Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 13 Issue 43

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 13, Issue 43 Atari Online News, Etc. October 28, 2011


Published and Copyright (c) 1999 - 2011
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1343 10/28/11

~ Happy 10th XP, Goodbye! ~ People Are Talking! ~ AmigaOne X1000 Soon!
~ UN Panel To Help Poor! ~ Google+ Photo Editing! ~ John McCarthy Dies!
~ Duqu Server Shut Down! ~ Cover Browsing Tracks! ~ HP Staying With PCs!
~ 15 Years, Little Change ~ Barrage of Blockbusters ~ PS Vita Bundle!

-* Japan Is Caught Flat-footed! *-
-* China Police Detain Internet Users! *-
-* Feds To Monitor Google Privacy Practices! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Okay, so apparently Mother Nature is playing an early "Trick 'o' Treat"
trick on us here in New England! It's not even Halloween yet and we've
had snow, with an early major storm predicted for the weekend. Heck, the
leaves on my trees have just started to turn color and fall this week!
I am definitely not ready for this stuff yet! Hopefully I won't end up in
a situation like I did a few years ago and have a lot of snow on the
ground before my leaves fall; they'll end up waiting to be cleaned up in
the Spring!

So, while we prepare for an early fall Nor'easter, we wish you all a safe
and hair-raising Halloween holiday. Remember to drive safely that night
and watch out for all of those little ghosts and goblins on the streets.
And, after that, remember that it's Daylight Savings time this weekend;
enjoy that extra hour of sleep!

Until next time...



=~=~=~=



->In This Week's Gaming Section - PS Vita Bundle Offers Early Access!
""""""""""""""""""""""""""""" Barrage of Blockbusters!





=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



PlayStation Vita First Edition Bundle Offers Early Access... For A Price


For those who think an extra $50 is a small price to pay for the right to
own a PlayStation Vita a week ahead of the common people, Sony has a deal
for you.

Announced this week on the official PlayStation Blog, the PlayStation Vita
First Edition Bundle puts the handheld system in gamers’ hands February 15
- a full seven days before everyone else. (Everyone who didn’t also
pre-order it, that is.)

However, the ability to show off the Vita’s array of bells, whistles, and
fancy sensors comes with a price, folks.

For consumers here in North America, the First Edition Bundle will cost
$350 for the 3G + Wi-Fi model, a case, a 4GB memory card, and a copy of
Little Deviants (a mini-game that shows off the Vita’s abilities) - which
amounts to $50 more than the same package will cost on February 22. The
non-3G Vita will also get a First Edition Bundle, but it will only be
available in Canada and will cost $300 - a price tag that also adds $50
to the standard retail price.

The PlayStation Vita First Edition Bundle goes on sale today at 'select'
retailers.



Video Game Makers Prepare Barrage of Blockbusters


Video game makers are breaking out the big guns and hitting players with
a barrage of dynamite titles that will compete for their devotion and
entertainment dollars this holiday season.

Bethesda Softwork's freshly released "Rage" blends brilliant graphics with
fast-paced combat on foot and in vehicles in an expansive vision of an
Earth rendered wasteland by an asteroid strike.

"Resistance 3," crafted by Insomniac Studios exclusively for Sony
PlayStation 3, builds on the shooter franchise's notorious arsenals to
arm players in a fierce last-ditch quest to save humanity from alien
invaders.

"Battlefield 3" launched Tuesday, getting a head start on eagerly-awaited
shooter rival "Call of Duty: Modern Warfare 3," which hits the market in
early November.

Those who prefer to duel with their wits can play the famed Dark Knight
from comic book lore in "Batman: Arkham City," a sequel that arrived this
month to rave reviews.

Electronic Arts has meanwhile added a new pet-themed version to its cult
hit Sims videogame franchise.

"This is the most crowded release schedule I've ever seen," video game
industry analyst Michael Pachter, of Wedbush Morgan Securities, told AFP
on Wednesday.

"They are all going to make money," he predicted. "And this is the season
to make money."

The year is finishing out with a barrage of of must-have titles. Video
game makers are also enticing customers by adapting to the new
motion-sensing capabilities of Xbox 360 and PlayStation 3 consoles.

Pachter expected it to be a lucrative season, with the earliest titles to
hit the market grabbing the largest share.

