He was 82.
Backus died Saturday in Ashland, Ore., according to IBM Corp., where he
spent his career.
Prior to Fortran, computers had to be meticulously "hand-coded" -
programmed in the raw strings of digits that triggered actions inside the
machine. Fortran was a "high-level" language because it abstracted that
work - it let programmers enter commands in a more intuitive system, which
the computer would translate into machine code on its own.
"It was just a quantum leap. It changed the game in a way that has only
happened two or three times in the computer industry," said Jim Horning,
a longtime programmer who co-chairs the Association for Computing
Machinery's award committee.
That organization gave Backus its 1977 Turing Award, one of the industry's
highest accolades. Backus also won a National Medal of Science in 1975 and
got the 1993 Charles Stark Draper Prize, the top honor from the National
Academy of Engineering.
"Much of my work has come from being lazy," Backus told Think, the IBM
employee magazine, in 1979. "I didn't like writing programs, and so, when
I was working on the IBM 701 (an early computer), writing programs for
computing missile trajectories, I started work on a programming system to
make it easier to write programs."
John Warner (news, bio, voting record) Backus was born in Wilmington,
Del., in 1924. His father was a chemist who became a stockbroker. Backus
had what he would later describe as a "checkered educational career" in
prep school and the University of Virginia, which he left after six
months. After being drafted into the Army, Backus studied medicine but
dropped it when he found radio engineering more compelling.
Backus finally found his calling in math, and he pursued a master's degree
at Columbia University in New York. Shortly before graduating, Backus
toured the IBM offices in midtown Manhattan and came across the company's
Selective Sequence Electronic Calculator, an early computer stuffed with
13,000 vacuum tubes. Backus met one of the machine's inventors, Rex Seeber
- who "gave me a little homemade test and hired me on the spot," Backus
recalled in 1979.
Backus' early work at IBM included computing lunar positions on the balky,
bulky computers that were state of the art in the 1950s. But he tired of
hand-coding the hardware, and in 1954 he got his bosses to let him
assemble a team that could design an easier system.
The result, Fortran, short for Formula Translation, reduced the number of
programming statements necessary to operate a machine by a factor of 20.
Even more importantly, "it took about as long to write one line of Fortran
as one line of assembly code," Horning said. Previous attempts at
high-level language had failed on that count, so Fortran showed skeptics
that machines could run just as efficiently without hand-coding.
From there, a wide range of programming languages and software approaches
proliferated, although Fortran also evolved over the years and remains in
use.
Known as a maverick who preferred jeans to IBM's buttoned-up, conservative
style, Backus stayed with the company until his retirement in 1991. Among
his other important contributions was a method for describing the
particular grammar of computer languages. The system came to be known as
Backus-Naur Form.
Privacy For Internet Names Moves Forward
Many owners of Internet addresses face this quandary: Provide your real
contact information when you register a domain name and subject yourself
to junk or harassment. Or enter fake data and risk losing it outright.
Help may be on the way as a key task force last week endorsed a proposal
that would give more privacy options to small businesses, individuals
with personal Web sites and other domain name owners.
"At the end of the day, they are not going to have personal contact
information on public display," said Ross Rader, a task force member and
director of retail services for registration company Tucows Inc. "That's
the big change for domain name owners."
At issue is a publicly available database known as Whois. With it, anyone
can find out the full names, organizations, postal and e-mail addresses
and phone numbers behind domain names.
Hearings on the changes are expected next week in Lisbon, Portugal, before
the Internet Corporation for Assigned Names and Numbers, or ICANN, the
main oversight agency for Internet addresses.
Resolution, however, could take several more months or even years, with
crucial details on implementation still unsettled and a vocal minority
backing an alternative.
Under the endorsed proposal, some six years in the making, domain name
registrants would be able to list third-party contact information in place
of their own, to the chagrin of businesses and intellectual-property
lawyers worried that cybersquatters and scam artists could more easily
hide their identities.
"It would just make it that much more difficult and costly to find out
who's behind a name," said Miriam Karlin, manager of legal affairs for
International Data Group Inc., publisher of PC World and other magazines.
She said she looks up Whois data daily to pursue trademark and copyright
violators.
