It's always fun to see people try to map out the internet. The comparison to a spider's Web is apt, as things get a little complicated. While not nearly as humorous as efforts from Web comic XKCD (here and here), design agency Information Architects Japan has taken to the more calculated cartography medium of urban subway systems.
Last year the company created two versions of the map. Both were based on the Tokyo area train map (which is enormous) and organized 200 popular Web sites by neighborhood. This year, the firm ramps the number sites up to 300, … Read more
Have you ever, I mean ever, copied software, a CD, a DVD, or a video tape without permission or paying? How about downloading music, video, pictures, or art?
If you answered yes, congratulations, you're just like everybody else.
On the other hand, you probably also think U.S. screenwriters are being screwed by the studios. And that China and other countries shouldn't be illegally copying and selling material copyrighted in the U.S.
That, my friend, is called a double standard.
Something else to consider:
Did you read this post about Trend Micro suing Barracuda Networks for patent infringement. Do you agree with the blogger? Do you think companies like Qualcomm, Rambus, or Trend Micro are patent trolls that unjustly enrich their shareholders at the expense of consumers?… Read more
We're used to patent trolls being shifty little bozo operations like Acacia Research that serve no useful purpose beyond proving that some life forms never evolve. Sometimes, however, patent trolls come in larger sizes and have otherwise legitimate businesses. Such is the case today with Trend Micro's apparently specious lawsuit against Barracuda Networks and, indeed, the entire open-source community.
As Justin Mason, vice president of the Apache Software Foundation, notes:Trend Micro's actions are clearly an attack on free and open-source software and its users, as well as on Barracuda Networks. The '600 patent covers a trivial method, one which was obvious to anyone skilled in the art at the time (the patent was written), and should be rendered invalid as soon as possible.
Unfortunately, our patent system only makes sense on paper. Once it hits the courts, all bets are off. This is why repudiating silly claims like Trend Micro's is so important, and why a collective response is critical.
Here's what happened in a nutshell:… Read more
Let me explain. Under marketing hardware I file the static, robust marketing framework long established in theory and practice: brand architecture, trademarks, direct mailing, loyalty programs, trade show booths, … Read more
So, you're doing the colored/crazy-designed notebook thing now, huh? Yeah, so is, well, everyone else.
It's pretty well-established now that the masses see their computer as an extension of their personalities. First, it was the brightly hued notebook trend that all the top-tier PC makers were latching on to, including Gateway. Now as a laptop vendor, it seems you have to offer some artsy-looking version of a standard notebook to even get noticed anymore. (With the exception of Apple, which garners plenty of attention with its commitment to minimalism.)
Cases in point: Sony, which already … Read more
Europe loves the VW Beetle, the Renault Twingo, and the Smart. The U.S. has the Mini and will finally get the Smart, too. And recently India proudly presented the spiritual successor to all of these--the $2,500 Tata Nano, a "people's car" that is widely gushed about, not only for its surprisingly slick design but also for its innovations.
In recent years, ecoconcerns, design savvy, and an (urban) willingness to quest for practicality have fostered the trend toward specialized cars that are as small as the niches they serve. While the idea of a small car … Read more
Security experts warned on Wednesday of a new rootkit aimed at users of the Windows operating system.
The rootkit hides in the Master Boot Record (MBR), or Sector 0 of the hard disk drive where the primary partition entries in its partition table are stored. According to Verisign's iDefense research unit, the rootkit overwrites the existing MBR, making discovery very difficult. A rootkit is a program or group of programs designed to take root or administrator control of a computer without the user knowing.
A number of phishing sites have cropped up within the last day using domains previously attributed to the Storm worm botnet. Last fall, Storm was used in a series of pump-and-dump stock spam blasts, including a unique MP3-based spam blast, but researchers at F-Secure don't think the original authors of Storm are necessarily trying something new. F-Secure said Tuesday that "October brought evidence of Storm variations using unique security keys. The unique keys...allow the botnet to be segmented allowing 'space for rent.'" They think phishers are leasing parts of the larger botnet.
F-Secure cites a Halifax … Read more
Isn't it interesting how trends are made? "One of the things I like about trends is that they seem so easy -- Blue is the color of 2008! GenY likes health food!" observes Stacey Gillar. Coupling the disparate ("Chic Trash"), pushing an already extreme concept to the extreme ("Radical Transparency"), or simply announcing the advent of something "new" ("Nouvelle Vague," "Nouveau Niche," etc.) are some of the flourishing categories. Or you simply repackage an old concept.
"RenGen," short for Renaissance Generation and the title of … Read more