"It is like going to a smorgasbord, and by the time you get to the dessert
your plate is full," Pachter said.

"Everything is so good that people are going to fill up their plates by the
time those later games get there... Those out first are the winners and the
losers are the guys who come out last; it is not a quality issue."

"Uncharted 3: Drake's Deception," an action-adventure title set for release
on November 1, features breathtaking graphics and is seen as a sure
contender for video game of the year.

"Modern Warfare 3" meanwhile promises to "such the air out of gamers'
lungs" when the title becomes available to zealous fans of the military
shooter franchise a week later, according to Pachter.

That could leave players' wallets light by the time French video game
titan Ubisoft releases the next installment in its "Assassin's Creed"
franchise in mid-November.

"Saints Row: The Third" and "Ultimate Marvel vs. Capcom 3" are due to hit
the market at about the same time.

Car racing game "Need for Speed" and Bethesda's epic fantasy game "The
Elder Scrolls V: Skyrim" will also come out in November.

"They are all going to be good," Pachter said, predicting that lackluster
packaged video game sales would get a boost over the holidays and
downplaying the impact of free online games, like those offered on social
networks.

Blockbuster titles typically debut with prices in the $40 to $60 range.

But Pachter likened big console videogames to the major Hollywood success
"Avatar" and free online games, like those from startup Zynga, to hit
television programs such as "American Idol."

"They are both televised entertainment, but they don't compete," he said.
"There is not a person alive who said they couldn't watch 'Avatar' because
they watched 'American Idol' instead."



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Feds To Monitor Google’s Privacy Practices For Next 20 Years


The U.S. Federal Trade Commission on Monday finalized a landmark
settlement with Google in which the company has agreed to be audited for
its privacy practices for the next 20 years.

The commission has said that this is the first time that it has required
any company to formally implement a comprehensive privacy program to
protect individuals’ personal information.

The FTC commissioners voted to approve the settlement 4-0, after the
period for public comment ended. The proposed settlement was announced in
March.

The FTC case was prompted by the now-defunct Google Buzz social networking
service. Google tried to tack Buzz onto Gmail users’ e-mail accounts,
enabling them to provide status updates and to share photos and videos, but
it created an uproar when it made users’ Gmail contacts public by default.

The commission charged that Google engaged in unfair and deceptive
practices in 2010 when it launched Google Buzz by leading users of its
Gmail system to believe that they could easily opt-out of the social
network. The controls that would enable them to do that were ineffective,
the FTC charged at the time.

Also the tools that Google created to enable users to limit the sharing of
users’ personal information were confusing and difficult to find, the
agency alleged.

In its complaint, the FTC said that Google had enrolled some Gmail users
in Google Buzz even after the users had clicked on a tab to decline to
use the service, and that the identities of people that Gmail account
holders most frequently communicated with were made public by default.
Worse, when users tried to get out of the service, they weren’t fully
removed.

In a press statement on the settlement, the FTC noted, "In response to the
Buzz launch, Google received thousands of complaints from consumers who
were concerned about public disclosure of their email contacts which
included, in some cases, ex-spouses, patients, students, employers, or
competitors."

Google made changes to respond to those complaints, but the FTC went after
the company because Google had violated its own privacy policy by using
its users’ personal information in a way that they had not consented to
even though Google had said they would ask for permission first.

The commission had also charged that the way that Google had gone about
representing the way its users’ personal information would be displayed
was deceptive. Users didn’t know, for example, that their most frequently
e-mailed contacts would be made public by default.

The FTC’s settlement with Google requires the company to inform and obtain
its users’ consent before it shares any of their information with third
parties, and subjects the company to 20 years of privacy audits every two
years by an independent third party monitoring service. The audits are
meant to ensure that Google is living up to its promises about what it is
doing with its users’ personal information. The company is also required
to implement a comprehensive 'privacy program.'

Google recently killed its disastrous Google Buzz project, which had been
long abandoned in favor of its Google+ social network, which has met with
general praise for the way it enables users to control how they share
information on a fine-grained level.

In an e-mail to TPM, Google’s Senior Manager of Global Communications Chris
Gaither said that Google has completely revamped the way it approaches
privacy.

"We’ve strengthened many of our internal privacy and security controls over
the past year," he said. "For example, in October we appointed longtime
Google engineer Alma Whitten to director of privacy across product
management and engineering."