Privacy wasn't a big consideration when the current addressing system
started in the 1980s. Back then, government and university researchers who
dominated the Internet knew one another and didn't mind sharing personal
details to resolve technical problems.
Today, the Whois database is used for much more. Law-enforcement officials
and Internet service providers use it to fight fraud and hacking. Lawyers
depend on it to chase trademark and copyright violators. Journalists rely
on it to reach Web site owners. And spammers mine it to send junk mailings
for Web site hosting and other services.
And Internet users have come to expect more privacy and even anonymity.
Small businesses work out of homes. Individuals use Web sites to criticize
large corporations or government officials. The Whois database, for many,
reveals too much.
The requirements for domain name owners to provide such details also
contradict, in some cases, European privacy laws that are stricter than
those in the United States.
Registration companies generally don't check contact information for
accuracy, but submitting fake data could result in missing important
service and renewal notices. It also could be grounds for terminating a
domain name.
Over the past few years, some companies have been offering proxy services,
for a fee, letting domain name owners list the proxy rather than
themselves as the contact.
It's akin to an unlisted phone number, though with questionable legal
status. The U.S. government has banned proxies entirely for addresses
ending in ".us," even after many had already registered names behind them.
Critics also complain that such services can be too quick or too slow,
depending on whom you ask, in revealing identities under legal pressure.
"Right now there's no regulation, no accreditation, no standards," said
Margie Milam, general counsel for MarkMonitor, a brand-protection firm.
"Some can take weeks, which can slow down investigations."
The task force proposal, known as operational point of contact, would make
third-party contacts a standard offering. Domain name owners could list
themselves, a lawyer, a service provider or just about anyone else; that
contact would forward important communications back to the owner.
Details must still be worked out, but the domain name registrant rather
than the proxy would likely be clearly identified as the legal owner,
unlike the current, vague arrangement. ICANN's staff also pressed for more
clarity on to whom and under what circumstances the outside contact would
have to release data.
Although that proposal received a slight majority on the Whois task force,
some stakeholders including businesses and lawyers have pushed an
alternative known as special circumstances. Domain name holders would have
to make personal contact details available, as they do today, unless they
can justify a special circumstance, such as running a shelter for battered
women.
"On the whole, society is much better off having this kind of transparency
and accountability," said Steven Metalitz, an intellectual-property lawyer
on the task force.
ICANN's Council of the Generic Names Supporting Organization plans public
hearings in Lisbon, after which it could make a recommendation or convene
another task force to tackle implementation details.
Supporters of the new proposal remain hopeful that resolution is near.
"A lot of public interest groups have been waiting a long time to see if
this process actually works or if it's just a charade," said Wendy
Seltzer, a non-voting task force member and fellow with Harvard
University's Berkman Center for Internet and Society. "If this turns out
to have been for naught, you will have a lot of frustrated people."
Most Computer Attacks Originate In U.S.
The United States generates more malicious computer activity than any
other country, and sophisticated hackers worldwide are banding together
in highly efficient crime rings, according to a new report.
Researchers at Cupertino-based Symantec Corp. also found that fierce
competition in the criminal underworld is driving down prices for stolen
financial information.
Criminals may purchase verified credit card numbers for as little as $1,
and they can buy a complete identity - a date of birth and U.S. bank
account, credit card and government-issued identification numbers - for
$14, according to Symantec's twice-yearly Internet Security Threat Report
released Monday.
Researchers at the security software company found that about a third of
all computer attacks worldwide in the second half of 2006 originated from
machines in the United States. That makes the United States the most
fertile breeding ground for threats such as spam, phishing and malicious
code, easily surpassing runners-up China, which generates 10 percent of
attacks, and Germany, which generates 7 percent.
The United States also leads in "bot network activity." Bots are
compromised computers controlled remotely and operating in concert to pump
out spam or perform other nefarious acts.
The legitimate owner of the computer typically doesn't know the machine
has been taken over, and the phenomenon is largely responsible for the
palpable increase in junk e-mail in the past half year.
Spam made up 59 percent of all e-mail traffic Symantec monitored. That's
up 5 percentage points from the previous period. Much of the spam was
related to stock picks and other financial scams.
The United States is also home to more than half of the world's
"underground economy servers", typically corporate computers that have
been commandeered to facilitate clandestine transactions involving stolen
data and may be compromised for as little as two hours or as long as two
weeks, according to the report.
The study marks the first time Symantec researchers have studied the
national origins of computer attacks. The report focused on attacks during
the last half of 2006 on more than 120 million computers running Symantec
antivirus software. The company operates more than 2 million decoy e-mail
accounts designed to attract messages from around the world to identify
spam and phishing activity.
Alfred Huger, vice president of Symantec Security Response, said online
criminals appear to be adopting more sophisticated means of
"self-policing." They're launching denial-of-service attacks on rivals'
servers and posting pictures online of competitors' faces.
"It's ruthless, highly organized and highly evolved," Huger said.
One of the most startling findings: The worldwide number of bot-infected
computers rose, an increase of about 29 percent from the previous six
months, to more than 6 million computers total, while the number of
servers controlling them plunged. The number of such "command-and-control"
servers declined by about 25 percent to around 4,700.
Symantec researchers said the decrease signifies that bot network owners
are consolidating to expand their networks, creating a more centralized,
efficient structure for launching attacks.
Twenty-six percent of the world's bot-infected computers were in China, a
higher percentage than any other country.
According to Symantec, Microsoft Corp.'s Internet Explorer was
themost-targeted Web browser, attracting 77 percent of all browser
attacks.
Symantec said it expects to see more threats begin to emerge against
Microsoft's Vista operating system. It also expects multiplayer online
games to be targeted by phishers, who fool users into divulging passwords
or other personal information by creating fake Web sites that look like
the real thing.
Global Malady: Virus Writers Worldwide Team Up
Security researchers have been touting the growing nature of
professionalism among virus authors over the last several years, but new
evidence points to increased cooperation between malware writers spread
around the globe, according to some experts.
The practice of using widely-distributed IP addresses to distribute
malware and spam to help avoid detection by security companies and law
enforcement officials is nothing new among electronic schemers.
However, there is reason to believe that cyber-criminals, specifically
virus authors and botnet operators, may be teaming more frequently with
people in other regions of the world to help facilitate their respective
attacks, said Chris Boyd, the U.K.-based director of malware research at
FaceTime Labs, a division of software maker FaceTime Communications.
Boyd - who used his presentation at the RSA Conference 2007 in February to
detail botnet activity, including a group based out of the Middle East
known as the Q8Army that is suspected to back radical Islamist activity -
said that there is even mounting evidence that hackers in China are
teaming with their Western counterparts to help boost the quality of their
respective attacks.
There have been ties established between groups of crimeware authors in
the United States, South America, and Eastern Europe that have been evident
for some time, Boyd said, but an increasing number of attacks being
examined by the researcher bare clues that Chinese coders are looking
outside their borders for expertise in helping to improve and spread their
work.
"It was previously unthinkable that hackers in the West and China would be
working together, but we're increasingly seeing interplay of code," Boyd
said. "The new techniques we're seeing come out of China suggest that they
are picking up tips from hackers in the West to help them fly under the
radar, and we feel there will be more of this activity in the coming
months."
Boyd said that like the Q8Army - which allegedly used instant messaging
attacks to plant spyware on people's computers and create a massive
worldwide botnet system - Chinese hackers have been known in the past for
distributing somewhat crude programs that were relatively easy for
security researchers to isolate.
But over the past several months, the expert said, he has seen far more
advanced threats with far less obvious social engineering mistakes
emanating from the world's most populous nation.
While the Chinese malware writers are turning to Westerners to learn the
subtleties of tricking people outside their country into falling for
their attacks, Westerners are likely asking their new partners to share
their techniques for avoiding detection by researchers and law
enforcement.
"[Virus writers] in America want to learn the finer arts of what not to do
to get caught online, and the groups in China appear to be very advanced
in that regard," said Boyd. "With the government atmosphere there, where
you're likely to go to jail if you get caught committing a crime, they
have to be very careful."
The range of attacks - which Boyd said he has observed on underground
security research forums that he declined to identify by name - span from
less dangerous adware programs to extremely advanced root kits, according
to the expert with FaceTime.
