Monday, August 06, 2007

Listen To Your iTunes Library On The Web With Anywhere.FM

anywherefmlogo.png Anywhere.fm has launched a new online music player that looks and feels a lot like a web based version of the iTunes player, sans the music marketplace. Like iTunes, you can load maintain a music library, reorganize your songs into play lists, and veg out to visualizations. Anywhere.fm's iTunes bulk uploader makes it easy to get up and running with your existing library.

The company leverages the web to add portability and a social layer to their music player. There is currently no cap on the number of songs you can upload to the player, so you can create a potentially unlimited music library you can listen to anywhere. Streampad is a nearly identical product with less polish.

Like a host of other social music startups, Anywhere.fm has also added music discovery features. While not as robust a discovery engine as a Last.fm and company, users can find new songs by listening to their friends' play lists and will soon be able to find new friends based on a music compatibility score. However, due to copyright concerns, playlists from other users can only be streamed as radio stations. Playlists must be a couple songs long and played in a random order. Although, Anywhere.fm isn't following official online radio play guidelines like Lala, which require station play lists to be at least three hours long before publishing.

The company competes in the increasingly crowded online music locker services like Mp3tunes, Maestro, imeem, Streampad, Songbird, and MediaMasters. The service does benefit from being simple, free, and social, but incumbents have a steady head start. Hype Machine, RadioBlogClub, and Blogmusik are also other low hassle ways to listen to music at work.

Anywhere.fm is looking to make money outside of charging users for their service. They are considering the obvious step of affiliate music sales for songs you don't own, inserting audio ads in radio streams, and selling music directly. Currently the player lists indie music from Garage Band.com, which could turn into a direct point of sale.

Anywhere.fm is a Y Combinator startup.

Update: Good video review is here.

Read More...

Amazon Flexible Payments Service Launches

As predicted, Amazon launched a new payments web service today called Amazon Flexible Payments Service, or FPS. It will compete with Paypal and Google Checkout.

FPS, Amazon says, "is the first payments service designed from the ground up specifically for developers" and "unmatched flexibility in how they can structure payment instructions." Payments can be made by credit cards, bank account debits, and Amazon Payments balance transfers.

The most important feature: people can pay using the same login credentials and payment information they already have on file with Amazon. That means people don't need to have their credit card and other personal information stored at yet more ecommerce sites. For payments over $10, Amazon will charge 2.9% + $0.30. This matches PayPal but is higher than Google, which is eating fees to gain market share (Google charges 2% + $0.20).

This may quickly become Amazon's most popular, and most profitable, web service. Anyone can now leverage their tens of millions of customers and provide a very simple payment option.

Read More...

Use GMail or Yahoo! Mail? Change Bookmarks for Better Security

This is Robert Graham posing with the GMail website open on his laptop.

Rob demonstrated to a live audience how he can successfully hack into web based email programs like GMail, Yahoo Mail! or Hotmail using the IP Address and user name (login) without requiring any password.

Let's not go in the very technical details but he used some sniffing tools called Ferret (to copy the GMail cookies to his computers) and Hamster (to use the cookies in his browser). [Details at ZDNet, TG Daily]

What can you do to prevent someone else from reading your GMail or Yahoo Mail ?

Rob's method works when you are using the HTTP mode to access your email (http://www.gmail.com/). Therefore the trick is to always use Secure Login.

Here's what you can do to safeguard your email in public wi-fi hotspots - use https:// instead of http:// - the entire session will be encrypted and the cloning cookies method will fail:

For GMail: https://mail.google.com/mail/

For iGoogle: https://www.google.com/ig

For basic HTML version of GMail - https://mail.google.com/mail/?ui=html

yahoo mail secure website Alternatively, you can install the CustomizeGoogle extension of Firefox that will always force the SSL mode in GMail incase you forget to manually type the https:// GMail URLs.

Highly recommended also because Customize Google will also encrypt your Google Docs, Google Reader, Google Web History and Google Calendar session incase these Google services share the same cookie with GMail.

For Yahoo! Mail - Check the Secure Mode link that's available just beneath the "Sign In" button.

Related: Recover Yahoo! or GMail Passwords

Read More...

Friday, August 03, 2007

Second Life (finally) gets a direct competitor: Multiverse

multiverse.jpg The brainchild of several ex-Netscape execs, the Mountain View start-up Multiverse, as the name suggests, isn't a single online world, but a platform for creating games and other 3D experiences with the company's development tools, which are then run on its servers. (Like Dark Horizons, a sci-fi MMORPG pictured here.) Version 1.0 was just rolled out yesterday, and though it's too early to know how it'll fare, one thing is official: after 4 years of being the only user-created 3D online world on the commercial market, Second Life now has competition.

