Free Ebooks For 2011 Download Free Ebooks written for 2011 right now all with master resale rights! These 24 free ebooks come at absolutely no cost to you! And you can resell them and keep all of the money! Just take a look at the list of included Free Ebooks below!
WiFi Usage In Smartphones Increase While Tablets Trump TV
Smartphone owners may be getting ready for all carriers to switch to tiered data plans like Verizon, as the June report from Millenial Media indicates. Wi-Fi usage on smartphones showed an 8 percent growth over the previous month for getting online while mobile. A new study segment that tracks how tablet usage impacts existing activities for owners shows that a full 19 percent of tablet owners report they watch less TV than before getting the tablet.
Apple is still the number one smartphone in Millenial Media’s report with over 30 percent of the impression share and Samsung retains the second position with 14.94 percent of impressions served to phones from that vendor. RIM is number three and HTC owns the number four spot. The only surprising number in this month’s reports is that Samsung’s Nexus S moved into the fourth position on the top 20 list, taking the second most popular spot on the list of Android handsets.
This month’s report from Millenial includes a new segment that follows tablet owners and how buying one impacts behavior. Analysts have been claiming that tablet purchases impact PC purchases, so this study of tablet owners is particularly interesting. Nearly a third of tablet owners admit that they have shifted some common online activities from other devices to the tablet. They also admit that in addition to replacing an eReader, for 19 percent of them the tablet sees them watching less TV than they did before getting the tablet. These slates may be having a greater impact on user behavior than previously thought.
Cyber Attacks Could Prompt Military Strike
“Recent cyber attacks against the US could prompt a war effort against the attackers”
The Pentagon has confirmed that a cyber attack against computer networks in the United States could prompt a retaliatory military strike.
“It would be irresponsible, and a failure of the Defense Department’s mission, to leave the nation vulnerable to a known threat,” Deputy Defense Secretary William Lynn explained during a recent briefing about the DoD’s new cyber strategy.
“[As such], the United States reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing.”
However, Lynn said the DoD’s cyber strategy ultimately emphasized “denying the benefit of [an] attack.”
“If an attack will not have its intended effect, those who wish us harm will have less reason to target us in the first place,” Lynn said.
He noted that any response to a cyber offensive would be “dictated by the effect,” rather than location.
Concurrently, the president would “consider all the tools he has” if the attack caused significant damage – such as human casualties and massive economic losses.
Meanwhile, James Lewis, a senior fellow at the Center for Strategy and International Studies, told Politico it’s the president “who gets to decide” if the cyber strike is a war or “something else.”
“The standard is ambiguous. Deciding when something is an act of war is not automatic. It’s always a judgment,” he added.
Police Depts Deploying iPhone-Based Iris, Face Scanning Tech – Police State Technology
Ever Think Of America As A Police State? Now You Can! Congrats To Technology
License, registration, and iris scan? Police departments have fingerprinting and in many cases, DNA, to help them identify or track down criminal suspects, but usually that requires a trip down to the station. On the streets, more and more police departments are deploying a smartphone-based iris- and facial-scanning technology that slides over an iPhone.
Massachusetts-based BI2 Technologies is now producing MORIS, a handheld biometric device that can recognize people based on iris, face, or fingerprints. The Brockton, Mass. police department was the first to try out the technology during a 2010 trial, and it is now expanding to departments like Arizona’s Pinal County Sheriff’s Office and the Rhode Island Department of Corrections.
The technology can be used at the station, but for officers on the move, MORIS slides over an iPhone and allows them to use the device’s camera and run photos through iris-scanning and facial-recognition software. A fingerprint option is on the back of the somewhat bulky device, but the department apparently had mixed results with that. If there’s a match—based on the BI2-managed database of criminal records—the officer can see the person’s full criminal history on the iPhone.
As the Wall Street Journal noted, deputies are using the tech to identify people without ID, accident victims, or the homeless. Legally, they can do so without permission, but in Pinellas County, Fla., at least, it’s department policy to ask for consent, county systems analyst Scott McCallum told the Journal.
The devices cost $3,000 each and weigh 12.5 ounces once added to the iPhone, the Journal said. In Brockton, the devices were funded by a Department of Justice and National Sheriff’s Association grant to the Massachusetts Sheriff’s Association.
Welcome To America – The Police State
So the next time you are pulled over and interrogated by a local police officer for running a stop sign and you get treated like a common criminal, thank George Bush! This post Patriot Act America is nothing more than a Police State. And it disgusts me.
Brand New Android App Market Launched
Google Launches It’s New Android App Market For Android Users.
After its own storefront for finding Android apps has fallen by the wayside, Google is fighting back.
The online giant has just released a new version of the Android Market, the digital marketplace within Android phones that lets users search through the more than 100,000 apps and games available for the platform.
“You’ll be delighted to find we’ve overhauled Android Market to make it faster, easier, and more fun to discover great apps, movies, and books. We’ve created more space to feature some of the most interesting content of the week on the home page. We’ve added more top charts, with newer, more relevant items, and we’ve made it easy to swipe through these charts as you browse the store. We’ve also introduced new collections of great content, like staff picks and Editors’ Choice apps,” explained Google in an official blog post.
This comes after users have continuously expressed dissatisfaction with the presentation of previous versions of the Android Market. Despite being the leader in online search, Google had created a surprisingly clunky interface in which to search for Android apps, leading third-party app stores to swoop in and take away some of the glory.
For example, Amazon has its own digital storefront for Android apps called the Amazon Appstore. In addition to using the same intuitive search algorithms and recommendations as the rest of Amazon.com, the retailer has managed to convince numerous mobile publishers to release their apps exclusively through the Amazon Appstore, bypassing the Android Market entirely.
So Google has a lot of catching up to do to remain relevant in its own mobile platform, but this completely redesigned Android Market app – available for Android 2.2 and later – may be up for the task.
Check Out The Video: Brand New Android App Market Launched
Netflix Rate Hike Sparks Outrage – Users Resort To Social Media To Voice Opinions
Netflix continues to take a pummeling from subscribers who are so enraged by the company’s unilateral decision to separate its DVD and streaming plans − and increase prices as a result − that they’re threatening not only to cancel the service, but also showing up by the tens of thousands to blast it on Facebook.
Users Threaten To Drop Netflix After Massive Netflix Rate Hike
Yesterday, we reported on the initial reaction to the Netflix Rate Hike changes, and by last night we’d seen more than 9,000 comments on the Netflix Facebook page, which has 1.5 million fans. (There are 23 million Netflix members in the U.S. and Canada.) By this morning, nearly 30,000 had registered the summer of their discontent with the rental service that used to ride high on the loyalty of customers who loved not having to pay late fees and receiving their discs in their mailbox. The red envelope was something of a little treat at the end of a long day.
But now, customers are seeing a different kind of red.
For many, Netflix’s streaming selection, while growing and improving since it became a perk about four years ago, still can’t get anywhere near its vast volume of DVDs. And because of that, folks supplemented their streaming plans with at least the one DVD out at any given time option, for about $10.
But with the announcement that the same service would cost almost $16 — about 60 percent more than what they’re paying now — people snapped. In these tough economic times, this little bit of entertainment counted for a lot. And now, subscribers are demanding to be heard. We want to hear from you, too. Take our poll and let us know if you’re going to follow through with threats to leave Netflix, or if you’ve decided against it.
We’re wondering if people have followed through on cancelling, if Netflix will increase its instant selection to make up for those who will cut DVDs from their plans and if Netflix will cave to the torrent of negative reaction and restore its merged plans. We also want to know if Netflix deleted comments from its Facebook page, as some have indicated on the site. Some complained that they didn’t even get the courtesy of an email and only found out through sites like ours, or on their Facebook.
So you are wondering how to activate your new Apple iPad or iPad 2? Like the 1st generation iPad, the iPad 2 will need to be activated using the same simple process. This can be done in just a few minutes and you’ll need an Apple iTunes account to get the job done with either of the iPads.
Steps To Take
1.) Create an Apple iTunes Account
2.) Connect the Apple iPad to your PC
3.) Once you add your iTunes account information along with your name and device serial number, you’ll be activated.
If you are upgrading from the 1st iPad to the iPad 2, you just need to connect your old iPad to your PC first. Then do a full backup (data sync) of your 1st generation iPad (do the backup before you activate your new iPad).
When your backup is complete, just connect your new iPad 2 to your PC and then do a backup restore after activation. Now all of your data is transferred to your iPad 2 from your old one. Your done!
Android Software Sought After By Microsoft
In the hunt for the next billion-dollar business, Microsoft may have discovered one in mobile software. It costs Microsoft nothing to produce and sell, and it’s not Windows Phone.
It’s Android, the wildly popular — and free — mobile-phone software made by competitor Google.
In the past nine months, Microsoft has gone after a handful of companies that make Android phones and tablets.
It has either sued or persuaded the companies to pay it license fees for some technologies found in certain Android features. Microsoft contends it has patents on those technologies.
Four companies in the past two weeks said they will pay licensing fees to Microsoft for selling tablets and phones that run on Android.
HTC, a major Taiwanese smartphone maker, entered into a licensing agreement in April to pay Microsoft a reported $5 per Android phone
Modern Warfare 3 Release Date nears. Learn what’s inside the latest version.
In a small, dark room hidden away in the Los Angeles Convention Center, Call of Duty: Modern Warfare 3 executive producer Mark Rubin pilots a SEAL delivery vehicle through a web of sunken cars and floating corpses.
A massive enemy submarine passes overhead. This is his target. He slowly approaches the craft, plants an explosive and retreats to a safe distance. Boom. Rubin rises alongside the ailing sub, surfacing to see a New York City skyline under assault.
This is the beginning of “Hunter Killer,” a Modern Warfare 3 campaign level shown behind closed doors at the E3 Expo earlier this month. The presentation started out with some unique moments — in 2009’s Modern Warfare 2, such underwater segments weren’t player-controlled — but quickly reverted to familiar territory.
The 20-minute demo was full of high-octane gunplay and flashy explosions, but there was no hiding the fact that Modern Warfare 3 is the same old Call of Duty wrapped up with a shiny new bow.
Modern Warfare 3 development began at Infinity Ward, but after much of the company’s creative talent jumped ship to Respawn Entertainment, Activision brought on internal development group Sledgehammer Games as backup. With such an upheaval in the development process, it seems the two teams have decided to play it safe rather than roll the dice on any risky new concepts.
Nearly every moment in the demo was ripped straight out of an earlier Call of Duty title: Progress through highly linear environments, watch a scripted event, kill a few bad guys. Later in the level, after blowing up the submarine’s command center door with a few pounds of C4, players engage in a slow-motion firefight with the guards. You may remember these action sequences from Modern Warfare 2. They play precisely the same here.
Apples iCloud Service Expects 150 Million Users
Apples iCloud service expecting a huge following right out of the gate. Apples iCloud service could sign up as many as 150 million iPhone users to its new iCloud service, according to projections based on a survey from RBC Capital Markets.
In a report released today, RBC found that 76 percent of the 1,500 iPhone users polled from June 7 to 14 intend to use the iCloud service. Unveiled at Apple’s Worldwide Developers Conference earlier this month, iCloud will allow iOS device users to store, access, and sync their iTunes content online.
iMessage also should be a hot item, according to RBC. The survey found 73 percent of iPhone users plan to use Apple’s upcoming new text messaging service, which RBC projects might mean 150 million iMessage users in total.
The iMessage service, a feature in iOS 5, could boost loyalty among existing iPhone users and convince the 60 million iPod Touch users to pick the iPhone over Android or other competing phones if they upgrade, according to the report.
Finally, iTunes Match proved enticing to 30 percent of those surveyed, who said they’d be likely to spend $24.99 per year for the new service. Part of iCloud, iTunes Match lets users store any music not purchased or available through iTunes in the cloud. Based on the survey, RBC is projecting that iTunes Match could add another $1.5 billion a year to Apple’s annual revenue.
Looking down the road, RBC believes Apple will add additional services through iCloud, including audio and video streaming, photo and video sharing, hosted Time Machine backups, and document management and storage. The iCloud service will be accessible from all iOS devices and possibly even entry-level items like the iPod Nano and Shuffle, the report said.
LulzSec Hacking Group Ring Leader Arrested In Britain after investigations from a global hacking spree. Some websites hacked by the LulzSec Hacking Group were Sony’s PSN, Sega Game Pass, Sony Entertainment, Sony Europe and an Atlanta FBI affiliate to name only a few.
British law enforcement have arrested a 19-year-old man described as a ring leader of the hacktivist gang LulzSec, according to this news story in The Guardian.
The group’s website, lulzsecurity.com, remains accessible. But the Internet Relay Chat channel where much of its member-to-member communications took place has been knocked off line. That development supports the notion the Cleary may have been the administrator for the chat channel, and that his arrest is significant, according to Ars Technica.
The upstart group has declared war on big government and giant corporations, bedeviling the likes of Sony, PBS, Nintendo, the CIA and the British census bureau in recent weeks.
Sega Reports Hacking And Sega Pass Compromised
Sega reports hacking of their famous Sega Pass network. Information on about 1.3 million customers accounts have been compromised.
LulzSec seeks revenge after the hacking free-for-all as Sega becomes the latest victim in such hacking and cyber-attacks…
The hacking free-for-all continued this week as Sega apparently became the latest victim of a network breach and none other than hacking group LulzSec offered to help the game company by taking down the responsible parties.
The blog PlayStation LifeStyle posted yesterday what it said was a letter sent by Sega to users of its Sega Pass service, informing them that “unauthorized entry was gained” to the Sega Pass database and that the company is investigating.
Make your own music without any musical experience required whatsoever! Make your own music without knowing a thing about music or mixing, chords, notes, melodies or sheet music! Become your own dj using a brand new service that has just launched called UJam.com
Reports show that mobile data usage has risen since the 1st quarter of 2010, though the fees of mobile data usage has declined drastically. Below is a detailed report snapshot that clearly depicts trends in both mobile data usage, and the costs thereof over the past several months.
The smartphone data “tsunami” in the United States continues, with users consuming more data than ever before; the amount of megabytes “consumed by the average smartphone owner” has gone up 89 percent since last year, according to The Nielsen Co.
Google publishes the estimated location of millions of iPhones, laptops, and other devices with Wi-Fi connections, a practice that represents the latest twist in a series of revelations this year about wireless devices and privacy, CNET has learned.
Android phones with location services enabled regularly beam the unique hardware IDs of nearby Wi-Fi devices back to Google, a similar practice followed by Microsoft, Apple, and Skyhook Wireless as part of each company’s effort to map the street addresses of access points and routers around the globe. That benefits users by helping their mobile devices determine locations faster than they could with GPS alone.
Only Google and Skyhook Wireless, however, make their location databases linking hardware IDs to street addresses publicly available on the Internet, which raises novel privacy concerns when the IDs they’re tracking are mobile. If someone knows your hardware ID, he may be able to find a physical address that the companies associate with you–even if you never intended it to become public.
Have you ever felt so angry at a company that you wished its website was hacked to shreds, but you didn’t have the technical expertise required? Here comes LulzSec to the rescue. The marauding hackers, with their huge and growing list of conquests — including PBS, the FBI and the U.S. Senate, pornography and gaming sites, and most of all, Sony — opened a hack request line during their latest merry jaunt, Titanic Takeover Tuesday.
Titanic Takeover Tuesday saw the disruption of the websites for The Escapist and the IT security company Finfisher, as well as the login servers for EVE Online, Minecraft and League of Legends. Afterward, the group posted a telephone number on its Twitter feed with this message:
“Now accepting calls from true lulz fans – let’s all laugh together at butthurt gamers. 614-LULZSEC, accepting as many as we can, let’s roll.”
A few hours later the group claimed to have received 5,000 missed calls and 2,500 voicemails. The 614 area code represents the metropolitan area of Columbus, Ohio, but only an irresponsible gambler would wager that that’ll help authorities locate members of LulzSec in the slightest.
It’s unsure whether the phone number will be used for future hacks or if its purpose has been spent. Either way, posting a number where anonymous users can recommend future victims of the group’s illegal activity is a brazen move. LulzSec is begging to get busted, but also, in a perverse way, “giving back” to a community that enjoys seeing the flaws of big companies exposed. The ironic twist is that these big companies are made big by the average public whose private information is being revealed in the hacks.
The fund declined to disclose the nature of the attack, whether its systems were infiltrated or whether any confidential information had been compromised. The extent of any infiltration remains unclear.
“We had an incident,” said IMF spokesman David Hawley. “We’re investigating it and the fund is completely functional.” He said IMF staff received a “routine notification” about the incident by email Wednesday asking them to contact their tech department “if they saw anything suspicious.”
The threat against the institution is the latest in a recent series as it responds to economic turmoil in several European nations. Earlier this month, the IMF said it had taken precautions after a group called Anonymous indicated its hackers would target the IMF website in response to the strict austerity measures in its rescue package for Greece.
The IMF has faced repeated cyber attacks in recent years. It routinely collects sensitive information about the financial conditions of its 187 member nations. Some data in its computer systems could conceivably be used to influence or trade currencies, bonds and other financial instruments in markets around the world.
The latest infiltration was sophisticated in that it involved significant reconnaissance prior to the attack, and code written specifically to penetrate the IMF, said Tom Kellermann, a former cybersecurity specialist at the World Bank who has been tracking the incident.
“This isn’t malware you’ve seen before,” he said, making it that much more difficult to detect. The concern, Kellermann said, is that hackers designed their attack to gain market-moving insider information.
The attackers appeared to have broad access to IMF systems, which would give them visibility into IMF plans, particularly as it relates to bailing out the economies of countries on shaky financial footing, Kellermann said.
The IMF spokesman would not comment on any specific details of the incident, which was first reported Saturday by the New York Times…..
iCloud Communications is asking Apple to stop using iCloud and destroy “all labels, signs, prints, insignia, letterhead, brochures, business cards, invoices and any other written or recorded material or advertisements” that use its name. In addition the complaint calls for “all profits, gains and advantages obtained from Apple’s unlawfulconduct” and “all monetary damages sustained and to be sustained… including lost profits and reasonable royalties.”
In other words, the company wants a lot of cash from what it says is the largest tech company in the world.
iCloud Communications attempts to boost its case by alleging that this isn’t the first time Apple has infringed upon others’ trademarks.
“Although Apple aggressively protects its trademark rights, Apple has a long and well known history of knowingly and willfully treading on the trademark rights of others — a history which began as early as the 1970s when Apple was first sued for trademark infringement by the Beatles record label, Apple Corp.”
The documents also mentions other trademark debacles Apple had in the past with McIntosh Labs, Management and Computer Services (MACS), the “Mighty Mouse” cartoon character, iPhone, iPad and iAd.
If the past is any indication of how this case will turn out, Apple and iCloud Communications will likely settle out of court. After all, Apple is still using all the names from those other cases…….
All About The “Apps Experience”
The glaring feature of Apple’s much-vaunted iCloud announcement? It doesn’t have much to do with the cloud. At least, not in the usual Google sense of doing everything via the browser with no local storage or apps.
In Apple’s world, apps still need to reign supreme, or it risks falling well behind its more cloud-aware rivals, so iCloud is all about enhancing the apps experience by using the cloud for a vast array of synchronization and content management functions.
This makes perfect sense for Apple, even if the hijacking of the “cloud” term may ruffle feathers among those who really do seek the triumph of the browser, with all the content and services accessed remotely from devices that are increasingly stripped-down – Google’s Chromebooks are, in their purest form, little more than browser appliances with a layer of Linux underneath Chrome