Other researchers said that such a shift in partnerships could
significantly improve malware coming out of regions like China, where more
complex language barriers with Western users have helped foil many threats
in the past.
In addition to helping foreigners craft threats that are less likely to
throw up red flags to end users and security systems, based on their
improved spelling and grammar, international hacker cooperation can allow
threat writers to share popular cultural items that make their social
engineering ploys more effective.
"Many times, malware writers overseas have gone to great lengths to create
the threats themselves, but poor social engineering is a tip-off to native
English speakers," said Craig Schmugar, threat research manager for
McAfee's Avert Labs group. "And by finding out what sort of things are
currently popular in another region, they're also less likely to tip their
hands and pull in more people with social engineering."
Schmugar said that by branching out and working with malware writers in
other locales, cyber-criminals may also introduce more opportunities for
researchers to infiltrate their ranks and put a stop to their operations.
He said that some attacks may also be designed by their authors to merely
to appear as if they were created in a foreign nation to help throw
researchers and law enforcement off their trails.
"Mostly, we're seeing individuals trying to become more globally
organized, but the really organized groups do have agents around the globe
and some sort of management structure," Schmugar said. "In one token, the
cooperation can help them be more effective, but on the other hand, it
might present new opportunities to get caught; how do you know when you
can trust what someone tells you about themselves if they're in another
part of the world?"
Study Exposes 'Search Spam'
Anyone brave enough to type "cheap tickets" in a search engine can find a
plethora of one-page Web sites designed to drive traffic to other Web
sites and generate click-through advertising revenue.
They're an irritant to users and another way in which
the Internet is
being abused for profit. But a new study by a team of Microsoft Corp. and
University of California researchers has shed light on how so-called
"search spammers" work and how advertisers can help stop the practice.
"By exposing the end-to-end search spamming activities, we hope to...
encourage advertisers to scrutinize those syndicators and traffic
affiliates who are profiting from spam traffic at the expense of the
long-term health of the Web," wrote authors Yi-Min Wang and Ming Ma of
Microsoft Research and Yuan Niu and Hao Chen of the University of
California in Davis. Their research will be reviewed at the 16th
International World Wide Web Conference in Banff, Alberta, in May.
The researchers looked at "redirection spam," where a user clicks on a URL
(uniform resource locator) but is then automatically transferred to a
different URL or shown advertising content that originates from somewhere
else on the Web.
Often, legitimate companies have their advertisements served on
questionable sites through redirections designed to "obfuscate the
connection between the advertisers and the spammers," the researchers
wrote.
In one example, they traced the origin of advertisements for orbitz.com,
a popular travel services site, that appeared on suspicious Web pages.
They uncovered five layers that lie between a legitimate advertiser and a
questionable search spam Web site.
For example, a business such as orbitz.com may buy advertising from a
syndicator, who then buys space on high-traffic Web pages from an
aggregator.
In turn, the aggregator buys traffic from Web spammers. The spammers set
up the millions of "doorway" pages, designed to show up high in the search
engine rankings, for products such as ringtones or prescription drugs.
They also distribute URLs by inserting them as comments on users' blogs.
If those links are clicked, the doorway pages then redirect to other
pages, potentially bringing revenue back to its controller via
pay-per-click advertising offered by companies such as Google Inc. through
its AdSense program.
But by using new spam detection and Web page analysis, the researchers say
they've narrowed down some of the confusing redirection chains, from
hosters of doorway pages through to redirection domains.
Three out of every four unique Blogspot.com URLs that appeared in the top
50 results for commercial queries were spam, the study said. Blogspot is
the hosting site for Google's blogging service. Blogs created for
marketing purposes are sometimes referred to as "splogs."
Also, one domain - topsearch10.com - hosted many other redirection domains
that were responsible for 22 percent to 25 percent of the spam detected
during the researchers' tests, the study said.
They also narrowed down two blocks of IP (Internet protocol) addresses
that advertisements were directed through to spammers' pages. That
bottleneck, they said, "may prove to be the best layer to attacking the
search spam problem."
A responsibility also lies with advertisers to assert greater control
over where and how their ads are placed.
