Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 15 Issue 20

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 15, Issue 20 Atari Online News, Etc. May 24, 2013


Published and Copyright (c) 1999 - 2013
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1520 05/24/13

~ Irish: No Whipping Boy! ~ People Are Talking! ~ Banned by "Mistake"!
~ China's Hacking Culture ~ R.I. House Delays Vote! ~ Goodbye Lotus 1-2-3!
~ Google Antitrust Probe! ~ Teens Twitter Migration ~ UK: Tweet Libelous!
~ PayPal Marketing Push! ~ Xbox One Game Discs Use ~ "Irrational" Hackers!

-* New Xbox One, What's Missing *-
-* Atari Seeks Court Approval for Sale *-
-* Why Internet Sucks You in Like A Black Hole *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



It's been a relatively quiet week, for a change. Minimal family issues to
have to deal with this week, although they are there. The weather hasn't
been all that great, but I did manage to get in a little yard work; a good
diversion.

Unofficially, we're into the summer starting this weekend: Memorial Day
weekend. This is the time when barbecue grills are readied for a weekend
of grilling, the coolers pulled out of their hiding places and filled with
ice and beer. Winter longjohns are replaced with teeshirts and shorts.
It's a great time of the year when we can "officially" shake off the
doldrums of winter. And for us here in the Northeast, that's a huge relief!

In light of all that, we here at A-ONE want to remind you all, that during
this long holiday weekend, to be responsible out on the roads. Please,
stay safe, for your sake and mine!

Until next time...



=~=~=~=



->In This Week's Gaming Section - New Xbox: What’s Better, What’s Missing
""""""""""""""""""""""""""""" Xbox One Game Discs for Initial Installation?
Atari Seeks Court Approval for Sale of Assets!




=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



New Xbox: What’s Better, What’s Missing


Eight years after the debut of the Xbox 360, Microsoft has announced the
Xbox One. While it’s no quantum leap forward in gaming, it is attempting
to tackle one of the biggest problems we face in our living rooms: a
fractured landscape of devices that don’t play nicely together and
require WAY too many remotes.

Xbox One Specs

· 8 times the computing power of the previous Xbox 360

· 500 GB Hard Drive

· 8 GB Memory

· Built-in Blu-ray DVD player

· Kinect will come standard with every Xbox One

· Kinect redesign with larger field of view, 1080p HD Camera, enhanced
gesture recognition, and improved array microphones for voice control

· Gaming Controller redesign: more distinct d-pad design, tactile
feedback (rumble) “Impulse Triggers” and Wi-Fi Direct connectivity to the
console.

The new Xbox One represents an upgrade rather than an overhaul on
physical design, internal horsepower, and social connectivity. But it is
making an innovative play for entertainment dominance.

The One looks like a TiVo or set top box. It has HDMI in and out, so it
will take the HD input from your cable or satellite box, combine that
with the One’s built-in Blu-ray DVD player, an Internet connection and,
of course, game play to overlay and switch quickly between entertainment
options.You can watch a live sporting event while checking your fantasy
stats online.You can play a game and Skype. You can watch a Blu-ray and
check Facebook. This combined use on one screen is what sets the Xbox One
apart from other consoles and entertainment devices.

The promise is that you can do all those things on one screen without
switching inputs and using one remote. But that mandates the Xbox One play
nice-nice with all the cable and satellite boxes – which is no small feat.
The demo at the Xbox One debut used a Comcast cable connection, but it’s
unclear which providers will sign up to partner with Microsoft on the
integration.

There is an infrared out jack on the Xbox One, which may be the default
solution to remotely control 3rd party set top boxes,but the proof of
this bid to take over the living room will have to be field tested
extensively to see how it plays in the real world.

Because every Xbox One will ship with a Kinect motion gaming controller,
gesture is built into the controls for both games and entertainment.
“Swipe up” to scroll and “grab and pan” were both demonstrated to control
screens and inputs. The Kinect will also have improved microphone arrays
for improved voice control.

If the Xbox One becomes your pass-through hub for entertainment, it will
need to be “always on.” If you’ve ever forgotten to turn your Xbox 360
off, you know this is an issue because it sounds like a blender;it’s
LOUD. So Microsoft execs made a distinct point that the Xbox One is
“nearly silent.”

The presentation of the Xbox One focused on entertainment for the first
30ish minutes, and gamers were screaming via Twitter and live blogs about
Microsoft’s lack of attention to the actual game play. But when Microsoft
did turn the focus to gaming, they highlighted iterative changes to the
hardware: larger hard drive (500 GB), more memory (8 GB), improved
controller (smaller battery, better d-pad, Wi-Fi Direct connection to the
console). When they finally turned to specific games and graphics
improvements, culminating in the announcement of the next Call of Duty
franchise (Call of Duty: Ghosts), Activision highlighted the improved
facial nuances, more lifelike skin of characters, and even the fur and
expressions of the COD dog.

