21 July 2013

Google Invites Users To Send Money Via Gmail

Google has begun sending out invitations to try the new version of Google Wallet that allows users to send money via Gmail. The invitations are being sent to those who previously expressed interest in testing the revised Google Wallet.
The company first announced plans to integrate Google Wallet with Gmail at its developer conference in May and made the service available on a viral basis: The only way to try the combined service was to receive funds via Gmail from someone in the initial pool of testers, who had been granted early access.
Google now appears to be ready to generate interest in its Gmail payment capability by more conventional means, though it continues to support viral user acquisition. Those who elect to accept Google's invitation can allow others to join by sending them Gmail messages with cash attached.
Joining requires a bit more information than usual for consumer online services. You must confirm your identity by supplying your address, your date of birth and the last four digits of your social security number. The U.S. government, like other governments around the world, likes to have a way to trace the movement of currency if necessary, for the enforcement of tax and security laws.
[ Another way to pay for your coffee: Starbucks, Square Partner For Mobile Payments. ]
After you've submitted the required information, it should then take an hour or so before the "$" symbol becomes an option in the Gmail message ribbon.
The mechanics of sending money via Gmail are now well documented on a Google support page. It's simply a matter of hovering over the "+" icon at the bottom of a message composition window and then clicking on the "$" icon.
Assuming you've set up Google Wallet and have funds available, all you have to do is enter an amount, click "Attach" and then send your money-laden message. Sending money is free if you use existing Google Wallet funds or funds stored in a linked bank account. Alternately, you can use a credit or debit card as a source of funds, but that imposes a 2.9% transaction fee, $0.30 minimum.
Recipients can claim sent funds upon receipt once they have established a Google Wallet account. It would not be at all surprising if this requirement led to renewed interest in Google Wallet.
Google Wallet adoption has been slow in part because of the abundance of competitors: AT&T, Verizon and T-Mobile USA are backing their own Isis payment service; Apple would rather promote its Passbook mobile payment management system; PayPal and Square have been making inroads in mobile payments; and a group of some two dozen retailers including Wal-Mart and Target want to control their own mobile payment solution.
Our survey finds that most companies will launch mobile commerce within a year. What's your holdup? Also in the new, all-digital Mobile Commerce Takes Off special issue of InformationWeek: Companies that take PCI responsibilities seriously will find that using a cloud provider and staying compliant can be a major project.

17 July 2013

3 Reasons Voice Will Finally Come To The Web

Voice is dead. Or at least the digerati think so. It takes some real digging in Silicon Valley to find the voiceheads, the true believers that voice will have its second coming as a Web application.
Today, most people think of Apple's Siri when you say voice app, but what if you could control all your apps with voice, and also search through spoken conversations and find content as easily as you do in email? At the very fringes of consumer and enterprise social interaction, this vision is already here. This emergent paradigm, known as hypervoice, promises to be a major boon for productivity. The real question is whether it will tip and become the next big shift in the Web.
It's kind of crazy that telephony and the Web are still so separate. Voice on the Web is only about the transport of voice, not voice as rich media content. Voice today is like Web 1.0 when Web content simply mimicked brochures. It's so boring, it hurts.
But what if voice was interactive like hypertext? What if we could search, share and find highlights from our conversations -- just like we do with text? Voice could go from a fringe player to a radical new social object with the potential to alter the way we communicate online.
These ideas may seem wild, but they are certainly not new. The voiceheads are quick to pull up their shirts to compare scars. With so many false starts, why is now the time for voice to become a member in good standing of the Web community? Here are three reasons.
1. Productivity #SOS
Today, voice solves only a space problem -- connecting two people across long distances in real time. But that model doesn't line up with how we work today. We work asynchronously, out of our email inboxes and social media activity streams. Live calls are increasingly disruptive to our workflow. Throwing in the pain of connecting across multiple time zones makes the need for a better way to work more pressing.
Text alone can't save us from this time-stretched, overloaded information stream. We need new tools, badly. Emerging hypervoice apps, where we can go back over our voice conversations and quickly find bits of information we need, will be like giving us perfect recall. Imagine augmented memory without an implant.
2. Viva La WebRTC!
The World Wide Web Consortium (W3C) drafted WebRTC as an API definition to enable browser-to-browser applications for voice calling, video chat and peer-to-peer file sharing without plug-ins. Today it's not trivial to put voice on the Web and make the pieces play nicely together, so it's hard to underestimate the impact that WebRTC (Web Real-Time Communication) will have on the development of future voice applications. Although the standard is still gathering form and adherents (e.g., Microsoft and Apple have not joined the party yet), WebRTC promises to make it whip simple for developers to integrate voice and video into their applications. By lowering technology barriers, new applications are likely to emerge quickly and seemingly out of left field. WebRTC will unleash the developers!
3. Say It: "Behavioral Changes"
People are starting to get comfortable talking to, not just through, their devices. We saw this nascent behavior shift start with Siri, and now it is likely to expand with Google's hotwording. These behavioral shifts are a critical step forward, as we have to get comfortable with voice as an interface. We need to move away from using our mobile devices as a typewriter.
It's critical, and yet ... Behavioral shifts are the hardest friction point to overcome. Social convention and etiquette change far slower than our technology advancements.
And while we are talking about barriers, one of the most pressing to overcome for hypervoice will be the acceptance of recording our voice conversations. As an early adopter, I have about two years of recorded conversations. I had assumed that people would be more off-put at the prospect of being "on the record." What has really surprised me is how little anyone seems to care. By regularly recording my conversations in a format that was simply searchable and shareable not only by me, but by them as well, my colleagues saw it as a boon for their own productivity, too.
So the real question is: Are we ready to trade our privacy for productivity? We have done it before, countless times. But in some ways, voice feels special. It feels like part of our personhood. And to this last point, time will only tell.

Link found between game theory and quantum

While research tends to become very specialized and entire communities of scientists can work on specific topics with only a little overlap between them, physicist Dr Nicolas Brunner and mathematician Professor Noah Linden worked together to uncover a deep and unexpected connection between their two fields of expertise: game theory and quantum physics.

Dr Brunner said: "Once in a while, connections are established between topics which seem, on the face of it, to have nothing in common. Such new links have potential to trigger significant progress and open entirely new avenues for research."
Game theory—which is used today in a wide range of areas such as economics, social sciences, biology and philosophy—gives a mathematical framework for describing a situation of conflict or cooperation between intelligent rational players. The central goal is to predict the outcome of the process. In the early 1950s, John Nash showed that the strategies adopted by the players form an equilibrium point (so-called Nash equilibrium) for which none of the players has any incentive to change strategy.
Quantum mechanics, the theory describing the physics of small objects such as particles and atoms, predicts a vast range of astonishing and often strikingly counter-intuitive phenomena, such as quantum nonlocality. In the 1960s, John Stewart Bell demonstrated that the predictions of quantum mechanics are incompatible with the principle of locality, that is, the fact that an object can be influenced directly only by its immediate surroundings and not by distant events. In particular, when remote observers perform measurements on a pair of entangled quantum particles, such as photons, the results of these measurements are highly correlated. In fact, these correlations are so strong that they cannot be explained by any physical theory respecting the principle of locality. Hence quantum mechanics is a nonlocal theory, and the fact that Nature is nonlocal has been confirmed in numerous experiments.
In a paper published in Nature Communications, Dr Brunner and Professor Linden showed that the two above subjects are in fact deeply connected with the same concepts appearing in both fields. For instance, the physical notion of locality appears naturally in games where players adopt a classical strategy. In fact the principle of locality sets a fundamental limit to the performance achievable by classical players (that is, bound by the rules of classical physics).
Next, by bringing quantum mechanics into the game, the researchers showed that players who can use quantum resources, such as entangled quantum particles, can outperform classical players. That is, quantum players achieve better performance than any classical player ever could.
Dr Brunner said: "Such an advantage could, for instance, be useful in auctions which are well described by the type of games that we considered. Therefore, our work not only opens a bridge between two remote scientific communities, but also opens novel possible applications for quantum technologies."

07 July 2013

The Easiest Way in the World to Share Files P2P – and How it Works

There are dozens of ways to share files on the Internet but one site has made it so simple that anyone with a Firefox or Chrome browser can share content in seconds. In fact, Sharefest is so simple there’s barely anything to talk about, but behind the scenes it’s a different matter. TorrentFreak caught up with its creators for the lowdown on their super-simple, drag-and-drop, BitTorrent-like swarming system.
Sharing files is now something that many Internet users do on a daily basis, whether that’s documents, images or video.
There are plenty of ways to distribute those files, such as via email, public file-hosting sites, Dropbox-like operations, BitTorrent…the list goes on.
But what if all of those options – even email – are just too complicated?
Sharefest is without doubt the most simple way to share files available today. Fire up the Sharefest website and drag a file to the middle of the page. A link will appear – paste that to as many people as you like. Wait for the transfer to complete. Done.
Simplicity aside, what’s so neat about Sharefest is the technology going on behind the scenes.
Sharefest operates on a mesh network similar to BitTorrent and all transfers are executed peer-to-peer. Files can be shared with many people at once and the technology can swarm to speed up transfers, just like BitTorrent. It’s Open Source and apart from Chrome or Firefox, no additional software is required.
TorrentFreak caught up with Hadar Weiss from Peer5, the outfit behind the project, for the lowdown. Weiss says that the key is bringing file-sharing to the web.
“We are fascinated with the potential of P2P communication within the browser,” Weiss explains.
“We think that P2P is very powerful and there are great implementations such as BitTorrent. But P2P can reach its full potential only when it reaches the Web. Until then, it’s not really for the mainstream. For example, we like to ask ourselves, why can’t my mother use P2P filesharing? The answer, (we believe) is in a user friendly web technology.”
Sharefest uses WebRTC, a technology that can enable browser-to-browser communications such as file-sharing and video/chat applications without need for a plug-in. The technology is present in the latest Chrome and Firefox browsers.
“People talk a lot about the WebRTC revolution, and they mostly refer to the audiovisual world. We believe the change is bigger and that we will see many web applications that use the WebRTC Data API for things other than audio or video. Many of them would need a ‘BitTorrent-like’ many-to-many system, and that’s what we build.
“Sharefest actually started just as the canonical example for many-to-many sharing that uses our technology. We wanted to Open Source some of the stuff we developed at Peer5, and file-sharing was the coolest use-case,” Weiss says.
So, using a real-world example in which I want to share a 250MB video with half a dozen friends, how does that work behind the scenes? Presumably there’s a BitTorrent-like tracker to coordinate transfers among peers who swarm to share the data and speed up downloads?
“There’s a swarming technique, and mesh networking. Meaning that any peer can be connected to number of different peers and can send and receive data. So if there are six others, you might be connected to all of them, or just one,” says Weiss.
“The tracker decides who is connected to you, depending on many parameters (we call it the matching algorithm). The most trivial is what blocks you have. Two peers with roughly the same blocks are rarely connected. Geography, ISP, available bandwidth are also important factors of course, and we will put even more in the future. The nice part, because it is server based, is that peers discover each other very quickly.”
Interestingly, Weiss says that the Sharefest tracker doesn’t need to know the IP addresses of peers.
“To match two peers, the tracker sends the relevant peers a message through a WebSocket channel. They then start a standard WebRTC handshake – SDPs which describe the local peer capabilities are sent through the server, and they start talking with the STUN server. The STUN server help the two peers create the real P2P connection, overcoming firewalls and NATs,” Weiss adds.
Also, Sharefest peers are able to discriminate in a way similar to BitTorrent peers, taking more data from better performing peers while taking less from others.
Sharefest is a work-in-progress and will have more features added over time. One that we’d really like to see is the ability to resume partially completed uploads. Weiss told us that this feature is not only in the works, but just about to be released. Perfect.

US ISP Can Monitor File-Sharing Traffic

At the moment, there are quite a few BitTorrent traffic monitoring firms and systems out there, but AT&T seems to make a premiere as the first Internet service provider to get a patent under which the company is allowed to monitor file-sharing traffic.

ATT-Awarded-Patent-To-Monitor-File-Sharing-Traffic.png


The innovative system is supposed to be used by AT&T to predict monitor network congestion before occurring. However, another possible use of it is to check out what material is very popular with pirates on file-sharing portals.

Recently, AT&T has adopted a “six-strikes” anti-piracy program which means that an Internet subscriber alleged of downloading copyrighted content gets 6 warnings before having their Internet connection terminated.

Industry observers have created a chart which allows to better understand how the new system works. According to it, AT&T will maintain RSS feeds of torrents that it could end up downloading and then search through. Although the names of the files will play a huge role in what the system detects as illegal content, it will still go one step further and dig into the file to make sure it is really what it says it is, because everyone knows there can be just a virus hiding under the latest Hollywood blockbuster name.

Apparently, the ISP’s technology will appeal to rights holders because of its possibilities and that they will be able to “convince” the broadband provider (if necessary) to use it as a method to reduce Internet piracy.

02 July 2013

Turn Your RSS Feeds into Torrents

Almost anyone uses Rich Site Summary feeds today, as they keep the user updated by converting the required data into a standard format – the RSS document. Now RSS2Torrent can take these documents and turn them into full-pledged torrent feeds.

rsslogo.jpg

You know that reading RSS feeds is like reading e-mail – they keep users updated with the latest events based on a list of their favorite portals or blogs. BitTorrent Inc. admits that the relationship between RSS and P2P had always been a professional one, until RSS2Torrent managed to take it one step further.

A new service offered by the company is very easy to use, even for subscribers who are not avid web-surfers. For example, you can get IMDB’s RSS feed link by right-clicking the RSS logo and choosing “Copy Link Location” in the menu. Then you just go to RSS2Torrent and paste the link in question into the box. Click the “Create” button and the conversion will take just a few seconds. You will get a new link, which can be copied and opened with any BitTorrent application.

For instance, uTorrent users should go to the File menu and choose “Add RSS feed”. There they should paste the provided link, which has a look like “http://rss2torrent” and that’s it. The new content will be displayed if you click the “Feed” button on the left side of the app.

Vuze users should look for “Content Discovery” and “Subscriptions” and click the plus to add the desired feed. Then they should choose “Create New Subscription” and click the RSS tab to paste the content and save it. Users are free to choose any RSS feed they want, of course, while being sure that it is regularly updated and ready to be downloaded when the case.

Thanks to TorrentFreak for the source of the article 

27 June 2013

Assange May Stay Hiden for Another 5 Years

The Ecuadorian government has reminded everyone that they still take care of Julian Assange, who has been effectively under house arrest in the embassy. The matter is that he refuses to go to Sweden to face sex charges, while the coppers outside the Ecuadorian embassy waiting to arrest him cost the British taxpayers £3 million annually. They must be well paid coppers, though.

In the meanwhile, any hope that the Ecuadorians might have changed their mind after change of government in the country has been dashed – in the interview, the ambassador admitted that Julian is ready to stay at the Ecuadorian embassy for another 5 years. It was denied that Assange’s health was worsening – instead, the ambassador maintained he was “in good spirits” and assured that Ecuador will continue to provide political asylum.

The United Kingdom and Ecuador are in a legal stalemate over how to handle problem with Assange and have created a working group to hammer out a deal. However, the United Kingdom admitted that no substantive progress had been made and any resolution would need to be within the local law. Ecuador claimed that human rights of the Wikileaks founder to safe passage out of the United Kingdom were being violated by an intransigent British government.

As for Julian Assange, he has claimed that if he was extradited to Sweden, he will be sent to the United States and potentially face the death penalty relating to charges of disclosing confidential data, all because of his connections to his own whistleblowing service Wikileaks. The only question he doesn’t want to answer is why if the United States wanted to extradite him they didn’t do so when he was in the United Kingdom. Indeed, the British Secretary Teresa May would have loved to extradite Assange to the US, but the problem is that there is no warrant from the United States for the Wikileaks founder. So, any claims that if Assange didn’t face the music for the sexual offences he would be extradited seems to be only his own thoughts.

Anyway, the Ecuadorian government revealed that they had offered the Swedish legal authorities the opportunity to question Julian Assange about the allegations in their London embassy, but they didn’t get any reply.

26 June 2013

Apple Users Sleep at Night, Android Users Don’t

According to the recent survey by an online advertising agency which runs mobile adverts, there are some strange facts about Android and Apple users. Chitika, which serves up adverts on over 300,000 sites in the United States and Canada, pointed out that Apple’s users love advertising. Indeed, even though there are fewer iPhones operating, they seem to be hitting a lion’s share of the advertising.

The results of the survey revealed that Apple’s share of the advertising traffic was 62%, while Android’s share was 38%. However, analyst estimates that Android devices are currently outnumber iOS in North America. Chitika tracked about 300 million ad impressions hour-by-hour within the first week of May and graphed the results according to the mobile platform used by the visitor.

So, for both groups of users most advertising traffic occurred at 10PM, which means that the late evening hours are the most popular browsing times for people. However, iOS users showed a sharp 7 hour fall-off after this peak, which means that Apple users normally go to sleep at night. In the meantime, Android users for some reason don’t stop hitting the advertising until 4:00 and 5:00 a.m.

Study on Social Networking

A study conducted by the University of Michigan claims that social media websites like Facebook and Twitter are a narcissist magnet. For example, young adults of college age and their adult counterparts are using such services in order to bolster their egos and control perceptions of others. It was also suggested that vain college-age students prefer using Twitter to make their opinions and views seem important.

According to a University of Michigan researcher, social networking is about making individual’s image, how they are seen, and also checking on how others respond to that image. Apparently, the young tend to overvaluate the importance of their own opinions. For example, via Twitter, they are trying to broaden their social circles while broadcasting their views about various topics and issues.

In the meantime, adults exhibiting narcissism also tend to prefer Facebook for the same purpose. The study suggests that middle-aged adults normally have already formed their social selves and they just use social media in order to gain approval from people who are already in their social circles. The study tried to find out whether the narcissistic behavior was related to the amount of time a person spent posting, reading posts and commenting.

Thus, people were divided into two groups. The first tested 486 college students with an average age of 19 over the extent of their social media usage. The group also took part in a personality assessment measuring exhibitionism, superiority, authority, and self-sufficiency. It appeared that young adult college students who used Twitter extensively scored higher in certain types of narcissism.

The second group of the study focused on 93 adults with an average age of 35. The group completed a similar online survey, and it also turned out that middle-aged adults narcissists posted more frequent status updates on Facebook as well.

Tor Systems Used for Illegal Activities

According to statistics, many thousands of people access shady sites via Tor every day. While most users say they use the systems because they want to stay anonymous, some exploit the layers of proxies to find drugs.

images1.jpg

Originally, the Onion Router has been created by the US Navy a decade ago in order to keep government communications safe from prying eyes. The reports say that Tor had reached about 600.000 users annually. The way it works is quite simple to understand – instead of using one proxy to hide the IP addresses, it uses a whole chain of proxies, hence its name.

A decade ago nobody had this concept of privacy, but now this doesn’t seem so far-fetched anymore. While Tor claims to be used daily for various purposes by the military, journalists, law enforcement officers and activists, the Child Exploitation and Online Protection Center is warning that 1/3 of its users are suspected of conducting a wide range of unauthorized activities. Some people confessed they had started using Tor to buy drugs online. This is why some experts now believe that Tor should be blacklisted by governments. As for the United Kingdom, the country’s Prime Minister believes that sites and search engines have to take responsibility for what they offer, particularly when it comes to kids porn. David Cameron believes that Internet companies and search engines should use their extraordinary technical abilities to do more to root out child pornography. As a result, the government keeps convening a round-table of the largest online companies and demands to do more.

In the meanwhile, the backside of the problem is privacy – this is an overgrowing concern in the past several years. The experts admit that because of government collusion with record companies and rights owners to crack down on file-sharing copyrighted content, Internet users had to start using such networks as Tor, which were previously only used by advanced users and people looking for illegal content. So, people targeted by this type of law will do what they can to seek out material.

Among Tor users, there are innocent family people – they use Tor because they just don’t want themselves or family followed around by councils or the police. While the industry experts agree that the problems at hand can’t be ignored, the issue could easily get out of hand, like it happened with P2P.