Monthly Archives: February 2015

Side note # 1

(c) Terry Floyd Johnson, 2015

Vietnam, the Viet Cong, were top guerrilla fighters, so when the US needed a sniper, they called in David Corso, and we were his outryders, making sure Viet Cong snipers didn’t kill him.

Our success rate was phenomenal, because we used technology I created, 1. I created a technology called Chameleon- what it did is allowed the wearer to become another person, thus we confused the enemy, by them not knowing who the real David Corso was.

David Corso is and was an excellent sniper and soldier, he did do many sniper kills, but he did more than one man could; no one could figure how he did the many kills he did.

It’s quite simple, he didn’t; we had four outriders with him, at all times, but at certain times, one of two of us would go on a different hunt, and do a Maximum Kill, and it would be recorded as a David Corso kill.

The Chameleon technology worked wonderfully; David got all the glory, and we accomplished our kills, which added to his reputation, as the best sniper in Vietnam, which he was, independent of our kills.

David Corso is a true American Hero, and he deserves. the accolade he was and is given.

We, as outryders, were simply doing our jobs, and helping in the war effort, and leaving all the credit to David Corso.

Our kill rate was rather spectacular; and our…..nothing, we did everything on our own, as scouts and licensed to kill, the enemy, by any way we saw fit. We did our job.

Most of our kills were military targets, though, some politicians and top management of the Cong, were taken out, but only, if they were truly, dangerous to American troops.

I didn’t mention one other technology I created, for my mates, the other 3 outryders, invisibility, no one could see us; they were like sitting ducks, though we began to turn off the invisibility technology, to give them a chance, and we would take them out one to one.

We would then leave, as the Cong, we’re raising alarms, at our presence, we usually did a fire destruction, to hide our getaway.

We were the best team in Vietnam, at killing our Targets, and most time we were David Corso, protectors; we were so good at it, that snipers would let us pass, for they knew if they showed themselves they would die.

Those who did, instantly died, for we had other technology that let us know the presence of any warm blooded being/person in our area, and it had length and height, that could allow us to know where any sniper was.

This technology let us know where tunnels were, and if, there was Cong inside them, moving or resting, we would then, find an opening and drop grenades, to shock them, then would call a Stomper, which we carried on our person, which stomped on the ground over the tunnel, causing the ceiling to fall in on the Cong.

We began to call ourselves Ranger Scouts, and we didn’t like hanging with the regular Joes, and kept to ourselves, but we were always on call, to protect the Joes, against hidden attacks in our area of coverage.

We did so well, the American Command, we’re afraid we would go rogue, and so they issued orders, for Joes to kill us.

We knew this, from listening to Joes, when they didn’t know we were around. We went to the HQ of the American Joes, and slipped in, and got the drop on the general and his staff. We told him, to drop the orders, and this proved we were no harm to Joes, but deadly to Cong.

The general issued the orders, but we didn’t go into camps, after that, but we did our jobs, kills and outryders, for David Corso, who knew we were there, but hardly ever saw us.

We were there, when the helicopter came in and the kids got off, we put on psi protectors to save us from the kill mental beam, but we covered the kids, while they held hands and built their kill beam. We then went to ground and covered ourselves with leaves, and the mental kill beam, passed over us, only seeing vegetation on the floor of the jungle.

We followed David Corso, and his men, until they reached safety, then showed ourselves briefly, waves, and we were gone.

The Ranger Scouts would have been building a reputation, but we put everything on our party leader, David Corso, for these were his adventures, or war journeys. We were there to protect him, and his orders; we made sure, he always came back.

The Cong feared him, knowing that one American Sniper, was deadlier than the rest, and they, went out of their way to try to find and kill him, but when you have five David Corso, it’s difficult to know, which is the real one, and by then, you were dead, as the Ranger Scouts, knew your positions, and took you out.

David Corso is a real American Hero, and he needs to be recognize as such, for his valor, and his work saved many American Joes.

He now, or at least he did, have his own radio show, Wolf Spirit Radio, where he brings special guests on to introduce them to his audiences.

David Corso, American Hero!

May the Microcosmic Force be with David Corso, always!

Memory 2- Feb, 25, 2015

(c) Terry Floyd Johnson, 2015

Today, I was watching you tube, when I started having memories, to start shifting, from Vietnam, to planetary warrior.