In addition, Gaither says, "We’ve increased privacy training for all our
employees. We’ve tightened our compliance controls for those who deal with
sensitive data. And last fall, we added a new process to our existing
privacy review system requiring every engineering project leader to
maintain a Privacy Design Document for each initiative they are working
on. This document records how user data is handled and is subject to
regular review."

Like other technology companies, Google had come increasing fire both here
in the United States and especially in Europe over privacy issues.

Last May, Google inadvertently collected data from private WiFi networks
when its Street View cars drove by. Google has since been investigated by
the regulatory authorities in Europe over the incident.



Cyber Attacks Caught Japan Flat Footed, Experts Say


Japan was likely caught flat-footed by a recent spate of cyber attacks
against the heart of its government and defense industry, experts said,
warning that the country's credibility and diplomatic relations could
suffer unless prompt countermeasures were put in place.

Chief Cabinet Secretary Osamu Fujimura said on Wednesday that the foreign
ministry and some Japanese embassies had come under attack since June.
Earlier on Tuesday Asahi newspaper reported that hackers have targeted
computer networks at Japan's lower house of parliament since July.

The hackings follow an attack on Mitsubishi Heavy Industries Ltd, Japan's
biggest defense contractor.

In response, the government on Tuesday brought forward the launch,
originally planned for next year, of a framework that will share
information on cyber attacks and discuss defenses among private and public
sector participants, including the trade ministry. A trade ministry
official, however, told Reuters that the framework would not have the
authority to prescribe official steps against cyber attacks.

"Government reaction to these attacks seem slow. Their response needs to
be better managed. They also need technological improvements," said Makoto
Miyoshi, president of I.S. Rating, a company that rates information
security.

One problem could be multitude of government bodies that deal with cyber
security. Those include the trade ministry, the police and military, and
the National Information Security Center (NISC), which is under the
Cabinet Secretariat.

"The way cyber security is conducted in Japan needs an overhaul. For
example one body, like NISC, may need be allowed to make crucial decisions.
Otherwise Japan will always remain on the back foot," said Miyoshi.

"Attacks on government institutions hurt Japan's international credibility.
Japan also risks straining ties with the United States if it can't protect
military information."

Experts said expertise and technology from the private sector would be
crucial if the government wanted to shore up its defenses in the cyber
world.

"The government has not shown much initiative so far and judging from their
past inability to deal with social change it will try to deal each attack
with stop gap measures," said Itsuro Nishimoto, a chief technical officer
at cyber security company LAC.

"It cannot go it alone, and it could use information provided by the
private sector to prevent attacks preemptively."

Nishimoto, who described the recent attacks as a new form of international
espionage, added: "If Japan wants to seriously counter these cyber attacks,
it will have to go on the offensive and strike at the base of the attacks.
It then has to be prepared to disclose to the world where the attacks are
coming from."

Asahi said that an attack on a parliament member's computer infected by an
intruding virus was linked to servers in China, though it was hard to tell
who placed the program there. Japanese official, however, did not point at
any destination as source of the attacks.



China Police Detain Internet Users


Chinese police have begun to detain and punish people for spreading
rumours online, the government said on Tuesday, as authorities intensify
efforts to censor content on the Internet.

A university student in southwest China's Yunnan province was detained for
disseminating fake information on a local murder, the State Internet
Information Office said, while a man in Shanghai was taken into custody
for 15 days for posting falsified tax documents online.

Police were also seeking the whereabouts of those responsible for posting
false information found on three popular websites, the newly established
office said in statement on government websites.

It did not detail what kind of information had been posted.

The moves come after Chinese authorities had vowed to crackdown on rumours
and false information on the Internet.

China - which has the world's largest online population with more than
half a billion users - constantly strives to control the Internet,
blocking content it deems politically sensitive as part of a vast
censorship system.

But the rise of China's weibos - microblogs similar to Twitter, which is
banned by the communist authorities - has exposed the difficulty of
controlling access to information.

Meanwhile more and more Chinese are turning to weibos to vent their anger
over government corruption, scandals and disasters in a country where
authorities maintain a tight grip on the media.

Tuesday's statement said that in the latest crackdown an editor at an
Internet website had been warned for publishing a microblog entry
concerning the recent crash of an air force fighter jet "without
confirming the source and facts."

"Authorities will step up efforts to stop rumors and punish individuals and
websites spreading rumors," the statement said.



India Shuts Server Linked to Duqu Computer Virus


Indian authorities seized computer equipment from a data center in Mumbai
as part of an investigation into the Duqu malicious software that some
security experts warned could be the next big cyber threat.

Two workers at a web-hosting company called Web Werks told Reuters that
officials from India's Department of Information Technology last week took
several hard drives and other components from a server that security firm
Symantec Corp told them was communicating with computers infected with
Duqu.

News of Duqu first surfaced last week when Symantec said it had found a
mysterious computer virus that contained code similar to Stuxnet, a piece
of malware believed to have wreaked havoc on Iran's nuclear program.

Government and private investigators around the world are racing to unlock
the secret of Duqu, with early analysis suggesting that it was developed
by sophisticated hackers to help lay the groundwork for attacks on
critical infrastructure such as power plants, oil refineries and
pipelines.

The equipment seized from Web Werks, a privately held company in Mumbai
with about 200 employees, might hold valuable data to help investigators
determine who built Duqu and how it can be used. But putting the pieces
together is a long and difficult process, experts said.

"This one is challenging," said Marty Edwards, director of the U.S.
Department of Homeland Security's Industrial Control Systems Cyber
Emergency Response Team. "It's a very complex piece of software."

He declined to comment on the investigation by authorities in India, but
said that his agency was working with counterparts in other countries to
learn more about Duqu.

Two employees at Web Werks said officials from India's Department of
Information Technology came to their office last week to take hard drives
and other parts from a server.

They said they did not know how the malware got on to Web Werks' server.
"We couldn't track down this customer," said one of the two employees, who
did not want to be identified for fear of losing their jobs.

An official in India's Department of Information Technology who
investigates cyber attacks also declined to discuss the matter. "I am not
able to comment on any investigations," said Gulshan Rai, director of the
Indian Computer Emergency Response Team, or CERT-In.

Stuxnet is malicious software designed to target widely used industrial
control systems built by Germany's Siemens. It is believed to have crippled
centrifuges that Iran uses to enrich uranium for what the United States and
some European nations have charged is a covert nuclear weapons program.

Duqu appears to be more narrowly targeted than Stuxnet as researchers
estimate the new trojan virus has infected at most dozens of machines so
far. By comparison, Stuxnet spread much more quickly, popping up on
thousands of computer systems.

Security firms including Dell Inc's SecureWorks, Intel Corp's McAfee,
Kaspersky Lab and Symantec say they found Duqu victims in Europe, Iran,
Sudan and the United States. They declined to provide their identities.

Duqu - so named because it creates files with "DQ" in the prefix - was
designed to steal secrets from the computers it infects, researchers said,
such as design documents from makers of highly sophisticated valves,
motors, pipes and switches.

Experts suspect that information is being gathered for use in developing
future cyber weapons that would target the control systems of critical
infrastructure.

The hackers behind Duqu are unknown, but their sophistication suggests they
are backed by a government, researchers say.

"A cyber saboteur should understand the engineering specifications of every
component that could be targeted for destruction in an operation," said
John Bumgarner, chief technology officer for the U.S. Cyber Consequences
Unit.

That is exactly what the authors of Stuxnet did when they built that cyber
weapon, said Bumgarner, who is writing a paper on the development of
Stuxnet.

"They studied the technical details of gas centrifuges and figured out how
they could be destroyed," he said.

Such cyber reconnaissance missions are examples of an increasingly common
phenomenon known as "blended" attacks, where elite hackers infiltrate one
target to facilitate access to another.

Hackers who infiltrated Nasdaq's computer systems last year installed
malware that allowed them to spy on the directors of publicly held
companies.

In March, hackers stole digital security keys from EMC Corp's RSA Security
division that they later used to breach the networks of defense contractor
Lockheed Martin Corp.

Researchers said they are still trying to figure out what the next phase
of Duqu attacks might be.

"We are a little bit behind in the game," said Don Jackson, a director of
the Dell SecureWorks Counter Threat Unit. "Knowing what these guys are
doing, they are probably a step ahead."



UN Panel Sets Target To Connect Poor to Broadband


A United Nations panel has given governments a target of connecting half
the world's poor citizens to broadband Internet by 2015.

The U.N.'s Broadband Commission for Digital Development also says at least
40 percent of households in developing countries should be hooked up to
broadband within four years.

The panel representing industry, academia and governments issued the
challenge Tuesday. It said broadband access needs to be affordable even in
the most impoverished nations.

The head of the U.N.'s International Telecommunications Union in Geneva,
Hamadoun Toure, says the targets are "ambitious but achievable" if
governments work together with the private sector.



How To Cover Your Web Browsing Tracks


We're all familiar with the sinking feeling you get when the power goes
out and the computer fails to save something you've been working on. What
we don't often consider is that there's a lot of stuff computers hang onto
that we probably would be happier to see deleted as soon as possible -
especially when it comes to sharing a computer. Not everyone has the
luxury of having a system of their own. If you haven't set up individual
user accounts for everyone who shares your computer, someone inquisitive
might get curious about where you've been surfing.

Give your internet browser instant amnesia with these quick tricks. A lot
of these tactics make surfing faster and safer, too.

Back in the bad old days of dial-up internet, web browsers tried to be
helpful and speed up browsing by downloading and storing a cached copy of
the web pages we visited, since calling up that information from our hard
drives was a lot faster than downloading it every time we went to one of
our favorite sites. Now, with the widespread availability of fast internet
connections, this cache of temporary internet files is more like our
browsing software's appendix than a must-have feature.

Deleting these files when your browser closes, rather than letting them
hang around, is definitely a good idea if you don't want your computer -
and anyone who happens to sit down at it - to know where you've been.
Internet Explorer lets you do this automatically when the browser exits;
Firefox, Safari, and Chrome all require you to delete these files by hand
(though there are extensions for both Chrome and Firefox that let you
automate the process).

So, we've dumped out the temporary files that your computer has downloaded
- but that's only part of the solution. Your browser still remembers what
pages you've been to (called the browsing history), a convenience that
allows your browser to populate the address bar after you've only typed a
few letters of the web address. However, by clicking the down arrow at the
edge of the address bar, anyone can see at a glance a whole bunch of recent
web destinations that browser has been to. Not exactly the way to keep a
low profile if you're doing some holiday shopping or job hunting on
company time, to say the least.

Deleting your history purges this information from your browser's memory
(since it persists from one browsing session to the next, even if you
purge your temp files).

Cookies, those tiny text files that let web pages know you've visited them
before, are the third part of the equation. Their entire reason for being
is to identify you and track your web habits when it comes to being a
regular at a website, whether it's Amazon or Facebook or Gmail. Tossing
your cookies will allow you to visit websites as if you'd never been there
before. Anyone snooping on your computer after you've cleared the cookies
away won't see their telltale leavings, even if the cookies themselves
don't contain anything but site addresses and the dates and times of your
last visit.

Finally, there's the matter of web browsers storing usernames, passwords,
and other form data for sites you visit that require a username to log in.
This information is a time-saver when you've got a million passwords to
remember, but it can also be an Achilles' heel if you're trying to be
stealthy about your web travels.

If someone else sits down at your computer to check email on the same
webmail service you use, it's far too easy for browsers to auto-fill the
login fields with your username (and maybe even a password), so this is
something you may want to scrub from time to time, too. After all, it's one
thing for somebody to glance at your web history and something else
altogether if up comes your email inbox!

All of the current crop of internet browsers include a feature that lets
you in effect surf off the record. The programs themselves will empty the
cache and delete the browsing history when you finish; they won't load any
add-ons, and they'll ignore website requests to store cookies.

No matter which of the major browsers you use, visit the Tools menu (or
select the gear- or wrench-shaped icon that serves the same purpose) to
choose to start a Teflon-coated browsing session, usually in a new window.
The upside of explicitly opening a private browsing window is that it
doesn't inconvenience you by deleting your history, cookies, and any
stored logins you normally use, while still cloaking what you do in that
window from prying eyes.

There are plenty of reasons why you might want to use private,
no-traces-left-behind surfing sessions, like planning a surprise getaway
for you and your partner or keeping tech-savvy youngsters from knowing
where you've been shopping for their birthday present.



HP Is Staying in the PC Business


Hewlett-Packard, the world's largest tech company, decided to keep its PC
business after calculating that spinning it off would cost $1.5 billion.
Reuters reports:

The California company has been struggling in the PC market - a
low-margin but high revenue business - as niftier gadgets such as Apple
Inc's iPad have lured consumers away.

Citing deep integration of the PC group in HP's supply chain and
procurement, recently appointed Chief Executive Meg Whitman said the
company was "stronger" with the unit.

HP announced in August that it was thinking of dropping its PC business,
shocking tech news watchers. That news came as the company officially shed
a lot of its other consumer-side products. At the time, MG Siegler at
TechCrunch tweeted, "What exactly does HP do now? Just sell printer ink?"



AmigaOne X1000 To Ship by Year's End; Amiga Netbook Announced


Big news from the Amiga world this weekend. That stubborn bunch are holding
AmiWest 2011 this weekend, and it's been one heck of an eventful little,
uh, event. Not only will the AmigaOne X1000 start shipping by year's end,
Hyperion also announced something many in the Amiga world have been
waiting for for a long time: an Amiga laptop. Update: Steven Solie,
AmigaOS' team lead, also held a presentation about the past, present, and
future of AmigaOS. The team is working on some pretty interesting stuff -
protected address space, multicore support, USB3, new printing subsystem,
and much more.

It's been a long and sock-filled journey, but the exciting and unique
AmigaOne X1000 is nearing completion. AmiKit, one of the main distributors
of Amiga computers and related materials, is already taking pre-orders,
with the computers expecting to ship around Christmas. Thanks to its use
of the rare P.A. Semi PowerPC processor, the X1000 is the only computer to
ship with an Apple processor that isn't a Mac or iOS device.

The full list of specifications:

Dual-core 1.8GHz PowerISA v2.04+ CPU.
"Xena" 500MHz XMOS XS1-L1 128 SDS.
ATI Radeon R700 graphics card.
2GB RAM.
500GB Hard drive.
22x DVD combo drive.
Customised case, keyboard and mouse.
7.1 channel HD audio.
Ports and connectors:
4x DDR2 RAM slots.
10x USB 2.0.
1x Gigabit Ethernet.
2x PCIe x16 slots (1x16 or 2x8).
2x PCIe x1 slots.
1x Xorro slot.
2x PCI legacy slots.
2x RS232.
4x SATA 2 connectors.
1x IDE connector.
JTAG connector.
1x Compact Flash.

Before we get to the price, bear in mind that this computer was not
designed to be competitive on price or even features. Basically, the
X1000 was designed to be the best and fastest Amiga computer possible,
with little regarded for keeping costs down. This machine is not for
average, every-day users - this is for the Amiga connoisseur. And being a
connoisseur comes at a price. A hefty price.

"The 'First Contact' system includes the official AmigaOne X1000 'Boing
Ball' case in either black or white and includes the Nemo rev 2.1
motherboard complete with 1GB of DDR2 RAM, a Radeon HD4650 graphics card,
500GB HDD, DVR R/W optical drive, Audio & Ethernet cards. Prices start
from £1699 (excluding AmigaOS4 license, shipping, handling and sales
tax)," the AmigaKit press release states, "Optional extras include the
'Boing Ball' keyboard & mouse, Ram, HDD & Optical drive upgrade options
plus Debian Squeeze pre-installed in a dual booting configuration with
AmigaOS4."

That's quite the price right there, especially since this listed price
doesn't include the AmigaOS4 license just yet. Then again, as said, you
can't expect a system with such exotic hardware to be cheap, and I doubt
those that have expressed interest in this machine will care too much
about the price tag - much in the same way that Bethesda could ask Ç150
for Skyrim and I'd still buy it without a shred of doubt.

Good news, then, that something else lies on the horizon, something Amiga
fans have been asking and hoping for for a long time now. Yes, At AmiWest,
Hyperion, the company that develops AmigaOS, has announced a PowerPC
netbook which is already running AmigaOS4. Sticker shock won't be an
issue here - the netbook will cost between $300 and $500 (which includes
AmigaOS4), which would make this the perfect entry-level Amiga machine.
If they manage to hit the $300 price point, I'm pretty sure they'd be
able to push quite a few of these (relative to the more expensive X1000
and various sam440-based Amigas).

So, what can we expect from this machine? Well, it's 'sourced in a special
configuration from an OEM'. Current prototypes have an integrated graphics
chip, 512 MB of RAM, a few gigabytes of storage, the usual array of
USB/audio/ethernet ports, and a wireless chip. AmigaOS4 is already running
on it, but in an early state. It is expected to be released somewhere in
mid-2012.

This is very exciting news. If you has asked me only a few years ago if
any alternative operating system with special hardware requirements could
survive, you'd get a clear and duh-like 'no' - and yet, here we are, with
the X1000 right around the corner, the AmigaOne 500 by Acube, and now an
Amiga netbook on the horizon.

Exciting times indeed. I'm happy there are real Amigans working on real
Amigas, instead of people just slapping a logo on an Atom box and charging
Ç1200 for the privilege to run Ubuntu on an outdated machine. Can you
imagine people doing the latter? My, that would be just silly!



Google+ Gets New Photo Editing Tools in Time for Halloween


Google has added a built-in photo editing Creative Kit to its burgeoning
social network Google+ and is encouraging its users to try out the new
features with a Halloween-themed photo competition.

The new set of editing tools adds support for Instagram-like vintage
filters (found under the 'Effects' tab), text editing and basic photo
manipulation tools such as sharpen, crop, rotate, exposure and resize.

"Of course: we also think photo editing should be lots of fun. So we’ve
added some limited-edition Halloween effects to the Creative Kit, and
we’re inviting everyone on Google+ to join a ghoulish (and good-spirited)
photo competition," said Vic Gundotra, Senior Vice President of
Engineering at Google.

"If you want to make your own Halloween picture (or just have fun
embellishing them) try the new photo editing tool in G+. Just click "Edit"
when viewing any of your photos, then 'Creative Kit'. Dead simple..."
explained Google Senior Vice President of Operations Urs Hoelzle in a
Google+ post.

If Google+ is not your thing, there is a myriad of free photo editors to be
found online including Photoshop, Aviary, Dr.pic, FotoFlexer, LoonaPix and
(Google's recent acquisition) Picknik.

To submit your Halloween picture into the competition simply share it
publicly on Google+ along with the hashtag #gplushalloween before
November 3.



Happy 10th Birthday, Windows XP! And Goodbye


Suppose on your birthday, your parents were firm in saying that, within a
few years, they didn't want anything to do with you. Now you know how
Windows XP feels.

On Tuesday, the venerable workhorse of operating systems turned a ripe 10
years old. Introduced in 2001, it was an advancement over its older
brother, Windows 2000. Key among its improvements were a streamlined,
task-based interface that allowed users to find their apps and files more
quickly through the taskbar or Start Menu.

Other enhancements included improved power management, a faster boot, and
a reputation for being stable.

But Microsoft is eager to move users to Windows 7, and the company has
once again confirmed that they will end all remaining support for XP by
April 2014.

"We are end-of-lifing XP and Office 2003 and everything prior" at that
time, Microsoft Chief Operating Officer Kevin Turner told a financial
analysts meeting last month, a position the company reaffirmed this week.

He added that, for the businesses that haven't upgraded, "XP has been a
wonderful product," but now it's "time for it to go." The 2014 date,
actually, is an extension on the death sentence, since Microsoft normally
ends OS support ten years after launch.

The last PCs with XP pre-installed were sold in October of last year, and
the end of software sales of the OS was in 2008.

In a post on the official Windows Experience Blog, Kristina Libby asked
readers to "think about hair - are you still rocking the same cut" as 10
years ago? Since most readers would reply in the negative - assuming they
can remember their haircut from 10 years ago - Libby asked, "Why then are
you still on Windows XP when Windows 7 is so much better?"

The blog post includes an illustrated infographic, titled, "Standing still
is falling behind." It lists a variety of popular items from 10 years ago,
and compares them with ones today - most notably, XP vs. Windows 7.

But the move toward 7 has been slower than the company would have liked,
with only an estimated 25 percent of all enterprises that use Windows
using Windows 7. Microsoft has said that 90 percent of businesses plan to
make the transition. According to a variety of surveys, XP is still being
used by more than half of all business users.

The relative slowness in making the transition has been attributed to the
disastrous Windows Vista, which many users hated, and the wait for the
coming Windows 8, which Microsoft has started previewing and promoting.

There's also a large contingent that endorses that dictum, "If it ain't
broke, don't fix it," and are remaining with XP - at least until Microsoft
gives a good reason to upgrade. Finally, there are some businesses who are
migrating, or considering migrating, to non-Windows platforms, such as
Apple or Google's Android or Chrome. The center of gravity in computing
has moved to mobile devices, an environment where Windows barely has a
presence, while Apple and Google are currently the kings of mobile.



Apple’s ‘Slide to Unlock’ Patent Worries Taiwanese Government


Apple’s recent success in patenting the ‘Slide to Unlock’ gesture used on
its iOS devices has the Taiwanese government worried, causing the country’s
Premier (Prime Minister), Wu Den-yih, to direct a number of government
agencies to assess whether Taiwanese companies will be affected by a
possible restriction on the gesture.

Focus Taiwan reports that the government issued the request two days after
the USPTO granted the world’s biggest technology company a patent that
covers the unlocking mechanism on iPhone and iPad devices. Since the
gesture was incorporated, both Windows Phone and Android devices have been
seen to utilise the same mechanism.

The original patent was filed in December 2005, more than a year before
the first iPhone was released.

Attending a weekly Cabinet meeting, Wu said that he was concerned about
Apple’s new patent, particularly how it would affect Taiwanese companies
operating in the smartphone and tablet markets. As a result, both the
Ministry of Economic Affairs (MOEA) and the Industrial Technology Research
Institute (ITRI) have been instructed to help domestic companies (which
includes HTC) to deal with possible patent infringement complaints filed
by the Cupertino-based company.

Apple is currently embroiled in a number of patent disputes with Samsung
and HTC over claims of copying and use of specific software technologies
in their Android devices. It is not known whether the company intends to
utilise the Slide to Unlock patent against its rivals but the threat
remains.



John McCarthy Dies, Age 84


The news already hit HackerNews late last night, but at that time there
was no confirmation so I decided to wait until we knew for sure. Well,
after Dennis Ritchie and Steve Jobs, the technology world lost another
great mind yesterday. Stanford has confirmed that John McCarthy, the
creator of LISP and the father of artificial intelligence, has passed
away, age 84.

John McCarthy truly was a visionary, coining the term artificial
intelligence way back in 1955, and with the Dartmouth Conference of 1956,
McCarthy established the field of Artificial Intelligence, together with
Marvin Minsky, Claude Shannon, and Nathan Rochester. This wasn't his only
accomplishment, however.

McCarthy also created the LISP programming language, the second oldest
high-level programming language in the word (FORTRAN is the oldest). The
LISP programming language was officially proposed in McCarty's research
paper 'Recursive Functions of Symbolic Expressions and Their Computation
by Machine, Part I', which is available for free online. As part of further
improving LISP, McCarthy also invented garbage collection.

He further contributed to many other aspects of technology, such as
timesharing. While Bob Bemer was the first to propose a time-sharing
mechanism for computers, McCarthy was the first to develop a working
time-sharing system on an IBM 704; the Compatible Time-Sharing System,
grew out of McCarthy's work, and was the precursor to MULTICS, which in
itself was the precursor to UNIX.

As said, he contributed to many more fields within information technology
in a time when the field was just starting to get a solid foothold in the
world of science. I don't know about you, but October 2011 is more and
more starting to look like The Month Computing Died.



The Internet Hasn't Changed Much in 15 Years


You may think that the web has evolved at breakneck speeds over the past
decade and a half, but Jared Newman over at Technologizer has a first-hand
document showing that the early Internet wasn't all that different from
today's. While at his folks' house in Connecticut for the weekend, Newman
came across a high-school handout from 1996 explaining the advantages and
disadvantages of using that newfangled "Internet" everybody was talking
about. So what was the Internet circa 1996 like? Well, at least in terms
of how people used it, it doesn't sound all that different from what we
have in 2011.

Clearly, the reasons people use the Internet haven't changed much since
1996. Access to news, weather, video, pictures, maps, stores, games, and
friends - it's all there listed there under "Advantages." (However, no
one uses chat rooms anymore. The function they served has largely be taken
over by social networks.) Some of the problems plaguing the early Internet
in the "Disadvantages" column are still here today too. Despite the rise of
reputable online journalism outlets, people still rail against the web as
being unreliable. Security is still as much an issue as it ever was. And
the "hours" that Internet addicts spend online? By that loose criteria,
almost everybody would be considered an addict today.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT