
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / wanbimsiryy85 / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Wed, 08 Jun 2011 07:10:34 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Attacks on Sony, others show it's open hacking season]]></title>
<link>http://www.haaze.com/story.php?title=attacks-on-sony-others-show-its-open-hacking-season</link>
<comments>http://www.haaze.com/story.php?title=attacks-on-sony-others-show-its-open-hacking-season</comments>
<pubDate>Wed, 08 Jun 2011 07:10:34 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=attacks-on-sony-others-show-its-open-hacking-season</guid>
<description><![CDATA[There seems to be a groundswell of hacking activity recently. From the Epsilon breach that touched dozens of major U.S. companies and their millions of customers, and RSA replacing its customers' SecurID tokens after attacks on several defense contractors to Sony sites getting pummeled by hackers on a regular basis--all within the last few months. What's going on  &quot;I truly don't think there's a higher instance of hacking right now. I think there's been a wave of media coverage,&quot; said Bruce Schneier, chief security technology officer of BT and one of the most respected security experts around. &quot;We saw the same thing with shark attacks. It's not that there are more shark attacks. It's that they made the news when people started looking for them.&quot; No one can really say if there are more attacks happening. Reports indicate that the number of breaches is rising every year, as can be expected. But those statistics are based only on incidents that are reported' there are untold numbers that happen all the time that no one knows about except the attacker and, eventually, the victim.  But it's clear that more attacks are bubbling to the surface lately. And they are various types of attacks, not just the data breaches that expose sensitive consumer personal data and thus trigger state disclosure laws. RSA Take, for example, RSA. The company sells SecurID tokens that are used by corporations, government agencies, and any other organization that needs to provide a way for workers to remotely access a sensitive network securely. SecurIDs are the industry standard for two-factor authentication, requiring users to supply a one-time numerical code from the device along with a password to log in.  RSA shocked the security world when it announced in March that it was victimized by an &quot;extremely sophisticated cyberattack&quot; in which sensitive data related to the SecurID technology had been pilfered and could be used by attackers to get access to networks of RSA customers who rely on the technology. RSA has been mum on the details of what was stolen, but it did hold private briefings with its most important customers, ostensibly to help them shore up their defenses in light of the breach. Despite that, two defense contractors--Lockheed Martin and L-3 Communications--reported attacks on their systems that exploited data stolen from RSA. Another, Northrop Grumman, unexpectedly shut down remote access to its network last month, which led to speculation that it had had a SecurID-related incident. Following news stories about the incidents, which experts speculate may have a tie to China, RSA said this week it would replace SecurIDs for customers concerned about the risks.  Those types of industrial cyber-espionage incidents aren't new, but the successful attack on the security pioneer and technology provider RSA is significant and has broad impact. Companies can move to other solutions, but replacing big security deployments within an organization is not cheap or easy.  Meanwhile, Google said last week it had thwarted an attack aimed at snooping on hundreds of Gmail accounts owned by U.S. and other government officials, journalists, and political activists that appeared to originate in China. (Hotmail and Yahoo accounts also have been targeted in similar attacks, according to Trend Micro.) Google has been more candid and forthcoming than other companies in going public with attacks aimed at it or its customers. The company set a precedent in announcing an espionage-related attack on its network in early 2010 that also targeted what turned out to be about 30 other companies. Cyber-espionage is sexy, but attacks on databases containing customer information are more common for the financially motivated cybercriminals who litter the Internet. We've had a fair share of those recently too, notably Epsilon, an e-mail marketing service provider. In April, a breach at Epsilon turned the formerly obscure company into a household name practically overnight. All of a sudden customers of big companies like Citibank, Chase, Capital One, Walgreens, Target, Best Buy, TiVo, TD Ameritrade, and Verizon got e-mails warning them that their e-mail addresses were exposed in the one data breach.  