I felt myself, back in Nam, and not being around any soldiers, etc., or outfits, etc., but doing my work and spending my nights in relative comfort, with a linear dimension home.

During the day I would go out and do my assignments, then would go somewhere nice, and flip out the Linear Home Pack, and I would have a total home, when I stepped into it, it created a pocket dimension, so anyone or anything could walk through that location, and would never know I was there.

Over the top of this movement, I had memories of my time as a planetary warrior, where I would topple governments; at first, I did it for ETs, but that got old quickly, I turned the tables on them, and started doing it for myself.

I had other technology to help me then, most of which I created, and was such, that the ET and the planetary populations, couldn’t find me, no matter how hard they tried.

I would go out and do what I had to do, to sew distrust in the present governments, and they would take over countries, until I had the whole planet under my thumb. I would then choose the ones who would run the world government, for me, and the Presidents of each country, would work for the Fields Prime Minister.

The Presidents would rule over their countries, in harmony with the Fields Prime Minister, and his or her staffs, councils, etc. The President had the same set up.

I would then go to another planet, and start the whole process again. I wouldn’t start co-operating as a guerrilla warrior, until the government did something I didn’t like, then I would start a campaign against them.

I got so good at this, that I could cause a planet to fall, and not even be there; next I could do whole solar systems; next, I started doing regions of solar systems, finally, I started to do whole Galaxies, that’s when I quit. It wasn’t fun anymore.

All were set up with Field Prime Ministers, Presidents, and then below them, Toggers, which were local officials, working directly under the President and the Prime Minister.

I had plenty of technology to help me in my wars with planets, solar systems and Galaxies. I was and am known as the red/white Teacher, or what earthlings call Santa Claus.

Obviously, not the same, as the Santa Claus on Earth, but as a benefactor of all the galaxies I controlled.

My finances, grew and grew, now, I am the richest single person in the Universes, having spread my control out to ten galaxies, strategically placed in the Universe, to be a doorway, to adding more galaxies, if necessary.

At this time, I took on a persona, which was wild, I became a singer/musician, and traveled the Universes, and made zillions of dollars, doing this, by concerts, e-comps, which could play my music, and sell knew songs, as they came out.

I made zillions of dollars, in this endeavor, as well, but then I got bored with it, though, I did and still do keep my musical hand in creating new songs, and placing them in trading posts, and over the net, so they could be traded, or bought.

To those who think I may be soft now, not a planetary warrior, at all, don’t make the mistake of coming against me, for you will fail, and I will take over your planet, or planets, and all the solar, star systems you have under your control.

This makes the Traders, extremely nervous;  they’re afraid, if they do something wrong, in my galaxies, they’ll have to answer to me. They’re right! No, thievery is allowed, but business can thrive, if they follow the rules, Protect the Planet, at all cost, and only do that which will grow the planet’s beauty, thus increase tourist trades.

Entertainment is always a good field to go into, to work in, to try to work you way into, but the entertainment field is overseen by the Elvan, not police, but more humanistic than that, they’re Stoppers; they make sure not cheating of any kind, goes on in my galaxies.

Technology is another field I got into, and architecture, for I am the Cosmic Engineer, and Traders, Lords, Adventurers, etc., pay me to build what they need, when they’re out doing their work, no matter, where it takes them.

The business of technology, and architecture, is extremely profitable on Earth, and other planets, wishing to have a Cosmic presence, for I find planets, and then make contracts with countries, to mine, to farm, etc., these planets in areas of plenty, always with the understanding they do nothing to harm the environment.

They complained about they couldn’t do that and do their business; I showed them how, and it cost them a pretty penny, but they would get thousands of times more profit, than it cost them.

Every country on Earth, now owes me 600 Trillion dollars, for- 1. space travel- getting them to the planet, they have contracted with, 2. bio-habitats, and work-habitats building, 3. oxygenation- of areas where they’re at, yet not influence the environment in any way, 4. new ways of gathering gold, gems, and other natural resources, never more than the planet, the environment can handle, then they were through; we had to, and have to, make new contracts, for the next planet, they’re going to be allowed to use, to get natural resources, etc.

Shadow controls all of this, and its an organization, business I put together, to watch over the contracts, be the bank, where they borrowed the money to do their planetary operations, have a security and help force, watching over all, and a technology operation, that made what they needed to do what they were there for, and still, not harm the environment.

Shadow operates Casmere, which is the banking, etc., organization of the Earth, and it is the oversight of humans handling the planet’s environment, which they have failed miserably, soon the humans will have to go, and then the terra farming of the New Earth, can begin.

Cheers! Chow!


Mark Cuban on net neutrality: FCC can’t protect competition


As someone who takes her cues on net neutrality from Gigaom’s resident expert Stacey Higginbotham or, failing that, John Oliver, this is hard to admit: Mark Cuban may have a point on why the proposed net neutrality regulations may be a cure that’s worse than the disease.

If adopted, he maintained, these regs will open the door to more confusion, more litigation and more overall turmoil, none of which will serve consumers well. Before you throw your device at the wall, just give him a listen. Cuban, the serial entrepreneur who started out as a VAR before founding which sold to [company]Yahoo[/company] in a $5.7 billion stock deal in 1999. He is now owner of the Dallas Mavericks, co-star of Shark Tank and CEO of of AXS TV  and interestingly a star of new AT&T commercials. The hyphens just keep coming.

Here’s his gist on net neutrality. He doesn’t think the big…

View original post 662 more words

The FCC’s other big vote: small cities await their broadband fate


The big battle over net neutrality will go to a vote on Thursday but, for many people in small cities, it’s the other item on the agenda that matters most: whether the agency will allow two towns to build their own broadband infrastructure.

“It’s a way of letting local communities control their own fate. I don’t see a difference between broadband and gas or electricity,” said Harold DePriest, who is the CEO of EBP, a city-run fiber network in Chattanooga, Tennessee.

His city, along with Wilson, North Carolina (population 49,000), will soon find out if the FCC will grant their request to pre-empt state laws that restrict municipalities’ ability to offer broadband.

Those state laws are necessary, according to their supporters, to protect taxpayers from profligate city governments. Critics claim, however, that the laws are the result of undue influence exercised in state capitals by big telecom companies seeking to preserve their monopolies.

For places like Chattanooga, a lot rides on the outcome. The town’s fiber…

View original post 215 more words

Editorial: Blueprint – Japan’s approach to Emotional Engineering


Kansei Kougaku (感性工学) – a design methodology that serves to elucidate the user’s emotional response into the realm, or sphere so to speak, of a product or commodity.  Founded by Hiroshima University Professor Mitsuo Nagamachi, the concept of Kansai Engineering, at surface level, allows us to link an individual’s physical and psychological reaction to the properties and essence of a product.  This theory has not only become a well-studied notion that can be applied to an almost endless amount of applications, but has also given us, as inherently unique individuals, an opportunity to view nearly everything man-made with a sincere empathy – whether we are conscious of it or not.

If we take this idea at its outermost tier, it’s easy to apply to something like that of the interior of a car; the user is isolated, it’s a very ergonomically focused environment, it’s generally a space the user can…

View original post 488 more words

Spyware firm Gamma failed on human rights, says OECD


The Organisation for Economic Co-operation and Development has for the first time found a surveillance software company to be in violation of human rights guidelines, following a complaint about the notorious British-German spyware outfit Gamma International.

Gamma allegedly sold its FinFisher spyware tool to the Bahraini regime, which is a big-time human rights abuser that seems to have used the software to persecute activists. The complaint to the OECD’s U.K. national contact point (NCP – an agency operated by the British government) was made by the right group Privacy International, which has also made a criminal complaint about Gamma, along with Reporters Without Borders and other groups.

However, the OECD’s guidelines for businesses are voluntary, so apart from calling out the fairly shameless Gamma, not much can come directly from this particular decision. In addition, the Gamma Group is these days operating out of Munich rather than the U.K.


View original post 338 more words

CIA’s secret Amazon cloud ready to roll


The Amazon Web Services-based cloud for the CIA is near completion, according to the CIA’s chief information officer (CIO).

On Wednesday, Doug Wolfe told an industry gathering that the agency’s long-awaited AWS cloud has hit “final operational capability”  after 18 months of work, EnterpriseTech reported.

[company]Amazon[/company] famously prevailed with its  bid for this CIA cloud contract in late 2012 when it beat out [company]IBM[/company] even though it bid a higher dollar amount.  This $600 million deal was huge for AWS, which wants to show security- and compliance-conscious industries that its public cloud infrastructure can meet their special needs.

Since 2011, Amazon had already fielded GovCloud, a separate cloud region that meets special criteria so it can be used by government agencies. The CIA has additional requirements above and beyond that.

Wolfe also said the new cloud would be rolled out across 17 different intelligence agencies (news to me), and that the agency…

View original post 17 more words

Energy harvesting EnOcean Alliance joins All Seen Alliance


The All Seen Alliance has scored an interesting new member with the EnOcean Alliance, a group of 300 companies dedicated to sustainable building controls and automation using wireless energy harvesting sensors and technology. The EnOcean Alliance joined AllSeen Alliance Thursday and will demonstrate how the two organization can use their two technologies together at the Mobile World Congress event in Barcelona next week.

The EnOcean Alliance is a group that promotes EnOcean technology specifically. EnOcean manufactures and markets energy harvesting wireless modules that are interesting for the internet of things because they do away with the need for batteries or wiring. Instead they use solar, temperature changes, kinetic energy or other techniques to power sensors and then the transmission of state around a network. The technology is used in devices sold around the world, which means that these devices might soon get All Joyn compatibility as well.

All Joyn is…

View original post 127 more words

FCC votes yes on net neutrality in partisan spectacle


It took four million public comments and a pitched political fight invoking everything from civil rights to Presidential power, but the FCC has finally passed new rules on net neutrality.

On Thursday, the FCC voted to reclassify broadband internet providers as “common carriers,” as part of a new order that will forbid ISPs from slowing down or speeding up web traffic, or cutting any deals with websites to offer them special service.

The outcome of the vote, which took place along 3-2 partisan lines, was widely expected, but the process served to provide additional details about how exactly the new internet rules will apply.

While the specific text of the regulations will not be posted for a week or two, and the FCC issued only a short summary, officials’ comments suggested that the FCC will carry out one reclassification rather than two.

Earlier reports had suggested that the agency was considering conducting a separate legal process for…

View original post 586 more words

In the age of niche media, everyone still really wants to be mass


One of the best things about the web is that it has meant an explosion of choices when it comes to media, especially recently — with the rise of BuzzFeed, the launch of sites like Vox and Fusion, and blog networks like Gawker. And of course we still have all the old places too, like the New York Times and Washington Post and The Atlantic. If anything, we have too many places publishing great content for anyone to keep up.

And that brings up a related problem, which Purdue University doctoral student Frederik De Boer wrote about in a recent blog post. In a nutshell, De Boer said that his problem with many of the new-media sites that have popped up over the past year, such as Fusion — which was launched recently by the Fusion network, a cable channel co-owned by Disney/ABC and Univision that caters to…

View original post 837 more words

How to design security into your connected product


We often talk about designing security into a product from the get go, but we don’t often discuss what that means. In today’s podcast John Kestner, a principle with Supermechanical, the company behind the Twine sensor and the Range thermometer, shares his thoughts on how he designed Twine and range to be more secure but also how we might design our devices to indicate that what was once a humble lock is now a connected computer with all the pros and cons that entails.

Before Kestner and I dig into security, Kevin Tofel and I talk about my experience playing with the Logitech Harmony Ultimate Remote and home hub and then we dig into CSRMesh and the Bluetooth SIG’s creation of a working group to add mesh networking to the Bluetooth Smart standard. That could put Bluetooth in closer competition with thread, Zigbee and Z-wave. So kick back and…

View original post 215 more words

Medium gets a bit more Twitter-like, and a bit more blog-like


One of the interesting things about Medium — the combination platform and publishing company that former Twitter CEO Evan Williams launched in 2012 — has been watching it evolve in real time, as it tries out new features and changes existing ones. In its latest evolution, Medium has added several new tools that feel very similar to the two things Williams is best known for: namely, Twitter and Blogger.

When it first emerged, and for most of the time since then, Medium has been seen as primarily a place for long-form posts or articles, in part because the site has a clean and flowing design that encourages large images. Most of the content that the site itself commissioned and paid for has also tended to be long-form, and Williams has often talked about his vision for the site as being similar to a magazine.

Short and long

On Tuesday, however,

View original post 650 more words

Law firms will start sharing security data to prevent attacks


It’s clear that big banks provide a lot of incentive for hackers to launch cyber attacks, given the amount of sensitive data they hold and the cash they oversee. But banks aren’t the only entities hackers are targeting. The law firms that represent financial institutions are also subject to attacks, and as a result a group of law firms is banding together to share security data in order to prevent attacks, according to a New York Times report.

The data held by law firms is a treasure trove for hackers because it includes some of the most secretive aspects of companies, including their business operations, deal making and legal disputes. However, the general public may not be aware of law firm hacks because the firms are private entities and don’t have to abide by the same set of rules as public companies, especially when it comes to disclosing their…

View original post 340 more words

Quantifying the value of DevOps according to Fortune 100 companies


Some hail it as a trendy buzzword, some think it’s the future of IT. Whatever your stance on the term “DevOps”, you can’t argue the fundamental theory behind the phrase won’t benefit IT organizations — increasing the collaboration and feedback between Dev and Ops.

However, we were interested in just how much is DevOps growing, especially among the largest enterprise IT organizations. Also, we wanted to put real hard numbers behind the benefits of DevOps and IT performance, how much does downtime hurt the best of the best, the Fortune 1000 companies. In conjunction with a renown third-party research firm, we set out to survey employees strictly from Fortune 1000 companies.

Read the full report here, DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified

Though some takeaways from the survey were unsurprising — DevOps is growing, duh — the actual costs of specific application or infrastructure…

View original post 106 more words

How your iPhone can help keep your financial world in check


Unfortunately, identity theft is often treated more like a natural disaster that cannot be prevented, than it is as a criminal act perpetrated by an individual; it is all about preparing for the inevitable and the cleanup that takes place after it happens. The villain is often times identified as the organization that allowed such an event to happen, sort of like blaming the weatherman for bad weather. As such, organizations are required to equip you with the tools necessary to clean up and defend your identity rather than help you find the individual that is attacking you.

But when you get right down to it, you are the only one that can protect your own information. And simply balancing your checkbook once a month is not enough to ensure that your financial identity is secure. It all begins with understanding how consumer reporting agencies financial institutions and creditors see…

View original post 1,014 more words

NSA-linked Sqrrl eyes cyber security and lands $7M in funding


Sqrrl, the big data startup whose founders used to work for the NSA, plans to announce Thursday that it is shifting its focus to cyber security with a new release of its enterprise service. The startup is also taking in a $7 million Series B investment round, bringing its total funding to $14.2 million, said Ely Kahn, a Sqrrl co-founder and vice president of business development.

The heart of Sqrrl’s technology is the NSA-developed and open-sourced Apache Accumulo NoSQL database, which the company, like other open-source-reliant companies such as Docker or Hortonworks, sells premium services around.

While the Accumulo technology, based on Hadoop, provided a way for companies to store and analyze all their data similar to how they could with other big data vendors like Splunk, Kahn said his team found that their biggest customers were using the technology for cybersecurity purposes. Just a hunch, but I…

View original post 367 more words

Life Science Startups Rising in the UK

Steve Blank

Stephen Chambers spent 22 years in some of the most innovative companies in life science as the director of gene expression and then as a co-founder of his own company. Today he runs SynbiCITE, the UK’s synthetic biology consortium of 56 industrial partners and 19 Academic institutions located at Imperial College in London.

Stephen and SynbiCITE, just launched the world’s first Lean LaunchPad for Synthetic Biology program. Here’s his story.


Why did you come back?
This is the question I most often hear, having now returned to the UK after leaving 24 years ago to work in the US. The answer is simple. The reason I came back is the same reason I left – to be where life science startups are happening.abbey road

Hard to imagine now, but in the late ’80s the life sciences startup landscape in the UK was almost non-existent. One or two companies…

View original post 882 more words

Lenovo in hot water over Superfish adware, but dismisses security worries (updated)


Reports from security consultants, media, and Lenovo users indicate that there’s bloatware pre-installed on recent Lenovo Windows PCs that’s a bit more sinister than a set of superfluous ThinkPad tools. It appears that adware called Superfish had been running on consumer laptops sold by Lenovo between September 2014 and this past January, raising significant security concerns.

In a statement issued on Thursday, Lenovo said although it had disabled Superfish “server side interactions” since January, it could “not find any evidence to substantiate security concerns.” It also promised not to pre-load Superfish in the future, while clarifying that Superfish requires users to approve its terms of use, and that it hasn’t been installed on devices since “December.”

Update: Sometime today, Lenovo changed its statement and quietly removed the line “We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns.” The statement was most likely tweaked because there is…

View original post 314 more words

Don’t let AT&T mislead you about its $29 “privacy fee”


This week AT&T got a lot of media attention for its expansion of its GigaPower service to Kansas City announced on Monday. The news wasn’t so much about the expansion, but about the ISP’s plans to to offer a $29 per month discount for customers who let Ma Bell scan their web searches in exchange for targeted advertising. The pricing isn’t new, but Ars Technica noted it as did the Wall Street Journal, and even our own Jeff Roberts wrote a post explaining that he thought it was a good idea that the company was putting an explicit price on privacy.

But $29 isn’t actually the price that AT&T charges per month for privacy. As I discussed back in May last year after I tried to sign up for AT&T’s GigaPower service to find out more about the pricing and the disclosures associated with the plan…

View original post 706 more words

The internet of things goes extraterrestrial


As the internet of things grows to encompass many more “things,” so are the number of wireless ways to connect them. Wi-Fi, ZigBee, Z-Wave, Bluetooth Low Energy and cellular are being embedded in every manner of gadget from thermostats to cars, but industrial IOT specialist Sigfox is suggesting one more type of connection: satellites.

Sigfox is partnering with aerospace company Airbus Defense and Space, French research institute CEA-Leti and engineering firm Sysmeca on project called Mustang that aims to build a hybrid terrestrial/satellite that can be used to connect the internet of things. Sigfox is already developing low-power, low bandwidth wireless networks in several countries designed to connect sensors, industrial appliances and other gadgets to the internet. Its work with Mustang could expand the scope of that network to the entirety of globe. Devices connect to a Sigfox terrestrial transmitter where available, but beam their information up to…

View original post 201 more words

NSA, GCHQ reportedly stole mobile network encryption keys


Private information protected by the little SIM card in your handset might not be so private after all. Based on new documentation from former NSA-employee-turned-whistleblower, Edward Snowden, The Intercept is reporting on a state-sponsored theft of encryption keys from Gemalto; a company that makes 2 billion SIM cards annually.

encryption theft

According to The Intercept’s report, the U.K.’s GCHQ, working with the U.S. National Security Administration, was behind the hack on Gemalto, providing government agencies with the information by infiltrating the company.

What exactly does that mean to individuals and their privacy? Quite a bit, The Intercept said:

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence…

View original post 378 more words

Facebook launches collaborative threat-detection framework


It might be a bit more difficult for hackers to launch coordinated attacks against several different companies at the same time thanks to a new collaborative threat-detection framework by Facebook called ThreatExchange.

The new security framework, which Facebook plans to announce on Wednesday, works like an online hub where multiple organizations can sign up and deposit data pertaining to the types of hacks and malicious activities they may have experienced. This type of data includes malicious URLs, bad domains, malware and any sort of analytical data a company might have that’s related to that malware, explained Mark Hammell, [company]Facebook[/company]’s manager of threat infrastructure and the author of the blog post detailing the framework.

Once all that information is dumped in, Facebook’s graph-database technology can correlate all the data points together and figure out new relationships, such as which malware seems to be talking to a particular domain or if a…

View original post 447 more words

Court backs NSA on internet spying as Obama ducks call for reform


It’s been a lousy week so far for opponents of U.S. spy tactics: a federal judge shut down a long-running challenge to the NSA’s mass collection of customer internet data, while President Obama brushed off a call to do something about the sprawl of government surveillance.

The court case in question, Jewel v. NSA, involves a romance writer in California who argued that AT&T should have obtained a warrant before using a secret room to forward the internet traffic of its customers to intelligence agencies. The case, filed in 2008, was one of the first to challenge the U.S. collection of metadata, and shed light on the close collaboration between telco companies and the government — a collaboration that has gained considerably more attention in the wake of the Edward Snowden leaks.

But on Tuesday, U.S. District Judge Jeffrey White ruled that Carolyn Jewel and other plaintiffs had failed to show they had the requisite legal…

View original post 236 more words

“YODA law” would ensure devices can be resold free of copyright


Cue the “pass this law, we must” jokes. On Wednesday, lawmakers reintroduced the “You Own Devices Act” (YODA) to make sure that manufacturers can’t use copyright mind tricks to prevent consumers from selling or giving away the connected devices they own.

The need for YODA comes about because of the fact that we typically don’t own software. Instead, we simply license it pursuant to terms handed down by a company via the internet — that’s why many people are surprised to learn they don’t actually own the iTunes songs or Kindle books they buy, but are instead using them at the pleasure of Apple and Amazon.

While this licensing quirk often doesn’t matter for practical purposes, it does when you die and can’t pass on your books or music collection.

But more importantly, the potential scope for companies to make mischief is getting much bigger as many more devices come with software inside: cars, coffee makers…

View original post 216 more words

Another startup steps up to build the hyperloop


Hyperloop Technologies, a startup formed by SpaceX alumni and well-known Silicon Valley executives, came out of stealth with $8.5 million on Wednesday to make the hyperloop reality, according to a report in Forbes.

The hyperloop, a transportation system that would send capsules large enough to contain people or goods through tubes at 760 miles per hour, originated with a paper published by SpaceX CEO Elon Musk and his team in 2013, but Musk said at the time that he didn’t have the time to pursue building it. He announced plans to build a test track last month.

That paper contained enough details for others to go after their own plans, and Hyperloop Technologies is the first to come up with actual money. On top of that $8.5 million, it plans to raise an $80 million funding round before the year is up, according to Forbes. Its team is led by former…

View original post 107 more words

With Niche purchase, Twitter finally understands its influencers’ power


Twitter has just acquired Niche, which it describes as a “service provider” for the growing “creative community” on Vine and Twitter. The company didn’t disclose the terms of the deal but Re/Code and Business Insider report it was likely between $30 million and $50 million.

Niche has built strong connections with the homegrown celebrities on Vine (and Instagram) by matching them with brands that want them to advertise their products. There’s other social media companies that do the same, profiting off networks of influencers on Instagram, Snapchat, Pinterest, Vine, Twitter, and Facebook.

For a long time Twitter was out of this loop of moneymaking. It’s a smart move for Twitter to buy Niche because in addition to generating revenue through the star-brand deals, the company also gets plugged into its own community of influencers.

As I wrote about in November, until recently Twitter largely ignored its Vine stars. Its competitors, like Facebook and Instagram, started…

View original post 38 more words

Dr. Rauni-Leena Luukanen-Kilde dead, probably murdered

FEBRUARY 9, 2015

2015-02-09 11:22

Yesterday medical Dr. Rauni-Leena Luukanen-Kilde died in her homeland Finland by severe cancer all over her body, her Finnish cousin told White TV today. White TVs Dr. Henning Witte talked to Rauni about ten days ago on telephone in Finland, not knowing it was the last time. She complained about that she suddenly got cancer as a result ofbeaming technology, mind control scalar waves. Her complications got so severe that she was forced to leave her home in Norway to a hospital in Finland, where her caring cousin is living. She complained over the Norwegian hospital, which wanted to give her morphine against her will. She was allergic against morphine. During the last week it was not possible to talk to Rauni any longer and the doctors indicated death.

Dr. Rauni-Leena Luukanen-Kilde was very well-known all over the…

View original post 674 more words

New Facebook tool masks tech industry’s digital death fight


Facebook wants to cheat death. Or at least the laws governing death. That’s how a cynic might see a new feature that lets users hand over part of their profile when they pass away.

The feature is called “Legacy Contact” and for the first time allows users to designate someone who can do things like update their cover photo and manage friend requests in the event of their death. This is a change from existing rules, which only allow loved ones to delete a user’s account or freeze it as a memorial.

Suzanne Walsh, an estate lawyer with the firm Murtha Cullina, said in a phone interview that she is “thrilled” by the move. But she also sees it is an attempt by Facebook to forestall the “Digital Assets Act,” a model law intended to help executors obtain assets — contracts, passwords, digital currency and so on — that may only exist in a deceased person’s online accounts.

View original post 683 more words