"Ultimately, it is advertisers' money that is funding the search spam
industry, which is increasingly cluttering the Web with low-quality
content and reducing Web users' productivity," they wrote.
U.S. Judge Throws Out Defamation Suit Against Google
A U.S. judge has thrown out a lawsuit challenging the fairness of how Web
search leader Google Inc. calculates the popularity of Web sites in
determining search results, court papers show.
In a ruling issued on Friday that came to light on Tuesday, Judge Jeremy
Fogel of the U.S. District Court for the Northern District of California
dismissed a lawsuit against Google by parenting information site
KinderStart.
The judge also imposed yet-to-be-determined sanctions on KinderStart legal
counsel Gregory Yu for making unsupported allegations against Google.
KinderStart sued Google in March 2006 alleging the Mountain View,
California-based Internet company had defamed the site by cutting it from
its Web search ranking system.
The Norwalk, Connecticut-based company, which features links to
information about raising children, accused Google of violations of
antitrust, free speech, unfair competition and defamation and libel laws.
In its suit, the company argued its site's sudden demotion in March 2005
to a "zero" ranking in Google's search system had severely harmed its
business.
KinderStart had sought class action status on behalf of what is said were
many other sites that suffered the same fate as Google fine-tunes Web
site rankings in search results.
"KinderStart had failed to explain how Google caused injury to it by a
provably false statement ... as distinguished from an unfavorable opinion
about KinderStart.com's importance," the judge's ruling states.
In addition, the judge said the plaintiff's counsel should have removed
allegations that Google discriminated against or manipulated its Web
search rankings after the judge ordered the lawyer to do so in an interim
ruling.
"While Yu has brought a novel challenge to a major corporation, it is
apparent that to some extent he has overreached in doing so," Fogel said.
"Yu had a professional responsibility to refrain from filing such
allegations if he did not have appropriate supporting evidence."
The judge granted Google the right to seek attorneys fees for the costs
of defending against these specific charges. Both sides have 14 days to
file motions before the judge determines monetary damages against Yu.
Yu is with the firm Global Law Group of San Mateo.
"All options are being explored. That's all that we are going to say at
this point," he told Reuters, but declined to describe his plans further.
A Google attorney said the company felt vindicated.
"We always felt these claims were unjustified, because courts have
consistently rejected complaints over search engine rankings, so we're
pleased that Judge Fogel promptly dismissed this case," Google litigation
counsel Hilary Ware said in a company statement.
Online Anonymity Lets Users Gets Nasty
When a California woman recently gave birth to a healthy baby just two
days after learning she was pregnant, the sudden change to her life was
challenging enough. What April Branum definitely didn't need was a deluge
of nasty Internet comments.
Postings on message boards made cracks about Branum's weight (about 400
pounds - one reason she says didn't realize sooner she was pregnant). They
also analyzed her housekeeping ability, based on a photo of her home. And
they called her names. "A pig is a pig," one person wrote. Another
suggested that she "go on the show 'The Biggest Loser.'"
"The thing that bothered me most was, people assumed because I am
overweight, I'm going to be a bad mom," Branum says. "And that is not one
little bit true."
It was yet another example of how the Internet, and the anonymity it
affords, has given a public stage to people's basest thoughts, ones that
in earlier eras likely never would have traveled past the watercooler,
the kitchen table or the next barstool.
Such incidents, and there are countless across cyberspace, also raise the
question: Is there anything to be done about it? Or is a decline in civil
discourse simply the price that we pay for the advance of technology?
"The Internet really amplifies everything," says Jeffrey Cole, of the
Annenberg School for Communication at the University of Southern
California. "We have a lot of opinions out there. All of a sudden there's
a place we can go to share them." Add to that the freedom that anonymity
provides, he says, and it "can lead to a rowdy Wild West situation, with
no one to filter it."
"It's all things said reflexively, without thinking," says Cole, who
tracks the political and social impact of the Internet as director of
Annenberg's Center for the Digital Future.
"My guess is that if you went back to these people, a lot of them would
have second thoughts." And if you asked them to add their name, as in a
traditional letter to the editor? "They'd be embarrassed."
