Thursday, October 31, 2013

China Says Goodbye To Its Mysterious, Illegal High-Rise Fortress

China Says Goodbye To Its Mysterious, Illegal High-Rise Fortress

The luxurious "mountain villa" built atop a Beijing high-rise is being torn down. The $4 million penthouse was built by a Chinese health care entrepreneur named Zhang Lin on the roof of an existing apartment building earlier this year, much to the chagrin of its party-pooper occupants.

Read more...


    






Source: http://feeds.gawker.com/~r/gizmodo/full/~3/VwH57g9caOk/@kcampbelldollaghan
Tags: Dakota Johnson   veep   lamar odom   Joanna Krupa   Hannah Anderson  

Google releases Android 4.4 KitKat SDK

Kit Kat

Developers will have access to new features and APIs with today's SDK update

As part of today's announcements, Google has made available the Android 4.4 Kit Kat SDK component. Designed primarily for application developers, the SDK allows programs to be written using the newest APIs and features when targeting the devices that will run Kit Kat. Support for all of the features, like Project Svelte to help lower-spec devices, the new immersive screen mode, and host card emulation for NFC payments will be available for the great developers Android is blessed with, and we're plenty excited to see what they can do with it all.

If you're interested in checking things out for yourself, you can update your existing SDK through the normal channels and install it from scratch using the directions detailed here. Well be digging in and playing with any bundled emulator as soon as things settle down and it's available for download. Stay tuned!

More: Platform Highlights | API overview


    






Source: http://feedproxy.google.com/~r/androidcentral/~3/bTNNS59c4v4/story01.htm
Similar Articles: college board   pauly d   iTunes   apple event   Clemson University  

Keen On… Social Media: The First 2,000 Years




How old is social media? Maybe we can date it from the birth of Facebook in February 2004. Or perhaps we can go back to 2002, to when Friendster was founded. Or even way, way, way back to digital antiquity – back to 1997, when Reid Hoffman founded the first social media website, SocialNet.


No, social media is actually older, 2,000 years older, than Facebook, Friendster or SocialNet. That’s the view at least of Tom Standage, the digital editor of the Economist, whose new book Writing In The Wall: Social Media – The First 2,000 Years makes the intriguing argument that social media has actually been around since the Romans. It’s the industrial top-down media of the last 150 years, Standage told me, that is the historical anomaly. Social media, he explains, “scratches a prehistorical itch” for personalized news, opinion and gossip. So rather than a waste of time or a distraction, he insists, Facebook and Twitter are actually something that satisfies us as human-beings.


Standage is too good a historian to argue that nothing about social media is new. He acknowledges, for example, that the globalized, instantaneous and searchable nature of social networks are truly new. Yet Standage’s comparisons of contemporary social media with Roman papyrus letters or hand-printed tracts of the Reformation really do suggest that social media goes a lot further back than 1997. “The only surprising things about social media,” Standage dryly concludes, “is that we are surprised by it.”



Source: http://feedproxy.google.com/~r/Techcrunch/~3/gTWh54jWKJk/
Similar Articles: world series   philip rivers  

Security Flaw Found in 'Staggering Number' of iOS Apps

By John P. Mello Jr.
MacNewsWorld
Part of the ECT News Network
10/31/13 10:32 AM PT

Hackers could disrupt the normal content flow of many apps -- a great many, according to Skycure -- due to a flaw in iOS and most likely other mobile platforms. "Poisoning applications with fake content can have devastating consequences," noted security analyst Bogdan Botezatu. "Imagine a specific pool of users being shown news of an imminent hurricane or other disaster in their area."


A flaw found in a "staggering number" of apps for the iPhone and iPad could be exploited to send malicious information to the gadgets, researchers at Skycure reported Tuesday. The vulnerability allows enterprising hackers to redirect an app's communication with its appointed server to one operated by nefarious parties.