In a different type of attack in March, hackers targeted companies that provide digital certificates that are used by Web sites to prove they are legitimate. A number of the certificates were fraudulently obtained, which could have allowed attackers to spoof major sites, including Google, Yahoo, Microsoft's Live.com, and Skype. The certificates were stolen from Registration Authority resellers for Comodo. A 21-year-old Iranian patriot took credit for the attacks, saying he did it to protest U.S. policy and as revenge for last year's Stuxnet malware that experts believe was created to shut down Iran's nuclear program. Public whipping boy But the headlines of late have the word &quot;Sony&quot; in them. The company has been victimized so frequently and publicly that one of the hacker groups targeting it came up with a new word--&quot;Sownage&quot;--a play on the company's name and &quot;pwnage,&quot; which stands for &quot;pure ownage&quot; and refers to taking control of a Web site, or &quot;owning&quot; it. &quot;Sony has become, for some reason, the public whipping boy&quot; for hackers, Schneier said. Sony's recent troubles started with a spat over customers hacking itsPlayStation 3 device. After the company took some PS3 &quot;modders&quot;--hackers who modify the device for different users--to court, a loose-knit group of hackers known as Anonymous launched a digital protest and shut down several Sony sites with a distributed denial-of-service (DoS) attack in early April.  Anonymous has a history of online activism, having targeted the sites of the Church of Scientology, the governments of Egypt and Iran, and the controversial Westboro Baptist Church. But the group really made its mark when it championed the cause of whistleblower site WikiLeaks last year. Anonymous organized a series of attacks against PayPal, Visa, MasterCard, and other companies that had stopped enabling contributions to WikiLeaks.  Weeks after the DoS attack, an attacker got into Sony's network and compromised personal data of 77 million PlayStation Network customers, including possibly credit card information, prompting Sony to shut down the network. Less than a week later, Sony announced that data of more than 24 million Sony Entertainment Online customers had also been exposed. Combined, the PSN and SEO breaches are the second-largest in U.S. history, according to the DataLossDB site.  Since then there's been a veritable avalanche of reported attacks on Sony's sites, with Sony Music Indonesia defaced' a phishing site found on a Sony server in Thailand' and records breached on sites in Japan, Greece, Canada, Belgium, the Netherlands, and Russia. About 37,500 customer records from a Sony Pictures site was exposed last week, Sony said today, and there were reports of data leaks related to the Sony Computer Entertainment Developer Network (proprietary code) and Sony BMG. The Attrition.org site has a comprehensive timeline of the attacks on Sony here, which lists the total number of attacks since the Anonymous attack at 17, not including the DoS attack. Meanwhile, the site lists more than 40 older attacks on Sony sites, so clearly attacking Sony is not a new pastime. &quot;The Sony hacks are nothing but pile-on,&quot; said Schneier. &quot;'Let's have more fun at Sony's expense. Ha ha.'&quot; The Sony attacks have spawned attacks on other targets and copycats, including Acer Europe, Sony Europe, Nintendo, and FBI partner Infragard. In a particularly audacious move, members of the LulzSec hacker group harassed one Infragard victim who made the big mistake of using the same password on multiple e-mail accounts and sites. In e-mails and chat messages, LulzSec members bullied the chief executive of a security-related start-up, trying to get money and data out of him. The hacker group, however, claims it was just trying to set up the victim to prove that whitehat hackers who work on the good side of the law aren't any less corruptible than blackhat hackers. When the CEO refused to cooperate, the group went public with his information. LulzSec and other hackers are no doubt taking their cue from the success of Anonymous in its online protests and its new-found high profile. They realize that it's fairly easy to make a splash, particularly with an anti-establishment message. LulzSec has even taken action to show solidarity with WikiLeaks, hacking PBS.org, leaking passwords, and posting a fake news article on the site as punishment for what it said was a biased Frontline program about WikiLeaks.Hacking revival While the RSA, Epsilon, and espionage attacks are truly threatening, some people seem to be enjoying the playfulness of the less destructive, more pranksterish attacks against Sony. These hacks of protest harken back to the days of DoS attacks on Yahoo and eBay and numerous Web site defacements in the 1990s, before e-commerce was so prevalent and organized criminals moved online.  &quot;We are seeing a revival of the sort of hacking we have not seen in many years,&quot; said Marc Maiffret, chief technology officer at eEye Digital Security. &quot;The hacking that has been taking place recently against Sony and others is a reminder that the hacker culture prior to our fixation on cybercrime and 'China is scary' is still alive and well.&quot; &quot;Although large sections of the security community will deny it if you ask them, they're secretly enjoying watching LulzSec's campaign of mayhem unfold,&quot; Patrick Gray wrote on the Risky.Biz blog. &quot;It might be surprising to external observers, but security professionals are also secretly getting a kick out of watching these guys go nuts.&quot;  The Web of 2011 offers a more fulfilling playground for hackers than it did in past decades, not just because the number of targets is so much greater, but the tools of self-expression are more varied and effective. For instance, Twitter offers a perfect platform for publicity, and LulzSec makes use of it, frequently posting information about new hacks, boasts, and threats, as well as solicitations for donations.  &quot;It hasn't been this bad since 2003 when all the worms were hitting, and even then we only had three worms&quot; that targeted Microsoft customers by exploiting holes in Windows, said security researcher Dan Kaminsky. &quot;Now governments are involved, defense contractors are involved, kids with Twitter accounts are involved.&quot; Does this mean the rules of engagement have changed for companies going forward and that they will have to be careful not to anger hackers with a cause &quot;I don't think it's necessarily going to change companies' behavior that much,&quot; said Chris Wysopal, chief technology officer at Veracode. &quot;But I hope it will serve as a lesson to companies that if you have Sony vulnerabilities you're at a huge risk if someone decides to try to publicly flog you.&quot;Updated at 11:30 a.m. PTwith Sony Pictures saying 37,500 customer records were exposed last week.Correction at 10:45 a.m. PT: This story initially misstated the name of the company where Marc Maiffret is CTO. It is eEye Digital Security.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Pandora gets subpoena in grand jury app probe]]></title>
<link>http://www.haaze.com/story.php?title=pandora-gets-subpoena-in-grand-jury-app-probe</link>
<comments>http://www.haaze.com/story.php?title=pandora-gets-subpoena-in-grand-jury-app-probe</comments>
<pubDate>Mon, 04 Apr 2011 07:11:27 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Marketing and advertising</category>
<guid>http://www.haaze.com/story.php?title=pandora-gets-subpoena-in-grand-jury-app-probe</guid>
<description><![CDATA[Online music provider Pandora Media disclosed in a filing to the Securities and Exchange Commission today that it has received a subpoena related to a federal grand jury investigation about sharing customer information in its smartphone app.The company, which filed for an initial public offering with the SEC earlier this year, added the latest tidbit of information regarding the grand jury subpoena to its S-1 today. The disclosure was listed under potential risk factors for investors interested in participating in the IPO. Pandora said in the filing that it believes it is one of several Internet publishing companies with mobile apps to receive the federal grand jury subpoena. The company didn't disclose the location of the grand jury or any other specific information related to the grand jury investigation.&quot;In early 2011, we were served with a subpoena to produce documents in connection with a federal grand jury, which we believe was convened to investigate the information sharing processes of certain popular applications that run on the Apple and Android mobile platforms. While we were informed that we are not a specific target of the investigation, and we believe that similar subpoenas were issued on an industry-wide basis to the publishers of numerous other smartphone applications, we will likely incur legal costs related to compliance with the subpoena, management's attention could be diverted and there is no guarantee that we will avoid costly litigation. Any claims or allegations that we have violated laws and regulations relating to privacy and data security could result in negative publicity and a loss of confidence in us by our listeners and our advertisers, and may subject us to fines by credit card companies and loss of our ability to accept credit and debit card payments.&quot;Several smartphone applications, including Pandora, monitor consumers' behavior to get more information that helps advertisers target individuals. For example, Pandora collects information such as gender, ZIP code, music preferences, and other information contributed to a user's profile to provide more targeted advertising.These applications have recently come under fire as officials question whether these apps violate consumers' privacy. Several civil lawsuits have been filed against application companies, such as Pandora. And Apple, which certifies mobile applications for its App Store that provides mobile applications to theiPhone,iPad, andiPod Touch, has also been named in several class action lawsuits.The subpoena that Pandora disclosed in its filing is an indication that the government is now looking into the case as a criminal matter. The Wall Street Journal reported late Monday that an unnamed source said that federal prosecutors in New Jersey are investigating whether smartphone applications illegally obtain or transmit information about their users without proper disclosures. The newspaper reports that the investigation is looking into whether the application makers disclosed to users that their data was being collected and why that data needed to be collected. Collecting information about a user without proper notice or authorization could violate a federal computer-fraud law, the paper reports. The criminal investigation and class action lawsuits were likely prompted by an article by the Wall Street Journal published in December. In that story, the paper examined 101 mobile applications and found that many were sending information to marketers without the consent of users. The article highlighted privacy concerns and since then class action lawsuits have been filed against Apple and other companies, including Pandora, Paper Toss, Weather Channel, Dictionary.com, Yelp, NPR, and WebMD. Mobile advertising and analytics providers Flurry, Medialets and Pinch Media, have also been named in a lawsuit filed in February in the U.S. District Court for the Northern District of California in San Jose.The lawsuits allege that Apple and the other defendants have violated the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act. In the suit filed in February, the plaintiffs claim these companies had gained unauthorized access to mobile devices Apple, including the iPhone, iPad and iPod Touch to &quot;access, collect, monitor, and remotely store, electronic data,&quot; including the user's unique device identifier (UDID). This is similar to a serial number in that it belongs to each specific iOS device. Furthermore, the suit alleges that Apple is at fault for not making it clear that this information was being passed along to the makers of these apps and services, thus giving the companies an easier way to track user activity. Along with the privacy implications, the lawsuit alleges that the underlying technology, which is transmitting this information elsewhere, is actually slowing devices down. This is something made worse, the plaintiffs say, because said services could not be disabled.Pandora was specifically mentioned in the Wall Street Journal article in December. In that article, the newspaper said it found that the app sends age and gender information to marketers to target advertising.The Mobile Marketing Association, an industry association for marketers, has also begun calling for best practices to be used among its members to help protect consumer privacy. The group has asked marketers and app developers to provide consumers with a more transparent view of the process of how they gather information and what they do with that information. The MMA has also called on more companies join its privacy committee, which sets up certain guidelines for online data collection. The government is also getting involved in the issue. In January, the Federal Trade Commission released a report on online privacy in which it discussed the idea of a &quot;do not track&quot; for the Web policy, similar to the current &quot;do not call&quot; list that bans telemarketers from calling people.A representative from Pandora declined to comment. Apple and Google, which also operates a mobile application store, did not respond to requests for comment.Updated 3:50 p.m. PT:: This story was updated with more background information and updated information from the Wall Street JournalCNET reporter Josh Lowensohn contributed to this report. <br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Windows 8 screenshots reveal ribbon interface]]></title>
<link>http://www.haaze.com/story.php?title=windows-8-screenshots-reveal-ribbon-interface</link>
<comments>http://www.haaze.com/story.php?title=windows-8-screenshots-reveal-ribbon-interface</comments>
<pubDate>Mon, 04 Apr 2011 07:10:36 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=windows-8-screenshots-reveal-ribbon-interface</guid>
<description><![CDATA[Images from a pre-beta version of Windows 8 reveal that Microsoft is apparently expanding its use of the ribbon interface to replace traditional pull-down menus and toolbars.Following Microsoft's release of the latest pre-beta build of Windows 8 to select partners recently, screenshots of certain features in the upcoming OS were allegedly posted online. In particular, images displayed on enthusiast site Within Windows by &quot;Windows 8 Secrets&quot; co-authors Rafael Rivera and Paul Thurrott show the ribbon interface reaching Windows Explorer.Introduced with Office 2007, the ribbon interface has been loved by some and reviled by others. But Microsoft has expanded its use of the ribbon, adding it to such programs as Paint and WordPad inWindows 7. Noting that the ribbon interface in the pre-beta Windows 8 is only half-finished and rather &quot;unattractive,&quot; Rivera and Thurrott suggest that its potential appearance in Explorer may be controversial within Microsoft itself.Beyond showing off the ribbon, the two authors also revealed a new welcome screen in Windows 8, which they say is based on the lock screen inWindows Phone 7. Displaying the date and time and offering a changeable background image, the new screen reportedly will also feature audio controls so people can play and adjust their music even when the screen is locked.Microsoft has supposedly been looking to splash a bit of the Windows Phone 7 Metro UI look and feel onto the next generation of Windows. Beyond just the welcome screen, other alleged images of a recent Windows 8 build show a set-up routine and overall interface that takes a page from the design of the Metro UI, according to enthusiast site WinRumors.Windows 8 could also offer built-in integration with some of Microsoft's Windows Live features. Looking at the screenshots of the new Windows Explorer, enthusiast site Liveside.net spotted one option for Sync, which it believes could refer to Microsoft's cloud-based Windows Live Mesh. Another option called &quot;Web sharing&quot; could point to online storage service Windows Live SkyDrive.Of course, Windows 8 is still at a very early stage in development, so its look, feel, and features are likely to be debated and tweaked within Microsoft before the new OS finally reaches consumers. Microsoft has been generally mum about Windows 8 and hasn't give any clues as to a launch date. However, a blog post on the company's Dutch Web site may have spilled a few beans last October when it stated that Windows 8 was about two years away, putting its release toward the end of 2012.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Google Shopper app hits the iPhone]]></title>
<link>http://www.haaze.com/story.php?title=google-shopper-app-hits-the-iphone</link>
<comments>http://www.haaze.com/story.php?title=google-shopper-app-hits-the-iphone</comments>
<pubDate>Wed, 02 Feb 2011 08:10:08 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=google-shopper-app-hits-the-iphone</guid>
<description><![CDATA[iPhone users can now rely on Google for a helping hand the next time they go shopping.(Credit:Google)The search giant yesterday launched a version of its free Google Shopper app for theiPhone. The app, which has been available for Android users the past year, is essentially a mobile search engine for products, letting you compare prices and read reviews before you open your wallet.The app offers several ways to search for products. You can type the name of the item in the search field. You can snap a photo of a book, CD, DVD, or video game or of a product's barcode. Or you can speak the name of the product.In return, Google Shopper reveals a list of stores, both online and offline, that sell your chosen item along with their respective prices.Tapping on a particular store drills down further where you can read product details, check out customer reviews, and bounce between a list of local retailers and online merchants who offer the item. Drilling down even further to certain retailers, such as Best Buy, the app can check on inventory at your local stores to tell you where you can find the item.The app keeps a history list so you can always return to any past search. You can also mark your favorite products with a gold star, putting them into their own easily accessible category. Finally, you can share the details of any product you find with other people via Facebook, Twitter, or Google Reader, the company's online RSS feeder.Google's description says the app requires iOS 4.0 and is compatible only with the iPhone and the fourth generationiPod Touch.I tried Google Shopper with a variety of products, using text, voice, and photos, and the app performed nicely. It did have trouble at times picking up product barcodes through my iPod Touch 4G, but no problem zeroing in on the front cover of CDs, books, and similar items. Once it found the product, it typically showed me a lengthy list of retail outlets where I could buy it, even tapping into auctions from eBay.Google Shopper is part of a growing list of similar mobile apps that deliver prices, names of retailers, and other details on a wide array of products.Amazon released a Price Check app in November, which like Google Shopper, lets you find products by text, voice, or scanning the front of a product or its barcode. Another app called Scandit helps you track down products by scanning their barcodes. eBay also lets you search for products by scanning their barcodes, both through its own iPhone app and RedLaser, an app it acquired last year.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Comcast to stream live TV to iPad, Android tablets]]></title>
<link>http://www.haaze.com/story.php?title=comcast-to-stream-live-tv-to-ipad-android-tablets</link>
<comments>http://www.haaze.com/story.php?title=comcast-to-stream-live-tv-to-ipad-android-tablets</comments>
<pubDate>Wed, 05 Jan 2011 08:10:06 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=comcast-to-stream-live-tv-to-ipad-android-tablets</guid>
<description><![CDATA[Comcast will allow for in-home streaming of its live and On Demand content to theiPad andAndroid tablets later this year, the company announced today.So far, details on the streaming option are slim. Comcast only revealed that users &quot;will be able to watch live news, TV shows, and movies in their homes whenever they want.&quot; The company didn't say how it will stream content to those devices nor if it will charge an additional fee for the service. It plans to unveil a few more details at the Citigroup Investor Conference later today.In addition to the new streaming service, Comcast announced its plans to update its Xfinity TV offering.For one, the company has initiated plans to roll out its &quot;play now&quot; feature in the next couple weeks, which allows users of its Xfinity TV iPad app, which launched in November, to &quot;watch nearly 3,000 hours of On Demand content, including popular movies and hit TV shows, either in the home or on-the-go.&quot; The service will offer more content &quot;in the weeks and months ahead,&quot; Comcast said.The company's Xfinity TV Web site, which offers access to more than 150,000 pieces of video content, has been updated with the ability for Comcast subscribers to search for programming and change channels on their television from their computers. Users can also program their DVRs from the site.Comcast finds itself in a battle with competitors over delivering content to tablets. Last December, Dish Network offered subscribers the ability to watch live TV and DVR recordings on their iPad with the help of Sling Media's Sling Adapter. Time Warner Cable showed off an iPad app prototype last year that the company hoped, would eventually allow users to watch shows while on-the-go, and finish watching them on their televisions when they returned home.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[LG will launch a smartphone with glasses-free stereoscopic 3D]]></title>
<link>http://www.haaze.com/story.php?title=lg-will-launch-a-smartphone-with-glasses-free-stereoscopic-3d</link>
<comments>http://www.haaze.com/story.php?title=lg-will-launch-a-smartphone-with-glasses-free-stereoscopic-3d</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=lg-will-launch-a-smartphone-with-glasses-free-stereoscopic-3d</guid>
<description><![CDATA[Stereoscopic 3D is the rage in TVs now, with more than half of the new TV models using the technology this year. And now it&amp;'s spreading to smartphones as well. South Korean electronics giant LG announced today it will unveil its LG Optimus 3D smartphone on Feb. 14 at the Mobile World Congress event in Europe.Hollywood is pinning its hopes on 3D as a technology that will revive interest in watching studio fare in theaters. Likewise, smartphone makers like LG see it as an additional feature that might help differentiate their wares in a highly competitive market. But consumer interest in 3D outside the cineplex is far from proven.LG&amp;'s new model will offer a &amp;''full 3D experience&amp;'' to consumers &amp;''right in the palm of their hands,&amp;'' LG said in its breathless but short announcement. The company says it addresses the lack of 3D content &amp;8212' one of the big problems holding back 3D &amp;8212' with a unique experience. The phone will also have a dual-lens camera that can record 3D images as well.The LG phone will not require users to wear clunky 3D glasses to see images in 3D. The phone will also have high-definition multimedia interface connectors so that you can display the 3D images on a bigger screen. LG&amp;'s announcement confirmed leaked images of the 3D phone that were posted last week. I will be interested to see if LG uses technology from MasterImage3D, which showed off good-quality 3D technology at the Consumer Electronics Show.So far, glasses-free 3D on a TV is a bust. It just doesn&amp;'t look that good. But it&amp;'s not as hard to make good-quality 3D imagery on a small smartphone screen. The question remains whether people really want to watch 3D on a tiny screen. Nintendo will launch its glasses-free 3D game handheld, the 3DS, in March. I think Nintendo&amp;'s device will have a lot of good games. But I&amp;'m not convinced that LG and other phone makers will know how to create compelling 3D for smartphone users.