Call of Duty: Ghosts will debut on the Xbox One, but is not necessarily
exclusive to the Xbox One. And comparing the graphics demo for the Xbox
One to the Playstation 4 graphics demo (scroll to 1:18:00 in the linked
video), you can see that the entire industry is moving forward in
real-time rendered graphics, and this distinction between the platforms
seems less relevant than the distinction between their overall
entertainment features.

Rumors That Didn’t Pan Out

Has to be connected to the Internet to function?

Microsoft has confirmed that local games will play when offline. You don’t
need to be always connected to play but you do need an Internet
connection. One touted Internet-based aspect of the new gaming system is
that developers will be able to use Microsoft's Azure cloud computing
service and the company has increased their cloud computing servers from
15,000 to a seriously robust 300,000 servers.

Will not play used or previously owned games?

Microsoft has confirmed the XBOX One will play previously-owned or shared
games

Kinect will recognize facial expressions like smiling or frowning?

No mention of that in the presentation although it’s pretty cool that in
fitness games Kinect can read your heart-rate and now has increased
recognition of wrist and shoulder movement.

Projected games or augmented reality glasses that work with gesture
control?

It sounded too good to be true but this rumor based on patents was not
mention of those features.

Will play Xbox 360 games?

Sadly it won’t. Microsoft spokespeople have confirmed that the Xbox One
will not be backwards compatible with Xbox 360 games. There is a
possibility of emulators or cloud-based versions of previous games.

Unanswered Questions

Price? Not mentioned but $399 to $499 seems to be the likely range

Release Date? “Sometime this year.”

How many models? Not mentioned, but to stay attractive to casual gamers and
entertainment minded users a lower end model (smaller hard drive, fewer
gaming features) would seem to be a sure thing.

Cable and satellite provider compatibility? Not disclosed.

Other titles? Shown at the Xbox One launch we saw new titles from EA
Sports: FIFA, Madden, NBA Live and UFC. A peek at Forza Motorsports 5,
Quantum Break, from Remedy, and Call of Duty: Ghosts. Microsoft promises
more title info at the E3 gaming conference in June.



Xbox One Game Discs Are Only Used for Initial Installation


Microsoft's Xbox One will use Blu-ray discs for games, but you won't be
using them as frequently as you might have with your PlayStation 3. In a
statement made to Wired, Microsoft said that all games are installed to
the Xbox One's hard drive to play; you won't have to insert the disc to
run the game after that initial process. The news confirms earlier
information seen by The Verge.

Prior to the Xbox One's official unveiling, rumors had flown for months
that Microsoft's latest console would contain a mechanism to block used
games. While Microsoft has so far stayed quiet on this particular point,
the mandatory installation would seem to suggest that there may have been
at least some truth to the reports.

Microsoft has said that a fee will be charged for any game disc to be tied
to a second Xbox Live account after its initial installation. This is
likely to limit the market for second-hand games, but would not eliminate
the possibility altogether. The company is yet to confirm whether players
will be able to play games from disc or run them on secondary accounts
without paying for the installation, nor has it given any indication of
what the fee may be.

As for the rumors that claimed the Xbox One would require a constant
online connection to run games, Wired says the reality is not as
overbearing. Developers will be able to create games that hook into
Microsoft's Azure cloud services and are unable to be played offline, but
there is as yet no requirement for them to do so.



=~=~=~=



->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""



Video Game Maker Atari Seeks Court Approval for Sale of Assets


Video game maker Atari Inc is seeking court approval for the sale of all
its assets as it works its way out of bankruptcy protection.

The company said on Tuesday it tried looking for a buyer with the help of
its investment banker Perella Weinberg Partners, but was unable to find a
"stalking horse," or initial bidder, acceptable to it.

Atari has set a minimum bid of $15 million for the Atari brand. The
company received a $5 million debtor-in-possession financing from Alden
Global Value Recovery Master Fund LP.

The video game maker, known for classic titles such as Pong, Asteroids,
Centipede, filed for bankruptcy protection early this year along with its
French counterpart, Atari SA.

The case is In Re: Atari Inc, U.S. Bankruptcy Court, Southern District of
New York, No:13-10176.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Ireland Says Will Not Be U.S. 'Whipping Boy' on Tax


Ireland's finance minister said the country would not be the "whipping
boy" for what he called a flawed U.S. Senate report that said Irish
loopholes helped technology giant Apple shrink its tax bill.

Ireland has been forced to defend its corporate tax rate after the Senate
said on Monday that Apple paid little or no tax on tens of billions of
dollars in profits channeled through Irish subsidiaries and that it had
negotiated a special corporate tax rate of less than 2 percent.

While a cabinet colleague acknowledged on Wednesday that there needed to
be a clampdown on multinationals shifting profits around the world to
avoid tax, Michael Noonan went on the attack, telling senators they had
got their sums wrong.

In an angry exchange at a parliamentary committee meeting, the finance
minister accused a fellow legislator of putting the jobs of people in the
country at risk by repeating the Senate committee's claims.