Although the researchers focused on iOS apps, the flaw could affect other mobile platforms too, since the it involves a cross-platform standard -- HTTP.


"We've seen a pretty impressive number of iOS applications susceptible to this problem, but it is very likely that other operating systems, such as Android and Windows Phone, may be susceptible to this as well, although we can't confirm that yet," Yair Amit, CTO and cofounder of Skycure, told MacNewsWorld.


Apple did not respond to our request to comment for this story.


Classic Attack


A classic man-in-the-middle attack can be launched on an iOS device by exploiting the vulnerability, which uses a technique called "HTTP Request Hacking." Here's how it works.


Many apps are constantly communicating with a server on the Net to obtain information. The app for a news organization, for instance, frequently polls that organization's server to get the latest news.


When such communication is initiated by an app, it can be intercepted by a hacker, who then pushes a modification to the iOS device that redirects all future communication from the app to the hacker's server.


The modification involves poisoning a cache used by apps with a bogus "301 Moved Permanently" command. Those commands are used by developers when a domain used by their app changes. In this case, though, the hacker is changing the domain and not the developer.


"While the 301 Moved Permanently HTTP response has valuable uses, it also has severe security ramifications on mobile apps, as it could allow a malicious attacker to persistently alter and remotely control the way the application functions, without any reasonable way for the victim to know about it," Amit explained in a blog post.


"Whereas browsers have an address bar," he continued, "most mobile apps do not visually indicate the server they connect to, making HRH attacks seamless, with very low probability of being identified by the victims."


Devastating Potential


In order to succeed, an attacker needs to be connected to the same network as the victim and actively intercept the data flow between the victim's vulnerable application and the website it downloads its data from, explained Bitdefender Senior E-Threat Analyst Bogdan Botezatu.


However, "the attack can be automated to affect all devices currently connected to the network," he told MacNewsWorld.


"While this attack may look more like a prank," Botezatu continued, "poisoning applications with fake content can have devastating consequences. For decision makers, fake news could impact the way they do business, while for others it can trigger panic. Imagine a specific pool of users being shown news of an imminent hurricane or other disaster in their area."


Botezatu cautioned against using unfamiliar networks.


"Users should be extremely careful when connecting their device to an untrusted wireless network, as their traffic can be snooped on, their credentials intercepted or -- as it is the case with this attack -- their data manipulated in real time, even when they disconnect the rogue network and connect to their own," he said.


Massive Scope


Typically, security researchers do not reveal vulnerabilities before app makers have a chance to fix them, but Skycure's Amit noted that the scope of this flaw precluded such action.


"Unlike most vulnerabilities, where a responsible disclosure could be made in private to the vendor in charge of the vulnerable app, we soon realized that HTTP Request Hijacking affects a staggering number of iOS applications, rendering the attempt to alert vendors individually virtually impossible," he wrote.


Instead, Skycure offered two solutions to the problem. First, developers could secure communication between their apps and Web hosts with HTTPS. Apps vulnerable to the 301 attack are using the insecure HTTP protocol.


In the past, developers shied away from using HTTPS because they felt it hurt app performance, but that's not the case anymore, maintained Christopher Budd, threat communications manager for Trend Micro.


"We're getting to a point where processing costs are low and security risks are high," he told MacNewsWorld, "so using HTTPS as a default, to my mind, is making much more sense."


Programmatic Solution


While HTTPS could foil some hackers seeking to exploit the 301 flaw, even that protocol can be circumvented in iOS through the use of malicious profiles.


"When you combine the 301 and malicious profile attacks together, you can poison and change the logic of applications that interact through SSL," Amit explained.


The second solution suggested by Skycure would be to shut off an app's polling of the cache containing the 301 command.


"301 is great for the Web, but when it comes to mobile applications -- where, as a user, you have to trust the vendor that what you're doing is safe -- it's very bad for mobile devices," noted Amit.


Although that solution addresses the problem, there would be a cost.


"It protects," Trend Micro's Budd observed, "but it definitely hampers functionality that, when it's legitimate, can be valuable."


Source: http://www.technewsworld.com/rsstory/79322.html
Tags: Marcia Wallace   russell brand   chicago fire   Robocop   Kendra Spears  

Why spy on allies? Even good friends keep secrets

FILE - In this Sept. 6, 2013 file photo, President Barack Obama walks with Germany's Chancellor Angela Merkel toward a group photo outside of the Konstantin Palace in St. Petersburg. In geopolitics just as on the local playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows. Revelations that the U.S. was monitoring the cellphone calls of up to 35 world leaders, including close allies, have brought into high relief the open-yet-often-unspoken secret _ and suggested the incredible reach of new-millennium technology. (AP Photo/Alexander Zemlianichenko, File)







FILE - In this Sept. 6, 2013 file photo, President Barack Obama walks with Germany's Chancellor Angela Merkel toward a group photo outside of the Konstantin Palace in St. Petersburg. In geopolitics just as on the local playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows. Revelations that the U.S. was monitoring the cellphone calls of up to 35 world leaders, including close allies, have brought into high relief the open-yet-often-unspoken secret _ and suggested the incredible reach of new-millennium technology. (AP Photo/Alexander Zemlianichenko, File)







FILE This Oct. 29, 2013 file photo shows Director of National Intelligence James Clapper pausing while testifying on Capitol Hill in Washington. In geopolitics just as on the local playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows. Revelations that the U.S. was monitoring the cellphone calls of up to 35 world leaders, including close allies, have brought into high relief the open-yet-often-unspoken secret _ and suggested the incredible reach of new-millennium technology. (AP Photo/ Evan Vucci, File)







This photo provided by The Guardian Newspaper in London shows Edward Snowden, who worked as a contract employee at the National Security Agency, on Sunday, June 9, 2013, in Hong Kong. In geopolitics just as on the local playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows. Revelations that the U.S. was monitoring the cellphone calls of up to 35 world leaders, including close allies, have brought into high relief the open-yet-often-unspoken secret _ and suggested the incredible reach of new-millennium technology. (AP Photo/The Guardian, Glenn Greenwald and Laura Poitras)







FILE - In this Friday, May 15, 1998 file photo, Jonathan Pollard speaks during an interview in a conference room at the Federal Correction Institution in Butner, N.C. In geopolitics just as on the local playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows. Revelations that the U.S. was monitoring the cellphone calls of up to 35 world leaders, including close allies, have brought into high relief the open-yet-often-unspoken secret _ and suggested the incredible reach of new-millennium technology. (AP Photo/Karl DeBlaker, File)







In geopolitics, just as on the playground, even best friends don't tell each other everything. And everybody's dying to know what the other guy knows.

Revelations that the U.S. has been monitoring the cellphone calls of up to 35 world leaders, including German Chancellor Angela Merkel, have brought into high relief the open-yet-often-unspoken secret that even close allies keep things from one another — and work every angle to find out what's being held back.

So it is that the Israelis recruited American naval analyst Jonathan Pollard to pass along U.S. secrets including satellite photos and data on Soviet weaponry in the 1980s. And the British were accused of spying on U.N. Secretary-General Kofi Annan in the lead-up to the Iraq War. And the French, Germans, Japanese, Israelis and South Koreans have been accused of engaging in economic espionage against the United States.

But now the technology revealed by former National Security Agency analyst Edward Snowden has underscored the incredible new-millennium reach of the U.S. spy agency. And it is raising the question for some allies: Is this still OK?

National Intelligence Director James Clapper, for his part, testified this week that it is a "basic tenet" of the intelligence business to find out whether the public statements of world leaders jibe with what's being said behind closed doors.

What might the Americans have wanted to know from Merkel's private conversations, for example? Ripe topics could well include her thinking on European economic strategy and Germany's plans for talks with world powers about Iran's nuclear program.