There are examples everywhere of anonymous comments that cause harm. On
even the most innocuous sites, a parenting message board, for example,
anonymity often leads to the type of response that would hardly be likely
if names were attached.
"People post insults on here left and right," one person wrote Monday on
the New York edition of urbanbaby.com, a networking site for new mothers.
"It seems the common word these posts have is Fat. Just because someone is
overweight, fat, thick whatever you call us, doesn't mean we are ugly,
lazy or insecure ... So stop the childish remarks."
News organizations, struggling to find ways to keep their readers involved
in an increasingly digital and interactive world, are trying to strike the
right balance.
Branum's case fueled debate at the Orange County Register, whose Web site
had only recently added a public comment section after news stories.
OCRegister.com deputy editor Jeff Light says the site has modified its
message board, only six weeks old, in response to staff concerns about
inappropriate posts. Now, among other changes, language is more specific
about what the site expects from those who post, and how a comment can be
deleted.
Ideally, Light says, it's the users, not the site's operators, that should
determine what is discussed, and how. "The comment area is not a
journalistic space," he says. "The point is for people to react freely."
And Yahoo News took down its message boards completely in December, with
the goal of finding a new system that doesn't let a small group of vocal
users dominate the discourse. "Our hope is to raise the value of the
conversation," says Yahoo spokesman Brian Nelson.
Harm can be much greater when people are singled out by name on the Web;
such attacks can hurt someone's career or home life. One entrepreneur is
trying to help people recover from such attacks with a company he started
last year: ReputationDefender.
"It takes one person 20 minutes to destroy your reputation, and it costs
them nothing," says Michael Fertik, who employs about 40 part-time
"agents" on what he calls "search and destroy" missions against
unwarranted Internet attacks. "It can take you 200 hours to try to clean
it up."
Fertik, who says his is the only company providing such a service, has
clients ranging from victims of unfair comments on dating Web sites to
people who feel they've been mistreated on MySpace.com. He also is helping
several female law students fight what they call defamatory sexist and
racist comments on a message board widely read in the legal community.
Their story was reported earlier this month by The Washington Post.
Fertik says he offers "a PR service for the everyday person," charging a
fee that can be as low as $10 monthly, for a thorough search of Internet
references. The "destroy" part starts with a polite letter and can
occasionally lead to threatened legal action. (Generally, Web site
operators are not liable for offensive postings.)
One person who takes it pretty much in stride is Branum, the California
woman who was unaware she was pregnant until Feb. 26, two days before she
gave birth. Her sister had alerted the newspaper to the story. Neither of
them anticipated the nasty comments that rolled in.
But, Branum says, "it's America. People are going to say what they're
going to say. It's going to be everywhere, and you can't stop it.
Anybody's allowed." She says the flip side was the posts that came in
defending her, and the cards and letters from people she didn't know,
wishing her luck.
Her fiance was less forgiving, even calling the paper to complain. Branum
said she had a simple response for him: "Deal with it."
Vote On '.xxx' Internet Address Nears
Online pornographers and religious groups are in a rare alliance as a key
Internet oversight agency nears a decision on creating a virtual red-light
district through a ".xxx" Internet address.
The Internet Corporation for Assigned Names and Numbers, which has already
rejected similar proposals twice since 2000, planned to vote as early as
next week on whether to approve the domain name for voluntary use by porn
sites.
The decision ultimately could hinge on whether ".xxx" has the support of
the adult-entertainment industry - and many porn sites have been strongly
opposed.
"One of the criteria is that it (must) have general support among the
industry it's supposed to serve, and it does not," said Mark Kernes, a
board member with the industry trade group Free Speech Coalition. "I have
not met one single webmaster or adult video producer that is in favor of
'.xxx,' and I've met a lot of them."
Porn sites are largely concerned that the domain name, while billed as
voluntary, would make it easier for governments to later mandate its use
and "essentially ghettoize sexual information on the Web," Kernes said.
ICM Registry Inc., the company behind the proposal, has vowed to fight any
government efforts to compel its use and cited preregistrations of some
76,000 names as evidence of support. Kernes said many Web sites reserved
names simply to prevent someone else from having it.
