Posts Tagged ‘youtube’

Three stairs to change a approach business feel about a experience… – SYS

Sunday, February 16th, 2014

If you’ve watched my “Taxi Terry” video on YouTube — or, been in an assembly during one of my presentations — you’ve substantially listened me provoke Delta Air Lines a bit. “Delays Every Landing Through Atlanta”…”Don’t Expect Luggage To Arrive”…”Didn’t Even Leave The Airport”…are only of few of a acronyms that we allot to Delta […]

Read a strange blog entry…

More Stories By Scott McKain

Scott McKain is a business leader, bestselling author, and Hall of Fame veteran speaker.

Scott’s latest book, “The Collapse of Distinction: Stand Out and Move Up While Your Competition Fails” reached a #1 mark on list of Customer Service Bestsellers! He is a author of dual #1 additional business bestsellers ( 800-CEO-READ): “What Customers REALLY Want” (currently accessible in trade paperback) and “ALL Business is Show Business.”

He is a Co-founder and Principal of The Value Added Institute, a think-tank that examines a purpose of a patron knowledge in formulating poignant advances in a turn of customer loyalty, and has seemed on mixed occasions as a commentator and researcher on FOX News Channel. His height presentations have run a progression from a White House grass with a President in a assembly carried live on CNN and NBC’s “Today” show…to a remote outpost nearby a Amazon…all 50 states, 7 Canadian provinces…and from Singapore to Sweden…Mexico to Morocco.

An inductee into a Professional Speakers Hall of Fame, he is also a member of “Speakers Roundtable” — an elite, invitation-only organisation of twenty of a world’s tip business speakers.

Article source:

Parents should be clever about monitoring their children’s online activities

Saturday, December 7th, 2013

Only a few years ago, relatives were observant that children should not use computers until they came of age, yet currently schools need children to do task online, bringing issues into a home we have to understanding with.

Unfortunately, zero on a mechanism networks is protected from espionage eyes. We live in a low-trust, high-surveillance universe where record is being used by employers to keep lane of their employees and relatives to keep tabs on their children. In this dauntless new digital age, we should lift a brood to be wakeful that zero digital is private, that each video they watch on YouTube, each Facebook post or e-mail they send will be stored somewhere henceforth and could get them in trouble.

We can ready them by monitoring their mechanism activities to strengthen them from all a nasty things online. But should we be open about this? What about trust? Telling them that their digital footprints are manifest to us, and that checking these annals might make us feel improved about it could also perplex a attempts during monitoring.

This is a formidable dignified emanate and there are no easy answers. Is a mechanism a common instrument or usually for a child’s personal use? Monitoring a common mechanism is easier to clear than your child’s personal PC. What age is a child? What is suitable for a five-year-old will not be for a 10- or 15-year-old. Much depends on either we trust your child and hopefully we do, during slightest to some extent. Do they have a story of disobedient behaviour? If we trust them it is critical to let them know this and one approach is to give them some privacy. They are reduction expected to mangle a manners if they know we trust them; they will not wish to misuse your trust. On a other hand, if they know we don’t trust them, they will feel they have reduction to remove by adding to their record of misbehaviour. Remember we are perplexing to ready them for life in Hong Kong, not North Korea. Only if teenagers go off a rails, start holding drugs or get into severely dangerous activities should we guard them some-more closely or covertly.

But assuming we have motionless to guard your children since of concerns about their reserve that we trust overrule their right to privacy, what do we do? The common pivotal logger is an affordable resolution for those who do not have an NSA-size record budget.

What is a pivotal logger?

Key loggers come in program or hardware, including coop drives, keyboard adapters and keyboards that can be purchased online. They record each keystroke that is typed on your keyboard, regardless of either we are selling online, stuffing in your taxation lapse or responding your e-mails. They will also record a keys we form in cue fields even yet these are dark to we by asterisks. They can take screenshots too, and all this can be monitored remotely. The best loggers are roughly unfit to detect, while giveaway ones will do for many parents. But how do we routine a information towering they produce, and what do we do when notice is revealed?

