Pinboard

13439 bookmarks
Custom sorting
If Android is a "stolen product," then so was the iPhone
If Android is a "stolen product," then so was the iPhone
Jobs called Android a "stolen product," but theft can be a tricky concept when talking about innovation. The iPhone didn't emerge fully formed from Jobs's head. Rather, it represented the culmination of incremental innovation over decades—much of which occurred outside of Cupertino.
·arstechnica.com·
If Android is a "stolen product," then so was the iPhone
Microsoft Office 15 apps to include 'touch mode' | ZDNet
Microsoft Office 15 apps to include 'touch mode' | ZDNet
One of the big questions many Microsoft watchers have had is how Microsoft plans to make its next-generation Office client apps more touch-friendly, so that they’ll be optimized to work on tablets and PCs running the touch-optimized Windows 8 operating system. Microsoft officials already shared that the four Office 15 apps that will be “included” on Windows 8 on ARM (WOA) tablets will be Desktop apps, not WinRT-based Metro-Style apps. So how will Microsoft make these versions of Word, Excel, PowerPoint and OneNote work better with touch than their current-generation counterparts?
·zdnet.com·
Microsoft Office 15 apps to include 'touch mode' | ZDNet
T-Mobile Unveils HTC One S With Android 4.0 | News & Opinion | PCMag.com
T-Mobile Unveils HTC One S With Android 4.0 | News & Opinion | PCMag.com
T-Mobile has announced the HTC One S, the first in a new flagship line of smartphones from HTC that could inspire envy even in the most die-hard of iPhone fans. The One S measures just 7.95mm (0.31 inches) thick. Despite that slim design, the One S packs in fast HSPA+ 42 data speeds and a 4.3-inch qHD (960-by-540-pixel) Super AMOLED display.
·pcmag.com·
T-Mobile Unveils HTC One S With Android 4.0 | News & Opinion | PCMag.com
Report: iOS Loophole Lets Apps Access Your Entire Photo Library | News & Opinion | PCMag.com
Report: iOS Loophole Lets Apps Access Your Entire Photo Library | News & Opinion | PCMag.com
Apple is under fire for yet another iOS security issue. The New York Times' Nick Bilton is reporting that a loophole in iOS allows third-party developers to access your entire photo and video library, as well as the location data attached. Once you've given an app permission to access your location data, it can then upload and store all of your photos and videos on your iPhone, iPad, or iPod touch.
·pcmag.com·
Report: iOS Loophole Lets Apps Access Your Entire Photo Library | News & Opinion | PCMag.com
I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web - Alexis Madrigal - Technology - The Atlantic
I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web - Alexis Madrigal - Technology - The Atlantic
The problem is the vast majority of Internet users will never know what's churning beneath their browsers. And the advertising lobby is explicitly opposed to setting browser defaults for higher levels of "Do Not Track" privacy. There will be nothing to protect them from unwittingly giving away vast amounts of data about who they are. On the other hand, these are the tools that allow websites to eke out a tiny bit more money than they otherwise would. I am all too aware of how difficult it is for media businesses to survive in this new environment. Sure, we could all throw up paywalls and try to make a lot more money from a lot fewer readers. But that would destroy what makes the web the unique resource in human history that it is. I want to keep the Internet healthy, which really does mean keeping money flowing from advertising.
·theatlantic.com·
I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web - Alexis Madrigal - Technology - The Atlantic
The New York Times
The New York Times
Andrew Breitbart, a conservative blogger and activist who became well-known for publishing undercover videos and revealing photographs aimed at liberals and Democrats, died Thursday morning. He was 43.
·nytimes.com·
The New York Times
Google's new privacy policy starts March 1; 4 ways to prepare - latimes.com
Google's new privacy policy starts March 1; 4 ways to prepare - latimes.com
1. Don't log into a Google account when you go online. Google's privacy changes mostly affect people who have a Google account such as Gmail or Google+. But even if you do have a Google account, you can still use plenty of Google's services -- including YouTube, Search and Maps -- without logging in first. The company may still show you targeted ads based on search terms, but at least that wart cream you just bought on CVS.com won't be linked to you forever.
·latimes.com·
Google's new privacy policy starts March 1; 4 ways to prepare - latimes.com
Twitter, the Startup That Wouldn't Die - Businessweek
Twitter, the Startup That Wouldn't Die - Businessweek
Then there’s Twitter’s management of the hashtag, which is increasingly trumping the clunkier Web URL and even the Facebook profile page as a short, handy identifier for companies and politicians. Before the State of the Union address in January, the White House released a transcript of the speech annotated with hashtags for different subjects. During this year’s Super Bowl, 8 out of 42 TV advertisers included a Twitter hashtag in their commercials. Last year only one, Audi, did so. Brands are using the hashtag in part because it links them directly to an intense and nonstop online conversation. Although still relatively small with 100 million active users (compared with Facebook’s 800 million-plus members), Twitter has become the pulse of a planetwide news organism, hosting the dialogue about everything from the Arab Spring to celebrity deaths.
·businessweek.com·
Twitter, the Startup That Wouldn't Die - Businessweek
Defense Department Wants More Control over the Internet - Technology Review
Defense Department Wants More Control over the Internet - Technology Review
The kind of automation Plunkett wants to see would significantly change the way Internet infrastructure functions. It should be possible, she said, for a company or agency to quickly instruct pieces of network hardware to drop connections or isolate computer systems when an attack hits, something that goes against the tradition of Internet hardware being independent and not easily subject to centralized control. Well-funded startup company Nicira recently launched technology that might achieve some of that, and it is known to be working with U.S. intelligence agencies.
·technologyreview.com·
Defense Department Wants More Control over the Internet - Technology Review
Texting error leads to lockdowns at West Hall middle, high schools
Texting error leads to lockdowns at West Hall middle, high schools
The text, saying "gunman be at west hall today," was received and reported to police around 11:30 a.m. But after police tracked the number, they learned the auto correct feature on the new cellphone changed "gunna" to "gunman." The message being sent to the wrong number added to the confusion. As law enforcement learned of the text message, the schools were notified to go into lockdown as authorities investigated the origins of the message.
·gainesvilletimes.com·
Texting error leads to lockdowns at West Hall middle, high schools