TweakTown NewsRefine News by Category:
Google may become the first trillion dollar company, but its dominant position as the world's most commonly used search engine has intense rivalry from Amazon.
Surprisingly, Google's competition isn't other engine engine companies. Google's CEO Eric Schmidt said, "Many people think our main competition is Bing or Yahoo. But, really, our biggest search competitor is Amazon". He continued, "People don't think of Amazon as search, but if you are looking for something to buy, you are more often than not looking for it on Amazon."
Google also feels that its position is also threatened by startups and innovators who are probably working from a garage right now. It's understandable, considering that Google's humble beginnings were from a garage. On the matter, Mr. Schmidt said, "Someone, somewhere in a garage is gunning for us. I know, because not long ago we were in that garage. Change comes from where you least expect it. The next Google won't do what Google does, just as Google didn't do what AOL did." Despite its dominant position, Google is one of many search engines that is available today.
Google has been known to hire cars, boats, hikers, mountain climbers and scuba divers, but this is the first time they mount its street view camera over a camel.
The search giant hired a camel named 'Raffia' to collect images of the desert around the Liwa oasis area in Abu Dhabi. With a help of the guide, the camel took pictures of the desert region called 'the trekker' which is usually strapped on a person for taking street view images. Najeeb Jarrar, Google's product marketing manager for the Middle East and North Africa said, "We hope this collection gives you a glimpse of what it may be like to travel the desert as caravan merchants have for the past 3,000 years."
The Liwa desert is a popular tourism spot in Abu Dhabi. Company spokeswoman Joyce Baz also said that undertaking such projects helps to boost tourism in the region. She said, "In the case of Liwa we fashioned it in a way so that it goes on a camel so that it can capture imagery in the best, most authentic and least damaging way."
As the battle against the Islamic State (IS) rages on in Iraq and Syria, government officials hope to begin battling the extremist group where they have excelled: the Internet. Unlike the Taliban and Al Qaida before it, IS has successfully used social media outlets to spread its message, while also reaching curious observers. Twitter and other social media networks are working to remove official IS accounts, but many other accounts have popped up.
"This is the most socially-mediated conflict in history," said Shiraz Maher, from the Kings College London. "You literally have thousands of foreign fighters from all over the world using social media in order to convey the message about the jihad that they are fighting."
In addition to spreading messages of jihad, the Islamic State has successfully recruited new members - and spread propaganda - largely catching intelligence officers unaware of the Internet strategy.
Music and movie copyright groups tried to fight Internet piracy by suing individual file sharers, shutting down peer-to-peer networks, and creating new anti-piracy legislation. However, as Internet piracy continued to evolve, the Motion Picture Association of America (MPAA), tasked with movie copyright issues of the top six Hollywood studios, wants to adjust its tactics.
"The world is changing at warp speed," noted Chris Dodd, MPAA CEO. "We are not going to legislate or litigate our way out of it. We are going to innovate our way by educating people about the hard work of people."
Although it's refreshing to hear the MPAA isn't interested in creating new legislation or potential court litigation - many Internet users are weary that any new efforts could still end poorly for the community. But hearing that copyright groups understand there are new ways to provide content in a legitimate manner proves a shifting focus towards the future.
Internet piracy is helping boost gangs, drug dealers and terrorists, according to a major media conglomerate and the Los Angeles County Sheriff's Department. Police officers in Los Angeles County say piracy is a priority and want to clamp down on Internet pirates in neighborhoods they oversee.
"[Piracy is] supporting their ability to buy drugs and guns and engage in violence," said Todd Rogers, Los Angeles County Assistant Sheriff, in a statement to the media. "And then, the support of global terrorism, which is a threat to everybody. To identify bad guys that we need to take out of the community so the rest of the folks can enjoy their neighborhood and their families."
If in doubt, saying there is a link to terrorism and street violence - whether or not accurate - is a good way to gain headlines and try to intimidate casual users away from copyright infringement. However, without offering hard evidence of this reported link, most people will just shrug it off and keep downloading and sharing files.
Twitter and social media services are struggling to address how to block images and videos of photojournalist James Foley being beheaded by Islamic State militants. In the five-minute video, titled "A Message to America," a suspected British militant said Foley's execution is in response to recent U.S. airstrikes against IS insurgents protecting a previously seized dam in Mosul. Twitter is purging users that are sharing images and videos of the barbaric execution of the photojournalist captured in Syria.
Twitter "is actively suspending accounts as we discover them related to this graphic imagery," noted Dick Costolo, Twitter CEO, in a recent tweet.
In the UK, simply viewing, downloading or sharing the video could lead to charges under the UK's terrorism legislation.
Access to fast broadband Internet may not be dumbing younger generations down after all, with faster Web access is more conductive to learning, according to the "States with Faster Internet Access Have Smarter People" report published by High Speed Internet. The top five states with the fastest Internet service, Virginia, Delaware, Massachusetts, Rhode Island and Washington, had students with ACT scores in the top 15.
Meanwhile, the five states with the slowest Internet had average ACT scores towards the lower-end of the rankings: Alaska, Montana, Kentucky, Arkansas, and West Virginia. There were a few states that had the fastest Internet service but were in the bottom 20 average ACT scores: Michigan, North Dakota, and Utah.
A few states bucked the trend, such as Maine, which was 37th overall in Internet speed, but had the fourth best ACT average. Technology is a great asset for students, but still isn't a magic tool that will automatically make students more intelligent or learn better than students in other parts of the country - but can be utilized to make a major impact long-term.
The FBI is currently investigating the theft of 1.2 billion Internet logins and passwords compromised by Russian criminals. Credentials were taken from more than 420,000 websites and servers over a few years, with Hold Security obtaining some of the credentials earlier this month. The hacker group responsible has become better organized using sophisticated tools to compromise data, and originated from simply being a spam operation.
Not much is known about the breach, though it includes stealing data from both small and large websites in multiple countries, including the United States and Russia. It remains unknown which companies are vulnerable due to the theft, and it's unknown what the criminal gang plans to do with the stolen data.
"The FBI is investigating the recently reported incident involving the potential compromise of numerous usernames and passwords, and will provide additional information as the nature and scope of the incident becomes clearer," said Josh Campbell, FBI spokesman, in a statement to the media.
Police officers in the UK have been warned about proper social media etiquette, so they should not tweet while naked or after drinking, and should even avoid sharing updates on social media if they are eating doughnuts. Some UK police officers have been found sharing racist and homophobic comments on Twitter, along with reckless pictures in which they are posing with weapons.
If police are reckless with social media, it's likely that someone will notice - and tweets will be re-tweeted and Facebook status updates will be shared. There have been 828 cases of online-related incidents in the UK from 2009 until February 2014, according to Freedom of Information requests. Officers receive written warnings when found being inappropriate on social media, and punishments can escalate depending on a case-by-case basis.
"Social media is a key tool for us in having conversations with communities, using it not only to pass information but to receive information about crime and incidents, help people make informed choices," said Ian Hopkins, Greater Manchester Police Deputy Chief Constable, in a UK media statement. "So staff must act with integrity, with fairness, with honesty, openness, and regardless of whether they are tweeting as John Smith or Joanna Smith, if they are recognizable as a PC or a member of police staff, then they have to be taking into account the code of ethics."
Delaware Governor Jack Markell signed House Bill (HB) 345, a bill that will allow family members of the deceased to access Twitter and other social media accounts. As part of the "Fiduciary Access to Digital Assets and Digital Accounts Act," executors of an estate can have legal control of a social media account, in the same manner of controlling a physical asset.
It's an interesting debate because social media accounts typically disappear when a person dies, Facebook and Twitter usually prevents access to the accounts. Facebook plans to memorialize pages of deceased members rather than delete them - and Google will delete accounts or provide access to select family members.
"But if a person dies and his will is governed by Delaware law, the representative of that person's estate would have access to the decedent's Twitter account under HB 345," said Kelly Bachman, Delaware governor's office spokeswoman, in a statement. "So the main question in determining whether HB 345 applies is not where the company having the digital account (i.e. Twitter) is incorporated or even where the person holding the digital account resides."