"I do not want to be the whipping boy for some misunderstanding in a
hearing in the U.S. congress," Noonan said in his first comments on the
subject since the hearings.

"The central point the committee proceeded to speak of was an Irish special
tax rate of two percent or less. The two-percent annual rates are got by
dividing the tax charged by branches in Ireland by the entire profit of
the companies concerned. This is clearly wrong and misleading."

The U.S. investigation showed that the iPhone maker had paid tax worth
just two percent of $74 billion in overseas income, largely helped by
Irish tax law, which allows companies to be incorporated in the country
without declaring taxes there.

The Senate subcommittee identified three Irish-registered Apple
subsidiaries that have no tax residency in Ireland. One of these, a
holding company that includes Apple's retail stores throughout Europe,
paid no tax at all in the last five years.

Repeating a message from ministers and officials that the Irish tax system
is transparent and that no company has ever been given a special deal,
Noonan said Apple's arrangement was simply a matter of tax planning by a
company who had found a gap to exploit between two different tax
jurisdictions.

The subcommittee said as much, he added, when it noted that the Apple
subsidiaries concerned, registered in the Irish county of Cork, were
neither tax resident in Ireland nor in the United States - where foreign
corporations need not declare taxes.

Responding to a questioner who said Apple's tax rate bordered on magic,
Noonan replied: "Maybe there was a magician, but the magician wasn't
living down in Cork. Because they are not tax resident in Ireland, they
are not liable to Irish tax."

Other European governments, notably France, have previously criticized
Ireland's low rate of corporation tax - 12.5 percent - but the
revelations from Washington focus on loopholes in the Irish tax code
that Dublin is finding it harder to defend.

Richard Bruton, the minister in charge of attracting foreign companies
like Apple to invest in Ireland, said companies need to be reined in:
"They play the tax codes one against the other; that is tax planning, and
I think we do need international cooperation through the OECD to deal
with the aggressive nature of that," he told state broadcaster RTE.

Irish Prime Minister Enda Kenny steered a careful path on Wednesday,
saying on his way to a European Union meeting on tax avoidance that
Dublin was helping lead a drive for a new international consensus on tax
regimes for multinationals.

Unlike some other low business-tax economies, many with tiny populations,
Ireland is heavily dependent on foreign companies such as Google, Pfizer
and Intel for its export-led growth and for employment - foreign firms
employ some 150,000 Irish people out of a workforce of under 2 million.

While Ireland has successfully repelled attacks on its corporate tax rate
from European neighbors, U.S. pressure is more difficult to ignore.

By closing its own loopholes, Washington could threaten Ireland's status
as European hub for U.S. multinationals, and economists said it would be
better for Ireland to act first.

"In the long run, the U.S. Congress, if they wanted to, could wipe out
those 150,000 real jobs, and we don't want to provoke people by
over-egging it, by doing things that are clearly upsetting the U.S.," said
John FitzGerald of Irish think-tank the Economic and Social Research
Institute.

Bruton said scapegoating individual countries was not the answer and noted
fierce competition Ireland faces in trying to attract companies: "When I
go into the boardrooms either in Asia or the U.S., I am followed into
those boardrooms by Swiss, by Singaporeans, by Dutch, by Belgians who are
offering specially put-together deals on the tax front," he said.

"We make no apologies for having a regime that is designed to promote
employment. It is a regime we have had for close to 50 years."



Google Faces New Federal Antitrust Probe


U.S. regulators are in the early stages of an antitrust probe into whether
Google Inc, the top player in Web display advertising, breaks antitrust
law in how it handles some advertising sales, a source told Reuters on
Thursday.

The source said that it was unlikely that the Federal Trade Commission had
sent out civil investigative demands in relation to the probe, which would
be the sign of a formal and more serious investigation.

The new line of inquiry focuses on tools acquired when Google bought
display ad company DoubleClick in 2007; other firms which specialize in
helping Web publishers sell ads to put on their websites are complaining
to the FTC, the source said.

The firms have accused Google of leveraging some of its most popular
DoubleClick products, such as the ad managing system which has an
estimated 80 percent of the market, to push websites to use other
products, including Ad Exchange where websites swap ads, the source said.

According to a second source familiar with the situation, Google has not
been notified of any antitrust investigation so far. Google and the
Federal Trade Commission declined comment on the matter.

The sources did not want to be named in order to protect their business
relationships.

The FTC wrapped up an earlier investigation into Google just four months
ago, concluding that the search giant had not manipulated its Web search
results to hurt rivals.

Google was the number one player in the $15 billion U.S. display ad market
in 2012, with a 15.1 percent market share, compared with Facebook Inc's
14.6 percent share, according to industry research firm eMarketer. Google
is expected to widen its lead to 20.7 percent of the market in 2014.

Google is currently trying to convince European antitrust investigators to
wrap up a separate antitrust probe, and has offered to change some search
pages to give more space to rivals in order to satisfy their concerns.

In that case, Google is accused of hiding links to rival shopping, travel
and other websites to protect its ad revenues. On April 11, it said it
would offer consumers links to three rival sites in some searches and
would label its products.



'Irrational' Hackers Are Growing U.S. Security Fear


Cybersecurity researcher HD Moore discovered he could use the Internet to
access the controls of some 30 pipeline sensors around the country that
were not password protected.

A hacking expert who helps companies uncover network vulnerabilities,
Moore said he found the sensors last month while analyzing information in
huge, publicly available databases of Internet-connected devices.

"We know that systems are exposed and vulnerable. We don't know what the
impact would be if somebody actually tried to exploit them," said Moore,
chief research officer at the security firm Rapid7.

U.S. national security experts used to take comfort in the belief that
"rational" super powers like China or Russia were their main adversaries
in cyber space. These countries may have the ability to destroy critical
U.S. infrastructure with the click of a mouse, but they are unlikely to
do so, in part because they fear Washington would retaliate.

Now, concerns are growing that "irrational" cyber actors - such as
extremist groups, rogue nations or hacker activists - are infiltrating
U.S. systems to hunt for security gaps like the one uncovered by Moore.
These adversaries may not be as resourceful, but like Timothy McVeigh's
bombing of an Oklahoma federal building in 1995, it is the element of
surprise that is as concerning.

Former U.S. Homeland Security Secretary Michael Chertoff said he was
worried the first destructive cyber attack on U.S. soil might resemble the
Boston Marathon bombings in the sense that the suspects were not on the
government's radar.

"You are going to get relatively modest-scale, impact attacks from all
kinds of folks - hactivists, criminals, whatever," Chertoff said at the
Reuters Cybersecurity Summit last week. "Are they going to take down
critical infrastructure? They might."

Emerging cyber actors that security experts say they are most concerned
about include Iran, believed to be behind the ongoing assaults on U.S.
banking websites, as well as a devastating attack on some 30,000 PCs at
Saudi Arabia's national oil company last year.

North Korea is also quickly gaining cyber skills, experts say, after
hackers took down three South Korean broadcasters and two major banks in
March.

Another emerging actor is the Syrian Electronic Army, an activist group
that has claimed responsibility for hacking the Twitter accounts of major
Western media outlets, such as the Associated Press last month, when its
hackers sent a fake tweet about explosions at the White House that briefly
sent U.S. stocks plunging.

The U.S. power grid is the target of daily attempted cyber attacks,
according to a report by California Representative Henry Waxman and
Massachusetts Representative Ed Markey released at the House Energy and
Commerce Committee's cybersecurity hearing on Tuesday.

More than a dozen utilities report daily, constant or frequent attempted
attacks, ranging from unfriendly probes to malware infection, according to
the report.

Gerry Cauley, chief executive of the North American Electric Reliability
Corp, told the Reuters Cybersecurity Summit that computer viruses have
been found in the power grid that could be used to deliver malicious
software to damage plants. NERC is a non-profit agency that oversees and
ensures the reliability of bulk power system in the region.

Experts say that with so many unknown hackers trying to infiltrate U.S.
industrial control systems, they fear someone somewhere - perhaps even an
amateur - will intentionally or unintentionally cause damage to power
generators, chemical plants, dams or other critical infrastructure.

"Even if you don't know how things actually work, you can still wreak
havoc by crashing a device," said Ruben Santamarta, a senior security
consultant with IOActive. "Probably in the near future we may face an
incident of this type, where the attackers will not even know what they
are doing."

Santamarta has identified hundreds of Internet-facing control systems - on
the grid, at water treatment facilities and heating and ventilation
systems for buildings including hospitals. He has also uncovered bugs
built into industrial control equipment.

The Department of Homeland Security's Industrial Control Systems Cyber
Emergency Response Team, known as ICS-CERT, last week warned of a flaw
that Santamarta found in equipment from Germany's TURCK, which is used by
manufacturers and agriculture firms in the United States, Europe and
Asia.

The agency said attackers with "low" hacking skills could exploit the
flaw, letting them remotely halt industrial processes. It advised
customers to install a patch that would protect them against such
attacks.

Director of National Intelligence James Clapper told a Senate committee in
March that "less advanced, but highly motivated actors" could access some
poorly protected control systems. They might cause "significant" damage,
he warned, due to unexpected system configurations, mistakes and
spillovers that could occur between nodes in networks.

ICS-CERT posts dozens of alerts and advisories about vulnerabilities in
industrial control systems on its website each year. Companies whose
products were named in their alerts include General Electric Co, Honeywell
International Inc, Rockwell Automation Inc, Schneider Electric SA and
Siemens AG.

Dale Peterson, CEO of industrial controls systems security firm Digital
Bond, said infrastructure control systems are highly vulnerable to cyber
attacks because designers did not take security into consideration when
they developed the technology.

While hackers have yet to launch a destructive attack on U.S.
infrastructure, plenty have the skills to do so. "I would say it is only
because no one has wanted to do it," said Peterson, who began his career
as a code breaker with the National Security Agency.

House Intelligence Committee Chairman Mike Rogers said terrorists are
among the groups looking to acquire the capability to launch a cyber
attack on U.S. infrastructure, but he believes they do not yet have that
ability.

"You get the right person with the right capability committed to this and
it's a game changer," Rogers told the Summit. "My concern is it's just a
matter of time.'

Eric Cornelius, a former ICS-CERT official, said that operators in
critical sectors including power, water, oil and gas sometimes do not
implement security fixes recommended by equipment and software
manufacturers in a timely manner because they need to take plants off
line to do so and cannot afford the downtime.

Some plants lack sufficient security staff and technology to protect
networks because they don't have adequate funds, said Cornelius, director
of critical infrastructure for Cylance Inc.

A relatively unsophisticated hacker whose goal was to probe a network
could unintentionally damage a system because aging networks are fragile
and extremely sensitive, he said.

"That leaves these control systems insecure," he said.



Russia's Leading Social Network Banned by "Mistake"


Russia's leading online social network was briefly banned on Friday, in a
move dismissed as a "mistake" but which follows intensifying official
pressure on the company as President Vladimir Putin consolidates his power.

VKontakte (www.vk.com), Europe's largest homegrown social network with 210
million registered users, was put overnight on a "black list" of sites
barred from distributing content inside Russia. Hours later, the ban was
lifted.

The company's founder Pavel Durov has clashed with the authorities in the
past for providing a forum for opposition activists to organize protests
against Putin.

"This happened by mistake," said Vladimir Pikov, a spokesman for
Roskomnadzor, the state communications regulator.

"In this case, someone checked a box against the address of the social
network. The site has been removed from the list and restrictions on
access to it have been lifted."

Durov, 28, founded VKontakte in his native St Petersburg in 2006 and his
success in building the network - which attracts 47 million users daily
who log on to share news, views and photos - has drawn comparisons to
Facebook's Mark Zuckerberg.

Durov refused to comply with an order by the Federal Security Service, a
successor to the Soviet-era KGB, to close groups used by activists to
organize protests over the December 2011 parliamentary election, which
handed victory to Putin's ruling United Russia party.

Last month, he was implicated in a traffic incident in the city of St.
Petersburg in which a policeman was slightly injured.

Durov has denied being involved in the accident but, instead of agreeing
to testify as a witness, he left the country, say sources who know him. He
has not been seen in public or posted on his VKontakte page since
April 24.

The executive's difficulties coincided with a change of ownership at the
company, in which a private equity fund with Kremlin connections bought a
48 percent stake from the founding partners who backed Durov.

The day before the deal closed on April 17, VK's office and Durov's home
were searched by investigators.

The buyer, United Capital Partners, controls assets worth some $3.5
billion and is run by financier Ilya Sherbovich, who sits on the board of
three large state firms including Rosneft, the oil major run by Putin's
former chief of staff, Igor Sechin.

"It's a meticulous and methodical effort to bring the network under the
control of the Kremlin," science fiction writer and blogger Dmitry
Glukhovsky, creator of the Metro 2033 video game, told Reuters this week
of the pressure on VK.

"It's too important a resource to stand independently from the
'siloviki'," added Glukhovsky, referring to Putin's allies that share the
Russian leader's security-service background and are now in the political
ascendant.

Sherbovich, in an interview, has denied fronting for the Kremlin and said
he wanted Durov to stay on as chief executive of VKontakte.

A source close to the company said it held a board meeting in Switzerland
this week which was attended by Durov.

Durov owns 12 percent of VK, but under a shareholder pact he also votes on
behalf of the 40 percent holding owned by Mail.ru, the London-listed
internet group backed by Uzbek-born tycoon Alisher Usmanov, Russia's
richest man.

No comment was immediately available from representatives for VK, United
Capital Partners or Usmanov.

At issue, say internet watchers, is control over user-generated content
frowned on by the authorities. Friday's ban, despite being quickly lifted,
could be a shot across VKontakte's bows to ensure it tightens its
monitoring.

The network has also been accused by Russia's ombudsman for children's
rights of hosting child pornography. At least one of the Boston Marathon
bombing suspects had a page on VKontakte.

After Putin rose to power in 2000, the Kremlin reined in Russia's print
and broadcast media, encouraging trusted business "oligarchs" to buy
strategic stakes. A similar scenario, in which loyal investors ensure
internet content is screened, may now be unfolding, say some commentators.

"All big media have been brought under the control of the Kremlin, and VK
is the last medium that is free," journalist Nickolay Kononov, author of
biography "The Durov Code", said in a recent interview.



R.I. House Delays Vote on Social Media Privacy Bill


Rhode Island lawmakers have put off a vote on legislation that would stop
employers or higher education officials from demanding access to a
person's Facebook or Twitter accounts.