[image: Phandroid]Previous Story: StackMob duct tapes typical add-ons onto mobile apps until Apple and Google do itPrintEmailTwitterFacebookGoogle BuzzLinkedIn      DiggStumbleUponRedditDeliciousGoogleMore&amp;8230'          Tags: 3D smartphone, 3D TV, glasses-free 3DCompanies: Lg, MasterImage3D          Tags: 3D smartphone, 3D TV, glasses-free 3DCompanies: Lg, MasterImage3DDean is lead writer for GamesBeat at VentureBeat. He covers video games, security, chips and a variety of other subjects. Dean previously worked at the San Jose Mercury News, the Wall Street Journal, the Red Herring, the Los Angeles Times, the Orange County Register and the Dallas Times Herald. He is the author of two books, Opening the Xbox and the Xbox 360 Uncloaked. Follow him on Twitter at @deantak, and follow VentureBeat on Twitter at @venturebeat. Have news to share Launching a startup Email: tips@venturebeat.comVentureBeat has new weekly email newsletters.  Stay on top of the news, and don't miss a beat.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Building guru Schneider woos homeowners to energy savings]]></title>
<link>http://www.haaze.com/story.php?title=building-guru-schneider-woos-homeowners-to-energy-savings</link>
<comments>http://www.haaze.com/story.php?title=building-guru-schneider-woos-homeowners-to-energy-savings</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=building-guru-schneider-woos-homeowners-to-energy-savings</guid>
<description><![CDATA[Top global building controls and energy management company Schneider Electric launched an energy-reducing program today targeting residential consumers.Specifically, the offering is in demand response, which was a hot area last year. Demand response is program in which utilities can offer financial incentives for customers who turn down energy usage during critical or peak load times, usually during the day. The rollout of the smart grid has enabled such opportunities for companies like Schneider.The move is indicative of an industry-wide shift towards home energy management offerings.a4AThe residential electric market accounts for approximately 21 percent of total electric usage globally,a4said Don Rickey, senior vice president of energy business at Schneider. a4AThere is a huge needfor active energy management by consumers, and it does not have to be a complex process.The company&amp;'s move into the residential energy management and demand response territory also reflects a trend in cleantech. While much of the focus in energy efficiency to date has focused on lighting and building controls in commercial buildings, more and more companies are launching offerings aimed at the average consumer. Today, Intel showed off a residential demand response offering that uses its home energy dashboard. Earlier this month, Control4 and Silver Spring Networks teamed up for a demand response offering, nabbing a deal with utility American Electric Power. And EnergyHub and Vivent &amp;8212' the rebranded name of top home security company APX Alarm &amp;8212' also announced new offerings in home energy management.Demand response is asector that got hot last year with entrants like Honeywell, Lockheed Martin, Tendril, Siemens and Silver Spring Networks. Residential demand response is also now heating up, although some argue it willquickly become a commodity.Schneider&amp;'s offering, the Wiser Energy Management System, includes a smart thermostat (pictured, above, on wall) and in-home display (pictured below). The idea is that by making easy-to-use hardware that&amp;'s affordably priced, Schneider can win over a critical mass of consumers to opt into demand response to make such a rollout appealing to historically conservative utilities.For example, homeowners can automate their hot water heaters to turn on in time for their morning showers, then be off the rest of the time. Or they can opt to shut off their air conditioning during the workday. But one of the initial struggles met by home energy management offerings has been how to engage consumers who, by and large, have never actively managed their electricity use.&amp;''Fundamentally, to get buy-in from homeowners we believe there needs to be a very big component of homeowner empowerment in this,&amp;'' said Gary Kuzkin, a product manager for Schneider&amp;'s residential energy unit. The in-home display, for example, is designed with a digital clock on the front and has a colored backlight that shifts colors &amp;8212' say from blue to red &amp;8212' to reflect energy usage or a peak time when a resident could realize savings by scaling back on energy use.&amp;''The goal of the device is to get you to look at the thing reasonably often,&amp;'' Kuzkin said.&amp;''Consumers are probably pretty far behind with education, and utilities are helping quickly provide the incentives for consumers to be involved in energy management,&amp;'' said Mike Matthews, a business development manager in Schneider&amp;'s residential energy efficiency unit. &amp;''The return (f0r customers) is very quick as long as you engage it.&amp;''The company is currently rolling out the program in a smart grid pilot of 60,000 homes in Naperville, Ill.Next Story: Educator marketplace TeachersPayTeachers pays out over $1M for lesson plans Previous Story: On the GreenBeat: Comverge, Intel, expand home energy, Mitsubishi to make 8 electric cars by 2015PrintEmailTwitterFacebookGoogle BuzzLinkedIn      DiggStumbleUponRedditDeliciousGoogleMore&amp;8230'          Tags: demand response, home energy managementCompanies: APX Alarm, EnergyHub, honeywell, Intel, Lockheed Martin, Schneider Electric, siemens, Silver Spring Networks, Tendril, ViventPeople: Gary Kuzkin, Mike Matthews          Tags: demand response, home energy managementCompanies: APX Alarm, EnergyHub, honeywell, Intel, Lockheed Martin, Schneider Electric, siemens, Silver Spring Networks, Tendril, ViventPeople: Gary Kuzkin, Mike MatthewsIris Kuo is the VentureBeat's lead GreenBeat writer. She has reported for The Wall Street Journal in Hong Kong, Houston Chronicle, the McClatchy Washington Bureau and Dallas public radio. Iris attended the University of Texas at Dallas and lives in Houston. Follow Iris on Twitter @thestatuskuo (and yes, that's how you  pronounce her last name). Have news to share Launching a startup Email: tips@venturebeat.comVentureBeat has new weekly email newsletters.  Stay on top of the news, and don't miss a beat.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[XXX sites win web domain approval]]></title>
<link>http://www.haaze.com/story.php?title=xxx-sites-win-web-domain-approval</link>
<comments>http://www.haaze.com/story.php?title=xxx-sites-win-web-domain-approval</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>wanbimsiryy85</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=xxx-sites-win-web-domain-approval</guid>
<description><![CDATA[The internet&amp;'s governing body has approved the new .xxx domain for porn web sites.After a decade-long review process, the board of the Internet Corporation for Assigned Names and Numbers (ICANN) decided to grant final approval for the domain proposal for the porn industry. The whole affair shed light on both the politics and technology behind starting new domain names.At its annual meeting in San Francisco today, ICANN voted 9-3 to approve the domain, which allows web sites to end their web addresses in .xxx, rather than .com or .biz.The .xxx web sites will likely start appearing in the coming months. Sometime in the fall, a big land rush will take place for companies applying for .xxx domain names. The domain name application was originally submitted by Stuart Lawley, chief executive of ICM Registry, who said he wants consumers to make safe and secure transactions on .xxx sites. Lawley proposed the .xxx domain names in 2004, and he plans to make money selling domain names. A number of national governments, including the U.S., opposed the creation of the domains.Adult sites won&amp;'t be forced to use the new domain. The Free Speech Coalition, which represents some of the adult industry, opposed the domain name on the grounds that it would raise costs for porn providers. The domain names cost $60 each, and the porn sites will have to register a lot of them to keep their brands from being hijacked. The FSC said the new domain would make it easier for filters to block adult sites and that it would appeal the decision to an advisory board consisting of government representatives.Lawley said he has received requests to reserve more than 200,000 domain names. Here&amp;'s a partial chronology of the whole process.Next Story: A startup scribe goes native Previous Story: Does Googlea4a4s Larry Page care about social networkingPrintEmailTwitterFacebookGoogle BuzzLinkedIn      DiggStumbleUponRedditDeliciousGoogleMore&amp;8230'          Tags: porn, xxxCompanies: ICM RegistryPeople: Stuart Lawley          Tags: porn, xxxCompanies: ICM RegistryPeople: Stuart LawleyDean is lead writer for GamesBeat at VentureBeat. He covers video games, security, chips and a variety of other subjects. Dean previously worked at the San Jose Mercury News, the Wall Street Journal, the Red Herring, the Los Angeles Times, the Orange County Register and the Dallas Times Herald. He is the author of two books, Opening the Xbox and the Xbox 360 Uncloaked. Follow him on Twitter at @deantak, and follow VentureBeat on Twitter at @venturebeat. Have news to share Launching a startup Email: tips@venturebeat.comVentureBeat has new weekly email newsletters.  Stay on top of the news, and don't miss a beat.<br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