The system and revenue model is markedly different from SL, however: instead of fostering user-created content in a single world, Multiverse is a network of worlds accessible by the client software. It comes with e-commerce tools built into the system, so developer's can earn an income, while Multiverse makes money by taking a 10% cut of that revenue.

I haven't yet had a chance to check it out first hand (the client is cantankerous with my Vista machine), but I'll be keeping a close eye on its progress. Multiverse's advisory board includes Avatar director James Cameron and some other Hollywood heavyweights, so you have to think movie-to-MMO tie-ins are planned. (Indeed, a Multiverse version of the cult TV show Firefly was announced last year.) What's more, famed MMO academic Ed Castronova is already using Multiverse to develop the education-oriented MMO Arden.

My writing career has been tied up in Second Life on one level or another since 2003, so you might think I'd consider Multiverse a threat to my livelihood. Actually, I'm relieved. There are some truly impressive and popular mini-MMOs built within SL, like City of Lost Angels and Midgar, but they've largely succeeded in spite of Second Life, which is still far from ideal as a platform for game development. It's never healthy for any one company to dominate a space for so long, and an active competition to attract and retain new users and developers can only benefit us all.

Read More...

Intel accelerates 45nm plans, hitting the market Q4 '07

from Engadget by Paul Miller Echoes of "take that, haters!" could be heard on Intel corporate Facebook accounts this morning as the company steals some thunder from AMD's recently announced roadmap and fancy fresh antitrust lawsuit. Intel will be launching new four core 45nm Intel Core Extreme "Penryn" processors in Q4 2007, a few months ahead of schedule. The top of the line proc is likely to hit 3.33GHz, run a 1333MHz system bus and hold 12MB of L2 cache. Only about 2-3% of Intel's chips will go 45nm in 2007, but that number should double by around Q2 2008, and it seems Intel needed to accelerate things to head off competition from AMD's upcoming Phenom processors. Prices and other precise launch dates are still a mystery at this point. [Via Silicon Investor]

Read | Permalink | Email this | Comments

Read More...

Meizu M8 gets unwelcome price hike, dodgy release details

Filed under: , ,

Sure hope you weren't counting on getting your palms around Meizu's oh-so-familiar M8 anytime soon, as it now looks like the handset may not even be available to purchase until mid-next year. Granted, the 667MHz CPU, 128MB of RAM, GSM connectivity, 3.4-inch VGA touchscreen, video output, and built-in Bluetooth 2.0 / WiFi sure are appealing, but those still willing to wait this one out will apparently be paying even more than previously expected. The latest on the street pegs the forthcoming 8GB iteration at around $400, but if money ain't a thang, you may as well continue on pinching those pennies for the 16GB (and potentially 3G-enabled) flavor. [Via MeizuMe]

Read More...

BUSINESSWEEK: Identity Theft: The 'Business Bust-Out'

Policy July 23, 2007, 11:24AM EST

The "bust-out" is just one of the schemes fraudsters use to steal your business identity, a crime that has gone largely unnoticed in a legal system focused on consumer ID theft

A criminal rents space in the same building as your company. Then he applies for corporate credit cards using your firm's name. The application passes a credit check because the company name and address match, but the cards are delivered to the criminal's mailbox. He sells them on the street and vanishes before you discover your firm's credit is wrecked.

The so-called "business bust-out" scam is one way sophisticated criminals steal business identities across the country (see BusinessWeek.com, 4/17/06, "Would I Lie to You? Five Cons Still Kicking"). Identity thieves increasingly target businesses instead of individuals, experts and law enforcement officials say, but federal law and many state statutes don't consider business identity theft a crime. That's because the raft of identity theft laws passed in the last decade apply mostly to individual consumers—not business entities.

A Gap in Statutes

While business identity theft can often be prosecuted under other statutes, like mail fraud or wire fraud, businesses victimized lose many of the protections afforded to consumers under identity theft laws, like access to information about their credit. Before California last year amended its 1997 identity theft law explicitly to include crimes targeting business entities, a business whose identity had been co-opted could not even get a police report. "We were having businesses being taken over and their names being used and I could not prosecute them, at least under ID theft statutes," California Deputy Attorney General Robert Morgester says.

It's difficult to say how many businesses have been victims of identity theft because most of the research focuses on complaints by consumers. Some studies say there were as many as 8.9 million individual victims nationwide last year, and estimated annual losses approach $50 billion. But the most sophisticated identity thieves increasingly are targeting businesses because the payoffs are bigger, Morgester says. Business accounts generally have higher credit limits and make larger purchases than consumers, so hefty charges by scammers are less likely to raise red flags. While most consumer frauds won't net a criminal more than $5,000, targeting a business can bring in 10 times that or more, he says—so "From a criminal's viewpoint, it's far more cost-effective to target a business rather than a consumer."

In a July 19 proposal, the Justice Dept. asked Congress explicitly to include businesses and organizations in the federal identity theft statute. "This is a real gap," says Betsy Broader, assistant director of the Federal Trade Commission's identity theft division. "The current federal law looks at ID theft as a crime against individuals."

Small Businesses at Risk

Small businesses in particular make ripe targets because they may be less savvy about protecting sensitive information than big companies that can afford to hire dedicated privacy officers. Often, small-business owners are just too busy to worry about identity theft—until it happens to their firm. "The worst thing a small business can do is think of themselves as a small business," says Linda Foley, co-founder of the nonprofit Identity Theft Resource Center. "You have to be a small business with a Big Business mentality."

Foley says business owners can protect themselves by keeping sensitive files under lock and key (electronic or otherwise), by restricting access only to employees who need it, and by closely watching their books. But sometimes there is little a business can do to keep from becoming a victim, as in the "business bust-out" scheme described above.

The new laws in California and the proposed federal change may give law enforcement the tools it needs to go after business identity theft. But because perpetrators can be elusive and investigators have limited resources, often the crime isn't prosecuted at all. According to a 2002 study by the Government Accountability Office, local prosecutors reported only being able to pursue a "small fraction" of reported identity thefts. Morgester says some detectives have 50 identity theft cases on their desk at once, and they must focus on the handful where they think they can make an arrest and get a conviction. If the loss is relatively small—under $10,000, he suggests—police may be reluctant to take it on. At the federal level, some U.S. attorneys have thresholds of $1 million.

Victims Must Investigate

But the best solution for businesses that have been victims of identity theft can be to do the legwork of an investigation themselves, says Morgester. Often business owners must do so anyway to recover their credit and reputation. If victims follow the paper trail and bring investigators a lead, police and prosecutors will be more willing to pursue it, he says.

"There's a lot of cases where the corporation or an individual by themselves can put together 90% of the evidence," Morgester says. "We've had a number of cases where, based on the material we had brought to us by the victims, the only last step we had to do was write a search warrant and kick down a door."

John Tozzi is an intern for BusinessWeek.com.

Read More...

Thursday, August 02, 2007

LG Philips develops oil and water based flexible display

LG Philips, known for its nearly constant pursuit of new flexible display solutions, has recently applied for a patent on a bendable OLED screen technology which would use oil and water to produce images. Apparently, current flexible OLED displays are hampered by the fact that the OLEDs get hotter than the plastic substrate, making manufacture difficult and expensive. The new process that the company is developing would circumvent those problems by making pixels out of oil and water connected to plastic electrodes. The opaque oil would float on the water and obscure a colored surface beneath -- when an electric charge was applied to the field it would reveal the surface and change the color of the pixel. The process is cheap and simple, which hopefully means a future of reading a completely digital morning paper for all of us. [Via NewScientist, thanks Alan]

Read More...

Man-made 'tethered tornadoes' touted as a viable power source

Filed under:

With all the wacky unconventional proposals we've seen people come up with for generating electricity in an environmentally friendly manner, is it really so outrageous to think that giant, man-made tornadoes could be harnessed to power a small city? Well that's exactly the idea being floated around the University of Western Ontario these days, which is currently testing a scale model of retired refinery engineer Louis Michaud's patented vortex engine -- a machine fueled by excess power plant heat that uses the physics of convection inherent in rising air to drive electricity-producing turbines. In its most grandiose realization, the engine (inventor's rendition pictured above) would be 200 meters in diameter and generate a 'clean' (debris-free) tornado stretching 20 kilometers into the sky able to coax 20 megawatts each out of ten independent turbines. Obviously the main concern about the anticipated $60 million project -- which would reportedly operate at just a quarter of the cost of a coal-based facility, even before taking into account the $20 million saved on a cooling tower by the participating power plant -- is that the tornado could somehow escape its confines and wreak havoc on nearby communities. Still, with all the advantages this scheme seems to offer, we're certainly willing to give it a chance -- after all, a 'malfunctioning vortex engine' is a lot less scary than a potential disaster at one of the many nuke plants dotting our landscape. [Via UberReview]

Read More...

Judges fighting litigation with Supreme Court's "obvious" patent ruling

Filed under:

You might recall that the Supreme Court recently handed down a decision which loosened the definition of "obvious" as applied to patent interpretation, saying that if a person of ordinary skill could "fit the teaching of multiple patents together like pieces of a puzzle," the patent is obvious and unenforceable. That decision, which has been called the most important patent ruling in decades, is starting to affect several longstanding patent disputes, most notably a case brought against Real Networks in 2003 by a company called Friskit. In the first instance of a judge applying the new rule, Friskit's patents have been deemed unenforceable as obvious, a change from an earlier ruling allowing the case to go forward. Friskit is of course considering an appeal, but we wouldn't be surprised to see a lot more of these suits decided early on the basis of obviousness. [Via TechDirt]

Read More...

A Wall Projector for your iPod, Mobile phone or Digital Cameras

oio explay mobile projector [Picture of a couple watching video clips from their mobile phone projected on the wall]

explay oio wall projectorImagine projecting pictures or video clips from your iPod or mobile phone on to the nearest wall. Or playing the PowerPoint presentation directly from your smartphone or PDA on the wall of the conference room without the bulky projector.

Explay, a company based in Israel, has developed a battery-operated projector called "oio" that looks like a USB thumb drive and can be used to display content from any mobile device including cell phones, digital camera, media player, video camcorders, etc.

Oio mobile projector is no vaporware, the device was recently demonstrated at a conference in California and Explay plans a commercial launch in 2008. No word on pricing yet.

So you are not limited to viewing those high resolution pictures on the tiny LCD screen of the mobile device, Oio will help you watch content on any surface like a wall, coffee table or even your bed.

Explay Oio | Product Brochure (PDF) Thanks Ilya.

Read More...

Prevent Visitors from Downloading Images from Your Website

Technically it is impossible to protect web pictures from leeching since most browsers will first download a copy of the entire image from the internet to the local cache before rendering.

Some webmasters try to disable right click on their webpages so that visitors cannot access the "Save Image As.." command in the menu but that trick can be easily defeated by disabling Javascript or using Firefox. Image Maps are another option but the sliced images can be saved as a whole using any screen capture program.

So what's a good alternative if you are very eager to protect you images on the internet ? One option is is convert your images to SWF Flash objects before uploading them to the web but if that sounds too impractical, try swfIR (SWF Image Replacement tool).

prevent download pictures

swfIR is a very simple technique to prevent image download from your website - instead of adding the standard tag for embedding pictures, you define the image location in Javascript and the image will then wrap inside a Flash movie on your webpage.

What's so nice about swfIR is that it lets apply nice visual effects to your images including borders, rounded corners, small rotations and shadows without actually modifying the original image.

Tech savvy users can easily download the image by looking at the HTML source code of your web page but for the not-so-geeky crowd and image leech software, all they'll see is a blank Flash movie.

www.swfir.com | swfIR Examples

Read More...

Casio Adds A 5.1 MP Cameraphone To Its Exilim Line

While Casio's Exilim line has become synonymous for quality cameras, they took a different route this time and hit us with the W53CA Cameraphone. The device features a 5.1 Megapixel camera with 9 point auto focus, image stabilization and a clamshell swivel screen. To top it off, Casio added MicroSD, MP3 support, and one hell of a sleek design. Unfortunately, it's a Korea exclusive.

Read More...

$1150, Quad-Driver, Ultimate Ears UE-11 Pro Headphones

ue-11-pro.jpg Ultimate Ears makes some of the best earphones I've ever heard, with the high end UE line made of custom molded pieces with multiple drivers inside. The UE-11 Pro raises the bar to having 4 in each ear, broken down into dual subs, a mid and tweeter. Audio sensitivity is 110dB at 1mW, which is very efficient. Available in a variety of colors and designs (including monograms) for $1150. I believe that's in a custom metal case. [iLounge]

Read More...

Three Concept Video Projectors for Gaming More than All White

08.07_userdesigned_07.jpg These three objects are all video projectors that go by the name of Trisha, Dane and Trey. They are the fruits of a collaboration between Texas Instruments, Ignition, DLP and a trio of students on a Masters program in video game development at Southern Methodist University.

Read More...