The Free Speech Coalition believes a domain name for kids-friendly sites
would be more appropriate.
Given its voluntary nature, ".xxx" is unlikely to have much effect on
parents' ability to block porn sites.
And because a domain name serves merely as an easy-to-remember moniker for
a site's actual numeric Internet address, even if a government were to
mandate its use, a child could simply punch in the numeric address of any
blocked ".xxx" name.
Religious groups worry that ".xxx" would legitimize and expand the number
of adults sites, which more than a third of U.S. Internet users visit each
month, according to comScore Media Metrix. The Web site measurement firm
said 4 percent of all Web traffic and 2 percent of all time spent Web
surfing involved an adult site.
"They will keep their `.com' domains, and I have no doubt they will buy
their '.xxx' as well," said Patrick Trueman, special counsel for the
Alliance Defense Fund, a Christian public-interest law firm. "There will
be twice as much pornography on the Internet."
Trueman and other critics say ICM will be the only beneficiaries.
The startup, founded and funded by four entrepreneurs with backgrounds in
domain names and U.K. Internet companies, plans to charge $60 to register
a name - 10 times the fees for ".com." Ten dollars of it would go to a
companion nonprofit group that would set policies for ".xxx" use and
recommend business practices for combating child pornography and promoting
child safety.
ICANN tabled and effectively rejected a similar proposal in 2000 out of
fear the ".xxx" domain would force the body into content regulation.
ICM resubmitted its proposal in 2004, this time structuring it with a
policy-setting organization to free ICANN of that task. But many board
members worried that the language of the proposed contract was vague and
could kick the task back to ICANN. The board rejected the 2004 proposal
last May.
ICANN revived the proposal in January after ICM agreed to hire independent
organizations to monitor porn sites' compliance with the new rules, which
would be developed by a separate body called the International Foundation
for Online Responsibility.
ICM revised it again a month later to clarify ICANN's enforcement
abilities and to underscore the independence of the policy-making body.
Despite the vocal opposition, ICM Chairman Stuart Lawley said he preferred
a quick vote, adding that the complaints come from "the same people saying
the same things time and time again."
"ICM has done more to demonstrate the existence of a strong community than
any other application the (ICANN) board has approved," Lawley said. "We
have been singled out for special treatment. From the word `go,' ... we
were put in the slow lane."
If approved, ICM would be required to help develop mechanisms for
promoting child safety and preventing child pornography, and porn sites
using ".xxx" would have to participate in a self-rating system, labeling
sites based on such criteria as the presence of nudity and whether it is
in an artistic or educational context.
ICANN already has discussed the proposal during three, closed-door
teleconference meetings this year. It indicated it would be ready to vote
at a public meeting next Friday in Lisbon, Portugal.
But delays are possible if ICANN's Governmental Advisory Committee raises
last-minute objections when it meets next week. Last March, the committee
called for stronger language in ICANN's contract with ICM, and Lawley
said those points have been addressed in the latest version of
the contract.
ICM believes the domain would help the porn industry clean up its act, and
Lawley said he has gone through great lengths to put its promises into
writing.
"We are confident we have dotted every `i' and crossed every 't,'" he
said, "and the contract deserves ratification."
MIT Puts All Its Courses Online
MIT last week revealed plans to make its entire 1,800-course curriculum
available online by year's end. The university has made the contents of
some courses available on the Web since 2002. Some 1.5 million independent
learners log on to the MIT OpenCourseWare site each month, and more than
120 other universities have established similar sites.
Who are MIT's independent learners? One MIT calculation found that 17% are
educators at other schools, 32% are students elsewhere, and 49% are
self-learners. About 40% of MIT alumni use the site, says Steve Carson, the
program's director. "Usually they take courses they didn't have time for
while they were students here," he says. Courses are free; no course credit
is granted.
Other learners come from outside the United States, from Antarctica to
Darfur. The highest domestic traffic comes from leading high-tech states
Massachusetts and California, Carson says.
The OCW Consortium of universities with similar offerings includes Harvard
Law School, Johns Hopkins Bloomberg School of Public Health, Michigan
State University, Tufts University, University of Notre Dame, University of
California at Irvine, and Utah Valley State College.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.