There is both motive and opportunity driving the trust-but-verify dynamic in friend-on-friend espionage: Allies often have diverging interests, and the explosion of digital and wireless communication keeps creating new avenues for spying on one another. Further, shifting alliances mean that today's good friends may be on the outs sometime soon.

"It was not all that many years ago when we were bombing German citizens and dropping the atomic bomb on the Japanese," says Peter Earnest, a 35-year veteran of the CIA and now executive director of the International Spy Museum in Washington.

News that the U.S. has tapped foreign leaders' phones was an eye-opener to many — the White House claims that even President Barack Obama wasn't aware of the extent of the surveillance — and has prompted loud complaints from German, French and Spanish officials, among others.

It's all possible because "an explosion in different kinds of digital information tools makes it possible for intelligence agencies to vacuum up a vast quantity of data," says Charles Kupchan, a former Clinton administration official and now a senior fellow of the Council on Foreign Relations. "When you add together the Internet, wireless communications, cellphones, satellites, drones and human intelligence, you have many, many sources of acquiring intelligence."

"The magnitude of the eavesdropping is what shocked us," former French Foreign Minister Bernard Kouchner said in a radio interview. "Let's be honest, we eavesdrop, too. Everyone is listening to everyone else. But we don't have the same means as the United States, which makes us jealous."

Protests aside, diplomats the world around know the gist of the game.

"I am persuaded that everyone knew everything or suspected everything," Russian Foreign Minister Sergey Lavrov said of the reports of U.S. monitoring.

And while prime ministers and lawmakers across Europe and Asia say they are outraged, Clapper told Congress that other countries' own spy agencies helped the NSA collect data on millions of phone calls as part of cooperative counterterror agreements.

Robert Eatinger, the CIA's senior deputy general counsel, told an American Bar Association conference on Thursday that European spy services have stayed quiet throughout the recent controversy because they also spy on the U.S.

"The services have an understanding," Eatinger said. "That's why there wasn't the hue and cry from them."

And another intelligence counsel says the White House can reasonably deny it knows everything about the U.S. spying that's going on.

"We don't reveal to the president or the intelligence committees all of the human sources we are recruiting. ... They understand what the programs are, and the president and chairs of the intelligence committees both knew we were seeking information about leadership intentions," said Robert Litt, general counsel for the Office of the Director of National Intelligence. "They both saw reporting indicating what we were getting if not indicating the source."

Still, Claude Moraes, a British Labor Party politician and member of the European Union delegation that traveled to Washington this week for talks about U.S. surveillance, was troubled by the broad net being cast by U.S. intelligence.

"Friend-upon-friend spying is not something that is easily tolerable if it doesn't have a clear purpose," he said. "There needs to be some kind of justification. ... There is also a question of proportionality and scale."

Obama has promised a review of U.S. intelligence efforts in other countries, an idea that has attracted bipartisan support in Congress.

The United States already has a written intelligence-sharing agreement with Canada, Britain, Australia and New Zealand known as "Five Eyes," and France and Germany might be interested in a similar arrangement.

Paul Pillar, a professor at Georgetown University and former CIA official, worries that a backlash "runs the risk of restrictions leaving the United States more blind than it otherwise would have been" to overseas developments.

The effort to strike the right balance between surveillance and privacy is hardly new.

University of Notre Dame political science professor Michael Desch, an expert on international security and American foreign and defense policies, says the ambivalence is epitomized by Secretary of State Henry L. Stimson's famous line, "Gentlemen do not read each other's mail." Stimson, who served under President Herbert Hoover, shut down the State Department's cryptanalytic office in 1929.

"Leaks about NSA surveillance of even friendly countries such as Brazil, Mexico, and now France make clear that we no longer share Stimson's reticence on this score," Desch said. "While such revelations are a public relations embarrassment, they also reflect the reality that in this day in age, gentlemen do read each other's mail all of the time, even when they are allies."

In fact, a database maintained by the Defense Personnel Security Research Center covering Americans who committed espionage against the U.S. includes activity on behalf of a wide swath of neutral or allied countries since the late 1940s. U.S. citizens have been arrested for conducting espionage on behalf of South Korea, Taiwan, the Philippines, Israel, the Netherlands, Greece, Saudi Arabia, Egypt, Iraq, Jordan, Ghana, Liberia, South Africa, El Salvador and Ecuador, according to the database.

___

Associated Press Writers Deb Riechmann and Kimberly Dozier contributed to this report.

___

Follow Nancy Benac on Twitter at http://twitter.com/nbenac

Associated PressSource: http://hosted2.ap.org/APDEFAULT/3d281c11a96b4ad082fe88aa0db04305/Article_2013-10-31-Why%20Spy%20on%20Allies/id-a6331f33c99d43f4b2e81f7b7c685ebb
Tags: james taylor   Josh Freeman   mariano rivera   lesean mccoy   Pga Leaderboard  

Man says he was drunk, angry when killed neighbors

66-year-old defendant Mike Reda, right, and his defense attorney Bryan Sherer sit at the defense table listening to testimony at the Frank Murphy Hall of Justice, Thursday, Oct. 31, 2013 in Detroit. Reda, a 66-year-old great-grandfather told police he was filled with anger and alcohol on the day he shot two women with an assault rifle in a Detroit retirement home, enraged at what he believed was their persistent intrusions into his relationship with another woman, Thursday, Oct. 31, 2013. (AP Photo/Detroit News, John T. Greilick) DETROIT FREE PRESS OUT; HUFFINGTON POST OUT







66-year-old defendant Mike Reda, right, and his defense attorney Bryan Sherer sit at the defense table listening to testimony at the Frank Murphy Hall of Justice, Thursday, Oct. 31, 2013 in Detroit. Reda, a 66-year-old great-grandfather told police he was filled with anger and alcohol on the day he shot two women with an assault rifle in a Detroit retirement home, enraged at what he believed was their persistent intrusions into his relationship with another woman, Thursday, Oct. 31, 2013. (AP Photo/Detroit News, John T. Greilick) DETROIT FREE PRESS OUT; HUFFINGTON POST OUT







66-year-old Mike Reda enters the courtroom for his preliminary exam at the Frank Murphy Hall of Justice, Thursday, Oct. 31, 2013 in Detroit. Reda, a 66-year-old great-grandfather told police he was filled with anger and alcohol on the day he shot two women with an assault rifle in a Detroit retirement home, enraged at what he believed was their persistent intrusions into his relationship with another woman, Thursday, Oct. 31, 2013. (AP Photo/Detroit News, John T. Greilick) DETROIT FREE PRESS OUT; HUFFINGTON POST OUT







In this Oct. 23, 2013 photograph supplied by the Detroit Police Department, Mike Reda, 66, is shown in Detroit. Reda, has been arraigned on charges that he fatally shot two women at a Detroit home for senior citizens. Reda was arrested shortly after the Sunday slayings of 59-year-old Deborah Socia and 61-year-old Maria Gonzalez at the Pablo Davis Elder Living Center. (AP Photo/Detroit Police Department)







(AP) — A 66-year-old great-grandfather told police he was filled with anger and alcohol when he shot two women with an assault rifle in a Detroit retirement home, enraged at what he believed were their persistent intrusions into his relationship with another woman.

Mike Reda's videotaped interrogation with Detroit police detectives was played in court Thursday during a hearing at which a judge determined there was enough evidence for him to stand trial on two counts of first-degree murder, assault with intent to murder and other felony charges. He's accused of shooting Deborah Socia, 59, and Maria Gonzalez, 61, on Oct. 20 at the two-story, 80-unit Pablo Davis Elder Living Center on the city's southwest side.

"I was drunk, I was angry," Reda told investigators. "I just couldn't take it no more."

Reda said during the interrogation on the day after the shootings that he was retired, lived alone at the center and had seven children as well as more than two dozen grandchildren and great-grandchildren. He had dated the same woman for several years, but said the two women had befriended her and frequently kept the girlfriend away from him.

He said he'd been drinking brandy and couldn't remember most details of the day, but later in the interview told the two detectives that he approached Socia and another man, Paul Fratangelo, on the center's grounds with his MP5 rifle. Reda said his rifle discharged one time "by accident."

Reda said he then went inside to Gonzalez's apartment, kicked in her door and shot her twice in the head.

He asked detectives twice if the women were alive or dead, and at the end of the interview one investigator told him they were dead. Reda paused, sighed heavily and said, "That's really bad."

Defense attorney Bryan Sherer declined comment before and after the hearing. Friends and family members of the victims also declined comment outside court.

Fratangelo testified that he was sitting on a bench with Socia, smoking a cigarette and talking before dinner, when Reda walked toward them. Fratangelo, 61, said Reda swung his weapon back and forth between the two while ordering Fratangelo to "basically get on my knees and pray."

"I said, 'Mike, not this. Not like this. We're both vets.' I'm basically pleading with my life," Fratangelo said, adding that Reda seemed "on edge" but "very composed."

Fratangelo said Socia asked Reda what he was doing, and he fired his gun one time. Afterward, Fratangelo said he entered the building and tried to trap Reda between two sets of doors. Fratangelo then "bolted down the hall," told Socia's son that "Mike is on a rampage" and to "call 911."

The judge struck down Sherer's argument that Fratangelo wasn't injured or threatened so his client shouldn't be held on the charge of assault with intent to murder.

Reda's first appearance in trial court is scheduled for Monday.

___

Follow Jeff Karoub on Twitter: http://twitter.com/jeffkaroub

Associated PressSource: http://hosted2.ap.org/APDEFAULT/386c25518f464186bf7a2ac026580ce7/Article_2013-10-31-US-Senior-Center-Shooting/id-9327d52e0b4f4a8ea39fae3320d054c7
Related Topics: hocus pocus   Colleen Ritzer   danielle fishel   Million Second Quiz   Ryne Sandberg  

How to Prepare for a Power Outage

Hurricane season is under way and winter is coming up in the Northern Hemisphere. There's a good chance the lights will go out sooner or later -- at least for a short time. How to prepare? Well, besides the standard staples such as food and water, you'll probably wish for some lighting and a way to charge your smartphone. Here's how to gear up on the "e" side of things.


The Federal Emergency Management Agency, the American Red Cross and local governments can all provide copious documentation on ways to prepare for weather and other disasters, but it's often geared towards perishable food and single-family homeowners in the 'burbs -- not information-hungry urban dwellers.


Typically omitted are some very simple tricks that you can put into play now, in advance of the incident, to make sure you remain powered, lit and connected should the power go out.


Hurricane season is under way and winter is coming up in the Northern Hemisphere. At the bare minimum, you need a light source; lighter; a propane or butane camping stove to use with the window open; cans of food; water; and a power source for a smartphone.


Here's how to prepare on the "e" side of things.


Step 1: Understand your power requirements.


Smartphones, mobile hotspots and any other device that's powered using a USB cable requires a 5 volt power source, not a 110 volt household outlet.


The only reason we use wall plugs to charge phones is because the power is conveniently there -- it's available. However, when the wall plug becomes a useless hole in the wall, for all intents and purposes, move on to other sources.


Step 2: Prepare existing sources of power.


Your laptop contains a battery that, if charged, can be used to power your smartphone.


Switch off and unplug your laptop in advance of an incident. Then test each laptop USB port for power. Separate the phone's USB cable from the wall charger and discard the charger. Insert the cable into phone and port. One or more ports may be powered.


Keep the laptop usually charged. Then during an incident, turn off the laptop, because it uses more power than the smartphone; switch off the smartphone and plug it into the known powered-USB port overnight; and allow the phone to trickle charge.


You could get a couple of days smartphone use out of one charged laptop battery.


Tip: If you are unable to find an existing, powered USB port on the laptop, open the laptop's BIOS settings on boot and look for USB power settings there to enable USB power for when the laptop is switched off.


Again, do this before any incident so you don't use all the laptop's power fiddling with settings.


Step 3: Prepare lighting.


You will need some form of backup lighting if the incident extends into the evening. Twenty-two-foot solar-powered waterproof ropes of 50 LED lights, of the kind used to light walkways and awnings, are ideal because they'll last indefinitely -- day after day.


I recommend the US$10 Harbor Freight Tools product, which I've successfully used camping.


Ensure the palm-sized panel is off and then hang the solar collector out of the window and let the included battery charge for a full day.


Tip: Try to get the panel pointing towards the sun, if there is any.


Then, wrap the long rope around objects inside, like existing lamps.


In the evening, switch the panel to the Continuous mode and the low-power LEDs will illuminate at dusk with enough light to stop you tripping over things.


Your eyes will adjust to the limited light, but add more ropes for more light. The lights automatically turn off in the morning and start charging again.


Step 4: Prepare additional sources of power.


Stick with 5 volt sources of power because that's what will natively charge your phone -- and you're using solar for light. It's likely Internet-based social networks are where you are going to find out what's going on -- assuming there's phone service.


Look for universal 5 volt lithium technology USB backup charger batteries on auction sites like eBay. These devices act as power banks and include a USB port.


Tip: Capacity is measured in mAh. That's a measurement of amps per hour. Your existing smartphone battery could be somewhere in the region of 1,800 mAh -- it'll be labeled. So a 20,000 mAh power-bank battery should theoretically give you about 10 charges.


It won't, though because of technological inefficiencies and exaggerated claims, but that should give you an idea of how to compare what you're buying.


You can read about more elaborate solar backup power and communications systems here.


Want to Ask a Tech Question?


Is there a piece of tech you'd like to know how to operate properly? Is there a gadget that's got you confounded? Please send your tech questions to me, and I'll try to answer as many as possible in this column.


And use the Talkback feature below to add your comments!



Patrick Nelson has been a professional writer since 1992. He was editor and publisher of the music industry trade publication Producer Report and has written for a number of technology blogs. Nelson studied design at Hornsey Art School and wrote the cult-classic novel Sprawlism. His introduction to technology was as a nomadic talent scout in the eighties, where regular scrabbling around under hotel room beds was necessary to connect modems with alligator clips to hotel telephone wiring to get a fax out. He tasted down and dirty technology, and never looked back.


Source: http://www.technewsworld.com/rsstory/79315.html
Tags: Heisenberg   made in america   Elmore Leonard   Solheim Cup 2013   amber heard  

'X-Files' creator's Amazon pilot gets the green light, the truth is out there and streaming in early 2014


Prime Instant Video Greenlights First-Ever Drama Pilots


ollowing Amazon Studios' pilot announcement earlier this month, Amazon today announced it has given the green light for the production of its first two hour-long drama pilots: Bosch, based on Michael Connelly's best-selling Harry Bosch book series and written by Emmy-nominated Eric Overmyer (The Wire, Treme) and Michael Connelly, and The After, written and directed by Emmy-nominee Chris Carter (The X-Files).


Customers will be invited to watch the pilots on Amazon Instant Video at no cost and can provide feedback that will help determine which pilots should be produced as series to air exclusively on Prime Instant Video and Amazon's LOVEFiLM in the UK in early 2014.


"We are very excited to be working with creators like Michael Connelly and Chris Carter, both epic storytellers in their own right," said Roy Price, Director of Amazon Studios. "For the first time we are bringing Amazon customers hour-long programming and we can't wait to hear what they think of these new stories."


Bosch


Based on Michael Connelly's best-selling Harry Bosch series and written by Eric Overmyer and Michael Connelly, Bosch follows a relentless LAPD homicide detective as he pursues the killer of a 13-year-old boy while standing trial in federal court on accusations that he murdered a suspected serial killer in cold blood. Bosch will be played by Titus Welliver (Argo, The Good Wife) and the pilot will also star Annie Wersching, Amy Price-Francis and Jamie Hector. Henrik Bastin of Fabrik Entertainment (The Killing) is producing and Jim McKay will direct.


"Sharing this story with television audiences is very exciting, something that's been twenty years in the making," said author Michael Connelly. "It is amazing to have it come together with the synergy of Amazon-the world's largest bookstore-along with accomplished creator and showrunner, Eric Overmyer, and Fabrik, a production company dedicated to loyalty to the books. Harry Bosch can be in no better hands."


The After


Written and directed by Emmy-nominee Chris Carter (The X-Files) executive produced by Marc Rosen of Georgeville Television and produced by Gabe Rotter, The After follows eight strangers who are thrown together by mysterious forces and must help each other survive in a violent world that defies explanation. Sharon Lawrence, Jamie Kennedy, Aldis Hodge, Andrew Howard, Arielle Kebbel, Jaina Lee Ortiz, Adrian Pasdar, and Louise Monot will star.


"I'm very superstitious about talking about what I'm working on before it's finished, and it's more fun if it's kept a mystery! So let me just say that this is a show that explores human frailty, possibility, terror, and the triumph of the human spirit," said Chris Carter, creator of The After. "I'm so excited to be telling this story with Amazon in this new frontier of television."


Source: http://www.engadget.com/2013/10/31/amazon-pilot/?ncid=rss_truncated
Similar Articles: jordy nelson   denver broncos  

Stop Whining Dems, You Own Obamacare. All Of It.


Henry Waxman made a plea at the end of Wednesday’s House hearing grilling of Health and Human Services Secretary Kathleen Sebelius. The California Democrat and liberal lion asked Republicans to reach across the aisle to work with Democrats to improve Obamacare.



Yes, Henry Waxman, who has made a career of ideological witch hunts and smash-mouth partisanship, wants a cease-fire over Obamacare, or so he says.





Source: http://www.realclearpolitics.com/2013/10/31/stop_whining_dems_you_own_obamacare_all_of_it_318952.html
Similar Articles: breast cancer awareness   freedom tower  

A Galaxy S4 Active Mini Might Be on Its Way

A Galaxy S4 Active Mini Might Be on Its Way

This phone here appears to be yet another miniature version of a popular full size model, with official filings revealing something we suspect might end up being known as the Samsung Galaxy S4 Active Mini. Could do with a smaller name, too.

Read more...


    






Source: http://feeds.gawker.com/~r/gizmodo/full/~3/HJS88P52bkE/a-galaxy-s4-active-mini-might-be-on-its-way-1455852078
Tags: cnet   tony romo   Julie Harris   Jenna Wolfe   Outside Lands  

How Much Would a Pumpkin the Size Of Your House Weigh?

How Much Would a Pumpkin the Size Of Your House Weigh?

The wonderful world of genetic engineering has given us gargantuan pumpkins the size of compact cars. But don't think it's going to stop there. In addition to spreading Halloween cheer and giving local evening news something to cover, giant pumpkins could eventually be grown to the size of a house and used as a cheap and temporary place for someone to live.

Read more...


    






Source: http://feeds.gawker.com/~r/gizmodo/full/~3/TS8GGqSJ03c/how-much-would-a-pumpkin-the-size-of-your-house-weigh-1453364483
Related Topics: chicago marathon   breast cancer awareness   Lleyton Hewitt   new york times   megyn kelly