The House was scheduled to vote Wednesday but decided to wait to allow for
more work on the legislation.

The measure is sponsored by Rep. Brian Patrick Kennedy. Kennedy says he
wants to prevent employers or school coaches from requiring access to a
person's social media accounts as a condition of their employment or
enrollment.

The bill would prohibit employers and college officials from requiring
that an employee or student add them as a social media contact. It would
also stop them from demanding a student or employee's login information.

California already has a similar law.



China's Surprisingly Open Hacking Culture


Although the notion has been proved laughably wrong on more than one
occasion, in the U.S., the term "hacker" can still conjure up shadowy
images of cyberpunk wizards pressing keys in front of glowing terminals.
That's not the case at all, though, at least not in China. The loose
categorical term "hacking" is treated with surprising levity, whether it's
recording your neighbor's keystrokes, or hiring freelancers to hack a
rival businesses' network to steal a peek at their financials.

According to The New York Times, "the culture of hacking in China is not
confined to top-secret military compounds where hackers carry out orders
to pilfer data from foreign governments and corporations." Instead, the
practice is commonplace, openly discussed "at trade shows, inside
university classrooms and on internet forums."

The Ministry of Education and Chinese universities, for instance, join
companies in sponsoring hacking competitions that army talent scouts
attend, though "the standards can be mediocre," said a cyber-security
expert who works for a government institute and handed out awards at a
2010 competition.

Corporations employ freelance hackers to spy on competitors. In an
interview, a former hacker confirmed recent official news reports that one
of China's largest makers of construction equipment had committed
cyber-espionage against a rival.

The Times suggests that hacking can be something of a lucrative — and
perhaps viable — career in China, even if you don't want to work for the
government. For the right privately owned company, a computer wizard can
use his or her skills to earn $100,000 a year.

Yet China's relaxed attitude toward cyber-espionage could partially
explain why U.S. companies have been the targets of a growing number of
hacks from overseas. Earlier this year, The New York Times fell victim to
a critical infrastructure breach, which security experts traced back to
Shanghai and the People's Liberation Army, which was purportedly gathering
intel regarding a Times story set to be published about top-ranking
Chinese officials.

Indeed, the threat of cyber-warfare is a growing concern domestically. Out
of fear of an imminent, serious cyber-attack — or perhaps one that's
already underway — The Verge reports that a former group of government
officials and private executives are calling on Congress to "consider
passing laws allowing U.S. companies to 'counterattack' against such
hackers, whoever they may be."

The controversial idea of giving U.S. companies legal protections to "hack
back" against intruders on their networks has been proposed before by some
legal experts and companies, and some companies are even alleged to
already be engaging in the practice, despite the fact that there is no
legal framework in the U.S. permitting it. But the new recommendations
from Huntsman's group may be the highest-profile yet, as they come from
former Obama Administration officials.

To its credit, "China has said that its government is not the hack-happy
entity that the U.S. says it is," CNET notes. In fact, Chinese officials
claim that the "U.S. and other foreign governments have made attempts to
hack into [China's] systems and networks." It seems the hacking goes both
ways.



PayPal To Increase Marketing This Year for Offline Push


PayPal, the online payment operation owned by eBay Inc, will increase
marketing spending to support its push into physical stores, President
David Marcus said on Tuesday.

"You'll start seeing us amping marketing up later this year," Marcus said
in an interview with Reuters.

PayPal is trying to become a common way of paying in physical stores, a
much larger market than its online roots. The company expects to be in 2
million merchant locations by the end of 2013 and it is working on ways to
persuade consumers to use PayPal rather than their usual credit and debit
cards.

Customers would use PayPal via smartphone app. In addition, shoppers at the
checkout counter can use PayPal by typing in a mobile phone number and a
four-digit PIN that has to be set up online beforehand into the merchant's
system. They can also use a PayPal card that links to their account.

"Swiping a card in a store is not hard," Marcus said during a meeting
earlier on Tuesday with reporters at PayPal's headquarters in San Jose,
California. "We really have to bring a lot of value to consumers to change
that behavior."

Marketing will be a big part of this push. PayPal has already run several
online video ads starring movie actor Jeff Goldblum to promote its payment
service.

EBay ran a big TV ad campaign in 2011 which helped revive its online
marketplace. EBay waited to fix consumer problems with the marketplace
before it spent heavily on such marketing and PayPal's Marcus is taking a
similar approach now with the expansion into stores.

"We want to make sure we have enough density of consumer experiences
before we do a lot of marketing," Marcus explained. "We have really only
one chance at this and we do not want to disappoint customers."

PayPal has been testing a way for customers of smoothie store Jamba Juice
to order ahead using PayPal's smartphone application and pick up their
drinks at a separate line.

PayPal has been testing this at seven Jamba stores in the San Francisco Bay
area but will roll it out at more Jamba stores across the United States. It
expects to announce similar line-skipping deals with other companies soon,
Marcus said.

Also on Tuesday, Marcus announced a new partnership with RadioShack Corp.
that will introduce PayPal into all of the electronics retailer's stores
starting this month.



Goodbye, Lotus 1-2-3


The first killer app was VisiCalc. This early spreadsheet turned the Apple
II from a hobbyist toy to a business computer. VisiCalc came with room for
improvement, though. In addition, a new architecture and operating system,
the Intel-based IBM PC and MS-DOS, also needed a spreadsheet to be taken
seriously. That spreadsheet, released in early 1983, would be Lotus 1-2-3,
and it would change the world. It became the PC's killer app, and the
world would never be the same.

On May 14, IBM quietly announced the end of the road for 1-2-3, along with
Lotus Organizer and the Lotus SmartSuite office suite. Lotus 1-2-3's day
is done.
Lotus-123-3.0-MSDOSSay goodbye to Lotus 1-2-3. Its day is finally done.

Far faster than its competition, such as SuperCalc and Microsoft's first
spreadsheet, MultiPlan, Lotus 1-2-3 would become both IBM's and
Microsoft's first killer app. With the opening of the Intel architecture
and MS-DOS to IBM PC clones, Lotus 1-2-3 became the essential application
for the 1980s PC revolution.

Its dominance would be short lived. 1-2-3 would face competition from
programs such as Excel and Quatro Pro that would weaken its hold on the
marketplace by the late 1980s. By the early 1990s, 1-2-3 had fallen into
third place in the eyes of spreadsheet users. It would never recover.

When Microsoft Excel took over clear first place, Lotus was acquired by
IBM in a hostile takeover in 1995. While the expected culture war between
the ultra-liberal Lotus and the buttoned-down IBM never happened, the
acquisition didn't breath any new life into Lotus 1-2-3.

In 2012, IBM started retiring the Lotus brand. Now 1-2-3, the core product
that brought Lotus its fame, takes its turn on the chopping block. IBM
stated, "Effective on the dates listed below, [June 11, 2013] IBM will
withdraw from marketing part numbers from the following product release(s)
licensed under the IBM International Program License Agreement:" IBM
Lotus 123 Millennium Edition V9.x, IBM Lotus SmartSuite 9.x V9.8.0, and
Organizer V6.1.0.

Further, IBM stated, "Customers will no longer be able to receive support
for these offerings after September 30, 2014. No service extensions will
be offered. There will be no replacement programs."

While Lotus' groupware client program Notes and its server component
Domino will live on, IBM will no longer be offering any Lotus-branded
programs. As for 1-2-3 itself, 30 years after it helped start the personal
computing revolution, this essential PC program will be put out to
pasture.



UK Court: Lawmaker's Wife's Tweet Was Libelous


A tweet posted by the wife of Britain's parliamentary speaker about a
politician wrongly linked to child sex abuse was libelous, the High Court
ruled Friday.

A BBC report last year led to widespread Internet chatter that falsely
linked politician Alistair McAlpine to decades-old child sex abuse. The
broadcaster didn't name McAlpine, but has paid him damages.

Sally Bercow, wife of Speaker John Bercow, said she has settled a libel
case brought by McAlpine after the High Court decided that her 2012 tweet
naming the politician to her then-56,000 followers was defamatory.

Bercow had previously apologized for the tweet, which read "Why is Lord
McAlpine trending? (asterisk)Innocent face(asterisk)." She had denied,
however, that the message was defamatory, arguing that it was
conversational.

But McAlpine's lawyers had argued that it pointed a "finger of blame"
during a media firestorm, and Judge Michael Tugendhat rejected Bercow's
stance that the tweet merely posed a question.

Tugendhat said that the words "innocent face" would be understood by any
"reasonable reader" as being "insincere and ironical."

Following the judge's ruling, Bercow said she had accepted a previous
settlement offer made by McAlpine's lawyers. Bercow didn't disclose the
sums involved, but said that it would be an "understatement" to say she
was surprised and disappointed by the ruling.

"Today's ruling should be seen as a warning to all social media users,"
Bercow added. "Things can be held to be seriously defamatory, even when
you do not intend them to be defamatory and do not make any express
accusation. On this, I have learned my own lesson the hard way."




Teens Migrating to Twitter


Twitter is booming as a social media destination for teenagers who
complain about too many adults and too much drama on Facebook, according
to a new study published Tuesday about online behavior. It said teens are
sharing more personal information about themselves even as they try to
protect their online reputations.

Teens told researchers there were too many adults on Facebook and too much
sharing of teenage angst and inane details like what a friend ate for
dinner.

"The key is that there are fewer adults, fewer parents and just simply
less complexity," said Amanda Lenhart of the Pew Research Center, one of
the study's authors. "They still have their Facebook profiles, but they
spend less time on them and move to places like Twitter, Instagram and
Tumblr."

In the poll, 94 percent of teens who are social media users have a profile
on Facebook — flat from the previous year. Twenty-six percent of teen
social media users were on Twitter. That's more than double the figure in
2011 of 12 percent.

"Facebook just really seems to have more drama," said 16-year-old Jaime
Esquivel, a junior at C.D. Hylton High School in Woodbridge, Va., in an
interview.

Esquivel said he still checks his Facebook account daily but isn't using
it as regularly as in the past. He sees teens complaining on Twitter, too,
so Esquivel has been using the photo-sharing service Instagram more often,
posting a couple of pictures each day and communicating with friends.
Facebook purchased Instagram last year.

In what may be a concern to parents, more than 60 percent of the teens
with Twitter accounts said their tweets were public, meaning anyone on
Twitter — friend, foe or stranger — can see what they write and publish.
About one-quarter of kids said their tweets were private and 12 percent
said they did not know whether their tweets were public or private.

Teens are also sharing much more than in the past.

More than 90 percent of teen social media users said they have posted a
picture of themselves — up from 79 percent in 2006, the poll said. Seven
in ten disclose the city or town where they live, up from about 60 percent
over the same time period. And 20 percent disclose their cell phone number
— up sharply from a mere two percent in 2006.

Even so, Parry Aftab, an attorney and online child safety advocate, says
kids seem to be exercising more caution about their posts.

"They are sharing. This is their life," Aftab said in an interview. "But
they tend to be sharing personal stuff far better than they ever did
before."

The poll suggested teens are also taking steps to protect their
reputations and mask information they don't want others to see. For
example, nearly 60 percent of teen social media users said they have
deleted or edited something that they had published. Just over half the
teens have deleted comments from others on their profile or account.

The researchers surveyed 802 parents and their 802 teens. The poll was
conducted between July 26 and September 30, 2012, on landline and cell
phones. The margin of error for the full sample is plus or minus 4.5
percentage points.



Why The Internet Sucks You in Like a Black Hole


"Checking Facebook should only take a minute."

Those are the famous last words of countless people every day, right before
getting sucked into several hours of watching cat videos, commenting on
Instagrammed sushi lunches, and Googling to find out what ever happened to
Dolph Lundgren.

If that sounds like you, don't feel bad: That behavior is natural, given
how the Internet is structured, experts say.

People are wired to compulsively seek unpredictable payoffs like those
doled out on the Web. And the Internet's omnipresence and lack of
boundaries encourage people to lose track of time, making it hard to
exercise the willpower to turn it off.

"The Internet is not addictive in the same way as pharmacological
substances are," said Tom Stafford, a cognitive scientist at the University
of Sheffield in the United Kingdom. "But it's compulsive; it's compelling;
it's distracting."

Humans are social creatures. As a result, people enjoy the social
information available via email and the Web.

Email and social media have the same reward structure as that of a casino
slot machine: Most of it is junk, but every so often, you hit the jackpot
— in the case of the Internet, a tidbit of juicy gossip or a heartfelt
email, Stafford said. The instantaneous payoff only strengthens the
Internet's pull.

The Web's unpredictable payoffs train people much in the same way Ivan
Pavlov trained dogs, which were conditioned in the 19th century to
salivate when they heard a bell they associated with food.

Over time, people link a cue (e.g., an instant-message ping or the
Facebook homepage) with a pleasurable rush of feel-good brain chemicals.
People become habituated to seek that social rush over and over again,
Stafford said.

Reading emails or hunching over a screen can also activate humans'
fight-or-flight response, said Linda Stone, a researcher who has studied
the physiological effects of Internet use.

Stone has shown that about 80 percent of people temporarily stop breathing
or breathe shallowly when they check their email or look at a screen — a
condition she calls email apnea.

The Web often has important content that requires action or a response —
for example, an assignment from the boss or engagement photos from a
close friend — so people anticipate this and hold their breath as they
look at their screens.

But breath-holding sets off a physiological cascade that prepares the body
to face potential threats or anticipate surprises. Constantly activating
this physical response can have negative health consequences, Stone said.

Another reason the Internet is so addictive is it lacks boundaries between
tasks, Stafford said.

Someone may set out to "research something, and then accidentally go to
Wikipedia, and then wind up trying to find out what ever happened to
Depeche Mode," Stafford said, referring to the music band.

Studies suggest willpower is like a muscle: It can be strengthened, but
can also become exhausted.

Because the Internet is always "on," staying on task requires constantly
flexing that willpower muscle, which can exhaust a person's
self-control.

"You never get away from the temptation," Stafford said.

For those who want to loosen the viselike grip of the Web on their lives,
a few simple techniques may do the trick.

Web-blocking tools that limit surfing time can help people regain
control over their time. Another method is to plan ahead, committing to
work for 20 minutes, or until a certain task is complete, and then
allowing five minutes of Web surfing, Stafford said.

"Technology is all about eroding structure," Stafford told LiveScience.
"But actually, psychologically, we need more structure, and those
things are in tension."



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT