Logo of the United States Federal Communications Commission(Photo credit: Wikipedia)
The move would funnel money to the Connect America Fund, a subsidy the agency created last year to expand Internet access.
Image via CrunchBase
George Soros - World Economic Forum Annual Meeting Davos 2010 (Photo credit: World Economic Forum)
According to the report, Soros completely dumped his stakes in Citigroup (420,000 shares), JP Morgan (701,400 shares) and Goldman Sachs (120,000 shares), leaving him with no position in any major financials at all.
As for going long, Soros revealed a a position in Facebook, having bought 341,000 shares.
English: The iPad on a table in the Apple case (Photo credit: Wikipedia)
Google's upcoming Nexus tablet has been spotted and all of its details have been leaked. The tablet you see above is the Nexus 7 and is built by Asus. The tablet will sport a 1.3Ghz quad-core Tegra 3 processor, GeForce 12-core GPU and 1GB of RAM with two different storage variants: 8GB and 16GB according to Gizmodo.
The screen of the device will come with a resolution of 1280x800 and have an IPS display. Additionally, NFC is expected to be inside and there is also a 1.2 MP camera up front.
The two models will ring up the cash register at $199 and $249 respectively, notably undercutting the iPad by several hundred dollars. Considering that the Nexus 7 is quite cheap, it will continue to put downward pressure on the tablet market; the device is expected to run Jelly Bean, according to the leaked documentation.
Google is expected to make the announcement about the tablet at its upcoming I/O event and previous rumors have suggested that the tablet will go on sale in July.
The Internet could go dark for millions of users as early as March 8 because of a virus that has corrupted computers in more than 100 countries.
The computer script, called DNSChanger Trojan, taps into fraudulent servers, sending users of the Web to unintended - and sometimes illegal - sites.
Though the FBI has shut down the DNSChanger network and put up surrogate servers, they warned the solution was only temporary - and the court-ordered deadline is March 8.
Infected: The Trojan 'DNSChanger' could cause millions - including Fortune 500 companies - to lose their Internet if the FBI shuts down surrogate servers
Court order: The FBI has been ordered to retire their surrogate servers by March 8
According to RT Network, servers function by translating traditional website URLs to their ‘numeric counterpart.’
But computers with the Trojan, which originally emerged in Estonia, will send users to fraudulent websites.
And, if the FBI shuts off their emergency servers, millions of people could potentially be without Internet.
“Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither.” – Benjamin Franklin
They’re coming for it and show no signs of letting up. Once they get their foot in the door and before you know it, you’ll be worried and thinking twice about what you’re posting on your blog or Facebook or Twitter account. And if it appears on the Internet, the government will somehow try to tax it. Readers, if you haven’t been, you’d better get interested in this now, because we are moving closer to pivoting off the relative freedom of speech of Internet into absolute government control. And if you let the Washington ruling elite control it, who knows what the result will be? One thing for sure, it “will be for our own good,” but it won’t be good for us. Are you a terrorist? No? Then why is Big Sis spying on you?
The U.S. Patent & Trademark Office have received proposals from Apple that indicate the electronics company is working on products powered by hydrogen fuel cells, that they claim have the potential to stay charged for weeks, and “eliminates the need for a bulky and heavy battery.”
Remarks by the company in the patent fillings would indicate that the proposal to shift to hydrogen fueled products was influenced not by user experience but customer awareness:
Forward: Readers of The Plain Truth know about my theory concerning Microsoft, Google and other "overnight success" businesses, where college kids make billions overnight with flawed products. For example, Microsoft Windows never works, crashes every day. My theory is that these businesses are really "shell" companies for the USA and the CIA to spy on everyone! Google, (Government Ooggling) is a great example of this theory. This recent news story adds some more fuel to my theory... (Bob Barney- The Plain Truth)
By Bob Unruh
© 2011 WND
A federal judge has ordered that whether Google is spying for National Security Agency or not, you have no right to know.
"The NSA need not disclose 'the organization or any function of the National Security Agency, [or] any information with respect to the activities thereof,'" U.S. District Judged Richard Leon has ordered.
"Once the agency, through affidavits, has created 'as complete a public record as is possible' and explained 'in as much detail as is possible the basis for its claim,' … 'the court is not to conduct a detailed inquiry to decide whether it agrees with the agency's opinions,'" he said.
The demand for information had been raised by the Electronic Privacy Information Center, which said the ruling would be appealed.
In their heyday of the 1970s and 80s, televangelists like Jimmy Swaggart and Jim Bakker drew in hundreds of thousands of worshippers and millions of dollars before scandal and corruption gutted individual ministries and then the entire genre.
Now, however, the Internet has made it easy and inexpensive to distribute video sermons around the world, breathing new life into virtual ministries and even providing a second act for a few infamous televangelists, a Canadian researcher says.
(Reuters) - Hackers have disclosed a bug in software from Apple Inc that security experts said could be exploited by criminals looking to gain remote control over iPhones, iPads and iPod Touch devices.
The security flaw in Apple's iOS operating system came to light on Wednesday as the website www.jailbreakme.com released code that Apple customers can use to modify the iOS operating system through a process known as "jail breaking." MORE>>>>
Paul Joseph Watson
Despite the corporate-driven hubbub surrounding the inevitability of “the cloud” replacing personal hard drives as the pre-eminent storage center for all web content, this system represents another dangerous trojan horse for the establishment to complete their agenda to regulate and shut down the free Internet.
Apple, Google and Amazon amongst other tech giants have all jumped on board with “the cloud,” a remote server network that allows users to store their data without using hard drives.
“It’s all part of a generational trend away from owning physical media content and towards renting media content from the computing universal cloud,” reports Investmentu.com.
However, despite the convenience of having all your files easily accessible in one place wherever you go, the drawbacks are ominous.
The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.
Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.
|Blogger Johnny Northside|
David Makarewicz, Contributing Writer
On Friday, a Minnesota jury found that a blogger must pay $60,000 in damages because of statements he published in his blog about a public figure who was subsequently fired from his job. Internet publishers and free speech advocates should pay close attention to this case if it is appealed because the blogger was found liable even though the jury did not find that the blogger's statements were false.
This decision is the latest example of the law's apparent struggle to apply basic constitutional protections to internet publishers. If the Minnesota ruling holds up, it will mean that bloggers will have to worry they will be forced to pay for true statements that they publish that cause a person damages.
|Media Bloggers Association|
The Publius Foundation
Last month we saw Egyptians of all political leanings rise up for a single purpose: the overthrow of dictator Hosni Mubarak. There was much bloodshed and violence, usually instigated by pro-government groups or the police. Mubarak was well-entrenched and exercised all means of power in order to quell dissent and rebellion. One of his tactics, shutting down the majority of internet access and telecommunications in Egypt, received widespread international condemnation.
The Internet provided the means through which protestors were able to organize and share information amongst themselves. Social networking sites like Twitter and Facebook were the main vehicles for individual citizens to mobilize against government tyranny. Who knows whether this revolt would have been possible or succeeded without the technology of the Internet?
Among those critical of Mubarak’s heavy-handed approach was the United States. However, any call for democracy or the rights of the people out of the US government carries the bitter taste of hypocrisy these days. Politicians here are constantly pushing for more government regulation and power including over the Internet.
'The court finds that this use weighs in favor of a fair use of the copyrighted material,' Hicks wrote in his ruling, citing case law stating 'copying only as much as necessary in a greater work (story) to provide relevant factual information weighs in favor of fair use.'Although this decision is potentially great news for all blogs and sites who aggregate information, Righthaven announced this week that it will appeal the decision. Steve Green of the Las Vegas Sun quoted Righthaven lawyers as saying, “Righthaven strenuously maintains the court erred in dismissing Mr. Nelson from this case by finding his infringing conduct was protected by the defense of fair use.”
Your digital camera may embed metadata into photographs with the camera's serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it. If Apple puts a particularly creepy patent it has recently applied for into use, you can look forward to a day when your iPhone may record your voice, take a picture of your location, record your heartbeat, and send that information back to the mothership.
This is traitorware: devices that act behind your back to betray your privacy.
Perhaps the most notable example of traitorware was the Sony rootkit. In 2005 Sony BMG produced CD's which clandestinely installed a rootkit onto PC's that provided administrative-level access to the users' computer. The copy-protected music CD’s would surreptitiously install its DRM technology onto PC’s. Ostensibly, Sony was trying prevent consumers from making multiple copies of their CD’s, but the software also rendered the CD incompatible with many CD-ROM players in PC’s, CD players in cars, and DVD players. Additionally, the software left a back door open on all infected PC’s which would give Sony, or any hacker familiar with the rootkit, control over the PC. And if a consumer should have the temerity to find the rootkit and try to remove the offending drivers, the software would execute code designed to disable the CD drive and trash the PC. Read More........