To exam a program pivotal logger, we downloaded and commissioned a giveaway chronicle of one renouned focus on my family PC. It did not set off a antivirus alarm and left no designation traces. It could be accessed usually with a keyboard shortcut. Soon we was means to see all a YouTube videos my child had beheld when she was ostensible to be doing her homework, orderly displayed in sequential order. A crony who attempted a same program even saw his wife’s e-mail password. He sensitive her that her confidence had been compromised.

Of march in genuine life it would fast turn time-consuming to review a child’s information records. Parents should spend their time assisting with task or articulate to their children instead, unless they consider something critical is being set adult online, such as an appointment to buy drugs after school. Technology can't take a place of time spent interacting with children in a genuine world. We have a lot of values and information in a heads, and children need dual or 3 hours with us each day while they are flourishing adult to download many of it.

What should a primogenitor do when a child notices a monitoring? There are several strategies if we are beheld in a act: we can repudiate everything, as they do in Beijing, or explain we are behaving in a seductiveness of your child’s safety, à la NSA in a US. Of march it depends on who held you, how most we have monitored and what we did with a data. It is substantially improved to be open about it and say: get used to it, a supervision spies on we and they will view on we for your whole life; we am only a proxy stand-in! If we are not doing anything severely wrong, because worry that Big Parent is examination you?

If we are a child reading this, congratulations, reading is good for you! Have a small magnetism for your parents; they grew adult in a universe though computers, networks, smartphones, Facebook and YouTube. They are struggling to adjust to new opportunities and risks. Act irritable if we locate them monitoring we yet remember they have your best seductiveness during heart. And don’t overdo a protest, or they will consider we have something to hide!

Stephen Thompson is a Hong Kong-based publisher and IT consultant

Article source:

Your Android phone can be a remote control

Monday, October 28th, 2013

An Android phone is an forever programmable remote control that can be used to control any network-connected device. With a singular app, we can spin your Android phone into a remote control for video playback on your laptop, media core PC, or intelligent TV. Any form of wirelessly enabled device can be remote controlled, from computers to Wi-Fi-enabled thermostats and even some automobiles.

We’ll cover some of a many options here, for all from media playback and BitTorrent downloading to remote desktop access. If there’s something we wish to remotely control with your phone, there’s substantially an Android app for you.

YouTube Playback

Google allows we to control YouTube video playback from your couch. Whether you’re examination YouTube videos on your laptop, in a browser on a media core PC, or on a intelligent TV, this app is a available approach to crop for videos and control playback from your phone.

Google offers an central YouTube Remote app for this, though it’s no longer necessary. You can do this with a central YouTube app that came with your Android device.

To get started, open a website in your browser (on your computer). Click a rigging idol and name Pair device to get a pairing code.

On your Android device, open a YouTube app, daub a menu button, and name Settings. Tap a Connected TVs option, name Add a TV, and enter a pairing code. You can now crop videos in a Android app and play them on your PC or TV. After they start to play, we can use a YouTube app to postponement and resume playback.

Bottom Line: The YouTube remote control is useful, permitting we to set adult a Chromecast-style remote control complement on any PC in usually a few seconds. The usually problem is that you’re singular to YouTube. Unlike with a Chromecast, we can’t use this along with Netflix or BitTorrent DownloadsBitTorrent, offers an central remote app that allows we to control your Torrent BitTorrent customer remotely. If we leave Torrent regulating on your computer, we can start downloading torrents and guard a download routine from your phone.

You can also use this app to download finished torrents directly to your Android device. This will be friendlier on battery life than regulating an whole BitTorrent customer on your Android phone or tablet.

To get started, launch a Torrent module on your computer, open a Preferences window, and name a Remote category. Enable remote entrance and enter a mechanism name and password. Log into a uTorrent Remote mobile app with a same mechanism name and password.

Bottom Line: Torrent remote entrance is good for BitTorrent users who use Torrent on their computers, generally if they frequently leave them running. It has all a same stipulations BitTorrent does — we have to hunt down torrents and wait for them to download.utorrent-remote-for-android-1VLC Media Player RemoteOne of a many facilities VLC offers is a HTTP interface. Remote for VLC uses this HTTP interface to entrance VLC remotely and control playback. The app allows we to remote-control VLC playback, pausing playback, adjusting volume, and selecting files from a playlist.

Whether you’re examination videos in VLC on your laptop or regulating VLC on a media core PC, this app allows we to control playback in a most some-more available approach than a customary clicking that a customary VLC interface requires. Before regulating this app, you’ll have to capacitate VLC’s HTTP interface and restart VLC.

Bottom Line: Remote for VLC allows we to control a VLC interface from your smartphone, creation examination videos in VLC from a cot a most some-more gentle experience. This isn’t a finish media core resolution like XBMC and a concomitant Official XBMC Remote app is. It’s simply a some-more available approach to control a VLC actor you’re substantially already using.

Unified Remote

Unified Remote offers a far-reaching accumulation of “remotes” to remote-control your computer. You’ll find all from a Basic Input app that allows we to use your phone’s touchscreen as a rodent to touchscreen keyboard remotes. There are also remotes designed for media playback and record management.

To use a Unified Remote app, you’ll have to implement a Unified Remote server module on your computer. The app can indicate for Unified Remote servers on a internal network and fast bond to them.

Bottom Line: Unified Remote is stretchable and a rodent submit underline allows we to do things that we routinely couldn’t. For example, we could use Unified Remote as a rodent to control playback on a Netflix website. On a other hand, as a absolute tool, there are utterly a few remotes to select from and it can be a bit unmanageable compared to dedicated remote solutions.unified-remote-control-for-android-1TeamViewer Remote Desktop

When traffic with a PC, remote desktop is a ultimate remote control solution. This is apparently a bit unmanageable with a phone — sure, we could remotely entrance your PC and use a desktop from your Android phone, though a shade distance is frequency ideal for that. On a other hand, if we have an Android tablet, we could use your Windows, Mac, or Linux desktops on your vast inscription screen.

If you’re looking for a free, easy-to-use remote desktop solution, get TeamViewer. Download a TeamViewer focus on your PC and you’ll get a code. Enter a formula into a TeamViewer app on your Android inscription and you’ll be means to bond and use your desktop from your Android device.

Bottom Line: TeamViewer is a full-featured remote desktop solution, though accessing remote desktops from an Android can be a bit awkward. You’ll wish a inscription with a pretty vast shade for limit comfort, nonetheless pinch-to-zoom helps. Ultimately, a knowledge will never be as well-spoken as it would if we were sitting in front of your PC.

There are apps for determining all from Nest thermostats and DSLR cameras to BMW automobiles. Want to remote control something on your mechanism or another network-connected device? Search for an app in Google Play. You’ll substantially find what you’re looking for.

Source: Chris Hoffman,

Article source:

Girl who quit pursuit in YouTube video offering new position

Sunday, October 6th, 2013

Screengrab from YouTube

KANSAS CITY, Missouri—A University of Missouri connoisseur who used a dance video to quit her pursuit with a Taiwanese association has gotten an offer to work on a website of a daytime speak show.

Marina Shifrin of suburban Chicago became an Internet prodigy after her choreographed opening to Kanye West’s “Gone” was posted on YouTube.

She was a guest Thursday on Queen Latifah’s speak uncover on a Fox Network. The horde asked Shifrin if she wanted to work as a digital calm writer on Latifah’s website.

At initial Shifrin suspicion Latifah was joking, though a horde insisted she was serious. Latifah pronounced a brief talk would occur backstage.

The uncover finished but disclosing either Shifrin had taken a position.


Girl sends ‘I quit’ square to boss, gets dance video as response

Follow us on Facebook
Follow on Twitter
Follow on Twitter

Other Stories:


Girl sends ‘I quit’ square to boss, gets dance video as response

Myla Pilao, executive Core Technology of TrendLabs Marketing. INQUIRER.NET/MATIKAS SANTOS

Cybercriminals take info from Facebook, other amicable media

Chito Miranda. Screengrab from Chito Miranda and Neri Naig Scandal partial 2.

Cyberspace abuzz again with new ‘Chito Miranda, Naig’ sex video


Facebook app tops Southeast Asia survey

<!– Join us on

Recent Stories:

Roxas pushes for reserve regulations on use of vaporized LPG 2 mins elapsed

Cordillera officials call for ‘truly equitable’ bill after PDAF 4 mins elapsed

‘Alagwa’ wins in Guam 6 mins elapsed

2 Napoles kids face raps for forging signatures in Malampaya account scam 10 mins elapsed

China Open: we delight personification in Beijing, says champ Djokovic 14 mins elapsed

Versatile, intense character for Max Collins 16 mins elapsed

San Mig Coffee Mixers behind in PBA Governors Cup finals 26 mins elapsed

QC mayor asks owners of idle lands to spin them into parking lots 1 hour elapsed




Kanye West

Marina Shifrin


Social Media




Article source:

The record that lets dogs ‘talk’ to owners

Friday, September 20th, 2013

Researchers during Georgia Tech have grown a vest that allows a lerned dog to “talk” to a owner, anti-virus association McAfee has gathered a list of a tip 10 many “dangerous” celebrities to hunt for online – some sites have tested certain for malware – and YouTube is to concede offline observation for video calm downloaded for mobile devices.

BBC Click’s Spencer Kelly looks during these and other tech news stories.

Watch some-more clips on a Click website. If we are in a UK we can watch a whole programme on BBC iPlayer.

Article source:

Pakistan salary ‘cyber war’ for web control

Thursday, September 12th, 2013

2013-09-12 12:46

YouTube app. (Duncan Alfreds, News24)

YouTube app. (Duncan Alfreds, News24)

Multimedia   ·   User Galleries   ·   News in Pictures
Send us your pictures  Â·  Send us your stories

Lahore – In a grubby internet café, Abdullah gets turn a censors with one click and logs onto YouTube, strictly criminialized for a year and during a heart of Pakistan’s cyber quarrel for control of a web.

On 17 Sep 2012 Islamabad blocked entrance to a renouned video-sharing website after it aired a trailer for a low-budget American film deemed descent to Islam and a Prophet Muhammed.

Pakistan summoned a many comparison US diplomat in a republic to criticism opposite a Innocence of Muslims, perfectionist that a film be private and movement taken opposite a producers.

A year later, a film is hardly mentioned though YouTube, whose primogenitor association is US multinational Google, is still criminialized in Pakistan, as it is in China and Iran.

Pakistan is no foreigner to censorship. Foreign radio programmes deemed descent are blocked. Films shown during cinemas are nude of scenes deliberate too daring.


But a YouTube anathema is in name only.

Internet users like Abdullah Raheem, a university tyro in Pakistan’s informative collateral Lahore, can simply entrance a site by a elementary substitute or Virtual Private Network (VPN).

“Most people who go to propagandize or university know how to entrance YouTube, though not a rest of a population,” pronounced Abdullah.

Only 10% of Pakistan’s estimated 180 million people have entrance to a internet, one of a lowest rates in a world.

“This anathema has no impact,” pronounced Abdullah, who still feels bad about logging onto YouTube. “As a Muslim, I’m ashamed… since a Innocence of Muslims mucky Islam.”

Pakistan blocked a site usually after Google was incompetent to retard entrance to a film since it has no receiver in a country.

Although Google’s executive chair Eric Schmidt shielded hosting a film, a association did have a record to retard entrance to it in countries such as Egypt, India and Saudi Arabia.

Website filter

But a Pakistani supervision didn’t stop there. It afterwards systematic that websites be monitored for “anti-Islam content”.

The Citizen Lab during a University of Toronto, that specialises in internet censorship, says Pakistan has used Canadian association Netsweeper to filter websites relating to tellurian rights, supportive eremite topics and eccentric media.

The researchers contend that racy calm and domestic websites from Baluchistan, Pakistan’s south-western range gripped by separatist insurgency, are among those blocked.

Shortly after Pakistan’s former troops ruler Pervez Musharraf was arrested in April, Pakistan close down entrance to a satirical strain posted on YouTube’s opposition Vimeo that poked fun during a army.

But a strain Dhinak Dhinak achieved by a Beygairat Brigade, that is Urdu for Shameless Brigade, fast went viral as Pakistani internet users went by substitute VPNs to watch it.

“It is still formulating waves. So we consider they helped a recognition by banning that song,” pronounced a Brigade’s lead thespian Ali Aftab Saeed, 29.

Saeed believes that a authorities are focussed on a wider debate of internet censorship, not only restricting entrance to equipment deliberate irreverent in a regressive Muslim nation.

Freedom of expression

“We suspicion that they would try to anathema only a couple to that sold video [Innocence of Muslims] though they instead criminialized a whole website [YouTube] and afterwards they extended it to joke and people who plead a purpose of troops groups.

“So yes, it is a worrying situation,” he said.

Shahzad Ahmad, executive of internet rights debate group, Bytes For All, also says that online censorship serves a wider domestic bulletin than only shutting down irreverent content.

“The supervision is perplexing to curtail, extent and quell citizen leisure of expression,” Ahmad said.

He says adults are waging a “cyber war” opposite Pakistani institutions who are restraint and filtering a internet.

“There is a really transparent rebuttal from users, quite from a girl on supervision filtering,” he said.

Bytes For All has left to justice in Lahore, perfectionist an finish to “illegal and illegitimate” censorship of a internet.

The quarrel is critical to stop a supervision building collection of censorship that bluster “the confidence and private live” of individuals, says Farieha Aziz, a member of a Bolo Bhi advocacy organisation that is closely following a case, that encompasses a YouTube ban.

Software notice FinFisher, grown by British association Gamma and means to entrance calm on personal computers, has been rescued recently on Pakistani servers.

Although it is misleading either it has been deployed by Pakistan’s possess comprehension agencies or foreigners, a NSA liaison in a US has heightened suspicions.

Nasa identifies 3 asteroids for capture

Article source:

Hackers steal automobile computers and take a wheel

Wednesday, September 4th, 2013

As cars turn some-more like PCs on wheels, what’s to stop a hacker from holding over yours?

In new demonstrations, hackers have shown they can impact a car’s brakes during turnpike speeds, jerk a steering circle and even tighten down a engine — all from their laptop computers.

The hackers are publicizing their work to exhibit vulnerabilities in a flourishing series of automobile computers. All cars and trucks enclose anywhere from 20 to 70 computers. They control all from a brakes to acceleration to a windows, and are connected to an inner network. A few hackers have recently managed to find their approach into these perplexing networks.

The hackers were means to make a speedometer give a fake reading. (YouTube)

In one case, a span of hackers manipulated dual cars by plugging a laptop into a pier underneath a dashboard where mechanics bond their computers to hunt for problems. Scarier yet, another organisation took control of a car’s computers by mobile write and Bluetooth connections, a compress front actor and even a tire vigour monitoring system.

To be sure, a “hackers” concerned were well-intentioned mechanism confidence experts, and it took both groups months to mangle into a computers. And there have been no real-world cases of a hacker remotely holding over a car.

But experts contend high-tech hijackings will get easier as automakers give cars full internet entrance and supplement computer-controlled reserve inclination that take over pushing duties, such as braking or steering, in emergencies.

Another possibility: A tech-savvy burglar could clear a doors and expostulate off with your vehicle.

“The some-more record they supplement to a vehicle, a some-more opportunities there are for that to be abused for sinful purposes,” says Rich Mogull, CEO of Phoenix-based Securosis, a confidence investigate firm. “Anything with a mechanism chip in it is vulnerable, story keeps display us.”

Computers take over

In a final 25 years, automakers have gradually computerized functions such as steering, braking, accelerating and shifting. Electronic gas pedal position sensors, for instance, are some-more arguable than a aged stifle cables. Electronic tools also revoke weight and assistance cars use reduction gasoline.

The networks of small computers inside today’s cars are fruitful belligerent for hackers.

Charlie Miller, a St. Louis-based confidence operative for Twitter, and associate hacker Chris Valasek, executive of comprehension during a Pittsburgh mechanism confidence consulting firm, manoeuvred their approach into a mechanism systems of a 2010 Toyota Prius and 2010 Ford Escape by a pier used by mechanics.

“We could control steering, braking, acceleration to a certain extent, chair belts, lights, horn, speedometer, gas gauge,” pronounced Valasek. The dual used a sovereign extend to display a disadvantage of automobile computers. Even with their expertise, it took them 9 months to get in.

Valasek and Miller expelled a report, including instructions on how to mangle into a cars’ networks, during a hacker gathering in August. They pronounced they did so to pull courtesy to a problems and get automakers to repair them. The span contend automakers haven’t combined confidence to a ports.

Ford wouldn’t criticism other than a matter observant that it takes confidence seriously, and that Miller and Valasek indispensable earthy entrance to a cars to penetrate in.

Toyota pronounced it has combined confidence and ceaselessly tests it to stay forward of hackers. The association pronounced a computers are automatic to commend brute commands and reject them.

CD actor vulnerable

Two years ago, researchers during a University of Washington and University of California in San Diego did some-more endless work, hacking their approach into a 2009 midsize automobile by a cellular, Bluetooth and other wireless connectors — even a CD player.

Stefan Savage, a UCSD mechanism scholarship professor, pronounced he and other researchers could control scarcely all though a car’s steering. “We could have incited a brakes off. We could have killed a engine. We could have intent a brakes,” he said.

Security experts have demonstrated how to penetrate into a car’s computers around a evidence pier used by mechanics, a CD player, a tire-pressure monitoring complement and even Bluetooth. (YouTube)

Savage wouldn’t brand that manufacturer done a automobile they hacked into. But dual people with believe of a work pronounced a automobile was from General Motors and a researchers compromised a OnStar reserve system, best famous for regulating mobile record to check on business and call for assistance in a crash. The people didn’t wish to be identified since they were not certified to pronounce publicly on a matter.

GM wouldn’t criticism on a research, though a association released a matter observant it takes confidence severely and is putting strategies in place to revoke risk.

One of a people pronounced GM engineers primarily discharged a researchers’ work, though after reading a report, fast changed to tighten holes that authorised entrance to a car’s computers.

Savage doesn’t consider common criminals will be means to electronically seize control of cars anytime soon. Currently it would take too most time, expertise, income and tough work to penetrate into a crowd of mechanism systems.

“You’re articulate about a rarefied organisation who has a resources and wherewithal,” he said.

Instead, he believes simple burglary is a some-more expected effect of computerization, with criminals being means to clear doors remotely and afterwards start and expostulate a automobile by hacking by a evidence port. Remote doorway unlocking could also lead to burglary of packages, phones and other equipment that are stored in a car.

© The Associated Press, 2013

Article source:

MixBit: YouTube Founders Just Made Video-Sharing Cooler

Friday, August 9th, 2013

Michael Harper for – Your Universe Online

Mobile record operates in trends and waves. Last year companies were earnestly focused on maps. This year, a hottest apps have been print apps with filters or a cross-platform messaging apps. Video capturing and pity apps have also been big, with Twitter-owned Vine and Instagram both bringing such apps into a digital world.

Today, dual of a guys who brought us PayPal and YouTube have finally launched their possess video pity app called MixBit. Like Vine and Instagram before it, MixBit is iOS usually nonetheless an Android chronicle is slated for recover in “several weeks.”

MixBit can record and share video like other informed apps, though it differentiates itself by permitting users to get some-more in abyss with how they revise their videos. Whereas Vine and Instagram usually concede we to fire true sequences of video, MixBit lets users file a chain of a clips that make adult a longer video. Users can also import their possess video taken outward of a app, permitting for larger control of how and, maybe many importantly, when a video is shot.

MixBit videos can also be noticed and edited online. Going even one step further, MixBit clips can be pulled from other users’ videos and churned into another video, branch pity videos into a collaborative affair.

In a Jun interview with a New York Times, MixBit creators Steve Chen and Chard Hurley discussed their knowledge with YouTube and a new plea of fixation a energy of origination behind into a hands of users.

“What we finished adult formulating during YouTube is a resolution for distribution,” pronounced Hurley. “What hasn’t been solved nonetheless is a act of creation.”

MixBit users can record clips adult to 16 seconds long. They can afterwards use as many as 256 of these clips in a singular video, definition some finished products could final adult to an hour. This kind of leisure could unequivocally good lead budding brief film directors to use MixBit as a height to recover their latest work. Though filters aren’t in a app as they are in Instagram, users can supplement these and other effects in other apps and import a video later.

Though partial of what has driven people to Vine is a morality (point, shoot, share), it doesn’t take prolonged before some-more worldly users wish to do some-more with a app. For instance, conjunction Instagram or Vine concede users to save their videos and come behind to them later. Users contingency fire and share a video in a moment. This could be quite frustrating for a user who takes elaborately thought-out videos that competence take many hours to delicately tack together. Until recently, Instagram and Vine usually authorised clips shot within a app to be used in videos. Instagram usually recently began permitting users to import their videos into a app for sharing.

MixBit is app agnostic, definition it will take video from any source, be it a built in camera app or even Instagram and Vine. Users who cite other video apps or wish to supplement effects or filters outward of MixBit are some-more than acquire to do so and tack it together in a app after on. Once these clips are fabricated and common in MixBit, other users can take these clips and put them in another video, eventually permitting for app-wide collaboration.

“The whole purpose of MixBit is to reuse a calm within a system,” pronounced Hurley in another interview with a New York Times this week.

“I unequivocally wish to concentration on good stories that people can tell.”

Article source:

Thief Steals Church Computer, Calls Church’s Security Company So He Can …

Friday, August 9th, 2013

It’s been several weeks, so it contingency be time for another story of another reticent criminal. Past iterations have enclosed murder-conspiring butt-dialers, bank robbers bragging on YouTube, and criminals taunting law coercion on amicable media. However, what has been lacking in all of these stories is a genuine executive member of a internet, that that creates it tick: porn.

We can now redress that omission, interjection to a God-fearing parishioner from Oklahoma who stole a mechanism from his church and was maybe as astounded as he was undone when he couldn’t watch some good out-of-date meat-pounding on it.

An Oklahoma church worker called in a burglary to cops, observant whoever stole a mechanism from a investiture substantially attended a church or was informed with it, since there were no signs of a break-in. He was right, though a think wasn’t held while say, Googling during services. A association that had monitoring program on a mechanism alerted a church that someone kept perplexing to demeanour adult publishing on a blank computer.

Stealing a church mechanism to watch pornography? It’s roughly adequate to make one trust all is mislaid with a world. But never fear, this part ends in a most some-more foolish conform than suggested above. The church had a agreement with an IT confidence firm, that monitored use of a appurtenance and blocked inapt websites. Still, simply meaningful what kind of porn someone is into isn’t adequate to brand them (thankfully), so military weren’t means to do most with a information.

Fortunately, a simpleton burglar was feeling as useful as he was horny.

Police couldn’t unequivocally make a bust until pronounced think contacted a program association itself, seeking it to take down a monitoring software, evidently since he didn’t wish anyone examination while he surfed for porn. Police arrested a man, observant he denied holding a mechanism notwithstanding a fact that it was allegedly found in his home, though that he after confessed.

Here’s a tip for all we cathedral criminals out there: wiping a mechanism behind to bureau settings is approach easier than explaining accurately how foolish you’d have to be to call a IT confidence association whose program is on a mechanism we stole only so we could wank off to element we could substantially only as simply get on your phone.

Article source:

Are we prepared for Geek Week?

Monday, July 29th, 2013

Felicia Day is seen in a shave from Dragon Age: Redemption in this screenshot of YouTube’s Geek Week promo. (YOUTUBE SCREENSHOT) has announced that a week commencement Aug. 4 is going to be famous as “Geek Week”, so squeeze your slot protectors and oversized eyeglasses fixed-up with tape. Oh wait, that was so thirty years ago.

Stepping behind in time, if we were a geek in a ’80s, we would have expected tuned into Bits and Bytes on TVO that was an educational module about computers. For entertainment, we competence have incited to Whiz Kids – a ephemeral 1983 journey radio array starring Matthew Laborteaux that contained utterly a bit of mechanism information for such an early time period. Finally, during a cinema we could see cinema like WarGames and Ferris Bueller’s Day Off (both suspiciously starring Matthew Broderick). The times were good, though a small meagre for geeks of a day.

The finish of a nineties brought us Freaks and Geeks, that helped launch a careers of Hollywood heavyweights Linda Cardellini and James Franco, another ephemeral radio series, though one done with style, humour, and some good storylines. It all finished too quickly, maybe since a geeks were too bustling on their computers and personification with this new thing called a World Wide Web rather than examination TV.

Now, Geek Week looms in a distance. Produced in partnership with a Nerdist in a U.S. and Channel Flip in a U.K., there will be some-more than one hundred nerdy channels featured new videos, array premieres and even artistic collaborations. From Aug. 4-10, there will be opposite geek topics during a centre of it all, including Braniac Tuesday and Gaming Thursday. Check out Geek Week on YouTube and get your geek on!

You would consider that YouTube would have a site all tied up, though they don’t. The site is indeed full of good stories in categories like comics, movies, video games, wrestling, music, sports, toys and technology, enlightenment and books. Dubbed your “multiverse”, a site contains many articles on these topics. Although, we have to admit, during initial we was wondering how “geeks” and “sports” finished adult being together. However, many definitions of a word geek prove a “person with an individualist friendship to a sole interest”. The many common instance is mechanism geek (like we haven’t listened that word before) though it can unequivocally be practical to any seductiveness or topic, we suppose.

And we was means to get my geek on this week when a iCade Jr. showed adult during my doorway ( This small video diversion arcade appurtenance reproduction binds your iPhone or iPod hold and works with hundreds of classical games including many of a Atari arcade hits. The full distance iCade was designed for a iPad though this mini chronicle is usually what a geek alloy systematic for some. Of course, we have to have both!

YouTube’s parent, Google, has also been perplexing to interest to geek enlightenment this week with a recover of Google Chromecast, a code new device that plugs directly into your radio (any TV that supports HDMI) and streams wireless calm in high definition. Aimed precisely during a Apple TV market, this $35 device has already sole out during online retailers everywhere. The distance of a USB peep key, it uses your smartphone as a remote and brings calm from Netflix, YouTube, and other services to your set with ease.

I remember flourishing adult in a ’80s and being partial of geek culture. It was a waste time behind then. Now, geeks seem to order a universe with people like Microsoft’s Bill Gates and Google’s Larry Page and Sergey Brin carrying many of a money in this world. we was a small astounded that Ikea’s Ingvar Kamprad has a fifth largest happening in a world, though afterwards again that seat has a special interest to geeks. Much like a seat he sells, we suppose Kamprad put together a happening himself.

If you’re not a geek, cuddle a geek today. We’re not usually here subsequent week folks, we’re here to stay.

Syd Bolton is a curator of a Personal Computer Museum ( and a Manager of Information Technology during ACIC / Methapharm. You can strech him via-email during or by snail mail caring of The Brantford Expositor.

Article source: