
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / webmyne / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Mon, 11 Apr 2011 07:10:31 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Could criminals shop for free online]]></title>
<link>http://www.haaze.com/story.php?title=could-criminals-shop-for-free-online</link>
<comments>http://www.haaze.com/story.php?title=could-criminals-shop-for-free-online</comments>
<pubDate>Mon, 11 Apr 2011 07:10:31 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=could-criminals-shop-for-free-online</guid>
<description><![CDATA[A group of security researchers say they have found ways to trick online cashier systems into ordering items for free or at a discount.  Researchers from Indiana University and Microsoft Research found security holes in a software development kit from payment hosting provider Amazon Payments, Rui Wang, a Ph.D. student at Indiana University, told CNET in a recent interview. Amazon fixed the problems after being notified by the researchers, and integration bugs found in merchant shopping-cart applications and implementations on several retail sites have also been fixed. The software they examined contained &quot;logic flaws that can be exploited to cause inconsistencies between the states of the CaaS (Cashier-as-a-Service) and the merchant,&quot; and allow someone to game the systems, according to a paper co-authored by Rui, University of Indiana Associate Professor XiaoFeng Wang, and the others. The paper, entitled &quot;How to Shop for Free Online,&quot; is scheduled to be presented at the IEEE Symposium on Security and Privacy in May.  Basically, the situation boils down to a shopper being able to give conflicting messages to the merchant and the cashier or payment system.  &quot;Suppose there is a naughty kid, and the only way of communication between the kid, the mom, and the dad is through one-on-one phone calls,&quot; Rui wrote in an e-mail. &quot;The kid may tell slightly different stories to the mom and the dad, and eventually gets an approval that he does not deserve. It all depends on whether mom and dad are smart and careful enough.&quot;  Specifically, exploiting the multiple-party system in this manner could allow a shopper to swap items after payment is made, reuse previous payment proof for a new item, pay himself or herself to get valid proof of payment to fool the merchant, self-sign a proof of payment, or add more items to the cart while the cashier is processing the payment, Rui said.  &quot;We discovered a real flaw where the merchant is convinced that the order has been paid for in full through Amazon while the payment has actually been made to the shopper's own Amazon seller account,&quot; the paper said.  The researchers have some booty as a result of their antics. They were able to get for free a power strip, a device for testing blood-alcohol levels, and a magazine. They set their own price for a DVD, paying $5 below the actual price, and paid less for a more expensive bodybuilding cream. &quot;Everything in the store could be checked out at the price of the cheapest item,&quot; Rui said.  The researchers consulted closely with a lawyer and conducted the tests in a responsible manner, informing the companies involved and in many cases returning the items, the report said.  An Amazon representative said the company had no comment on the matter. The company said in an e-mail sent to Rui that it had fixed the problem the researchers found, published a new software development kit, and given credit to the researchers for finding the problem. <br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Chrome beta hits v.10, Chrome dev hits v.11]]></title>
<link>http://www.haaze.com/story.php?title=chrome-beta-hits-v-10-chrome-dev-hits-v-11</link>
<comments>http://www.haaze.com/story.php?title=chrome-beta-hits-v-10-chrome-dev-hits-v-11</comments>
<pubDate>Fri, 18 Feb 2011 08:10:39 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=chrome-beta-hits-v-10-chrome-dev-hits-v-11</guid>
<description><![CDATA[Chrome speeds up its V8 JavaScript engine with the Crankshaft version in Chrome 10.(Credit:Google)Google released two new versions of Chrome yesterday, version 10 for beta users and version 11 for developers willing to put up with more instability.With Google's six-week update schedule, the new releases are milestones that Chrome users pass--often not necessarily noticing given the software's silent auto-update mechanism. But there are significant new features coming with the new beta.Top on Google's list is faster JavaScript with the &quot;Crankshaft&quot; version of the new V8 JavaScript engine. JavaScript runs increasingly sophisticated Web-based applications such as Google Docs, and this highly competitive aspect of browser performance has become even more so with the &quot;Chakra&quot; engine in the forthcoming IE9 from Microsoft.Crankshaft leaps ahead 65 percent on Google's own V8 benchmark suite. Note, though, that faster JavaScript is only one aspect of overall browser performance, and that other benchmarks such as Mozilla's Kraken can yield different results. Also in Chrome 10 (Windows | Mac | Linux) is hardware-accelerated video, which can increase computing efficiency and spare battery life' settings controls that move from a pop-up dialog box to a browser tab' and password synchronization among different installations of Chrome (though not, as withFirefox, with Chrome on Android).Google isn't talking much yet about its Chrome 11 (Windows | Mac | Linux) plans, but it looks like one interesting feature on the way is &quot;chromoting,&quot; which lets a Chrome browser remotely take over another machine over a network. It's not unlike LogMeIn or other remote desktop applications, but those can't be installed on a Chrome OS machine, so chromoting gives a browser-based mechanism. That, in turn, would let Chrome OS in effect remotely run some native software that wouldn't run on a Chrome OS machine.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Why you should consider a 14-inch laptop]]></title>
<link>http://www.haaze.com/story.php?title=why-you-should-consider-a-14-inch-laptop</link>
<comments>http://www.haaze.com/story.php?title=why-you-should-consider-a-14-inch-laptop</comments>
<pubDate>Thu, 03 Feb 2011 08:10:42 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=why-you-should-consider-a-14-inch-laptop</guid>
<description><![CDATA[Despite all the (virtual) ink we spend on hip 11- and 13-inch laptops, the bulk of laptops sold are still in the midsize category. For most consumers, that means a 15.6-inch display, but we consider any laptop with a 14-, 15-, or 16-inch screen to be part of that midsize category. These are the laptops you're most likely going to find sitting on an office desk, in a den, or in a dorm room. We've even seen our fair share of them wedged into airplane seats and in coffee shops, as awkward as that always looks. Rounding up our favorite 14-inch laptops (photos) If you're set on a midsize laptop, one piece of advice we've offered for the past couple of years is to consider a 14-inch system rather than a more common 15-inch one. While you're trading away a little bit of screen size (but not any screen resolution), we've consistently found that 14-inch midsize laptops offer better overall industrial design, specifically because the standard laptop keyboard fits much better in a 14-inch chassis than a 15-inch one, leaving much less dead space on either side. And, by shaving off a little size and weight, these 14-inch models are easier to carry around--which is important, as we've seen many commuters struggling under the weight of oversize laptops. Though they make up only a small percentage of the laptops we review, we've put together a handy list of some of the better 14-inch laptops from the past several months. Note that the latest Intel Sandy Bridge versions of these (or similar) systems are still a ways out, especially as this week's widely reported Sandy Bridge design problems are likely to delay second-gen Core i-series laptops even further. But for general interest computing, these current models will be more than fine, and you shouldn't worry about waiting if you have an immediate need for a new laptop. <br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Canon camera encryption cracked]]></title>
<link>http://www.haaze.com/story.php?title=canon-camera-encryption-cracked</link>
<comments>http://www.haaze.com/story.php?title=canon-camera-encryption-cracked</comments>
<pubDate>Fri, 10 Dec 2010 08:18:19 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=canon-camera-encryption-cracked</guid>
<description><![CDATA[The triumphant moment when the Russians landed on the moon No, a doctored photo from Elcomsoft illustrating how it cracked Canon technology to detect photo tampering.(Credit:Elcomsoft)Stalin invented the iPhone One falsified image from ElcomSoft the company says fools Canon&amp;39's tamper-detection technology.(Credit:Elcomsoft)There's a new reason to take note of a Russian programmer who rose to modest fame with his detainment in the United States in 2001: his work to help crack encryption used in Canon cameras.The programmer and encryption expert is Dmitry Sklyarov, and his company, Elcomsoft, has found a vulnerability in Canon's OSK-E3 system for ensuring that photos such as those used in police evidence-gathering haven't been tampered with.The result is that the company can create doctored photos that the technology thinks are authentic. To illustrate its point, it released a few doctored photos that it says passes the Canon integrity checks.&quot;The vulnerability discovered by ElcomSoft questions the authenticity of all Canon signed photographic evidence and published photos and effectively proves the entire Canon Original Data Security system useless,&quot; the company said in a statement. Sklyarov presented the findings at the Confidence 2.0 conference last week.Canon didn't immediately respond to a request for comment.Sklyarov discussed his methods in a conference presentation (PDF). In it, he offered some advice on how Canon could fix the issue in future cameras. Along with the technical advice was this: &quot;Hire people who really understand security.&quot;Wait, which country gave the Statue of Liberty to the U.S. as a present Another doctored Elcomsoft image.(Credit:Elcomsoft)Sklyarov's earlier fame came when the FBI arrested him after presenting information about cracking encryption of an Adobe Systems eBook electronic book format. He was charged with criminal violations of the Digital Millennium Copyright Act (DMCA). Adobe backed off from its support of the case after programmer protests, though, and Sklyarov was acquitted.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[The Phone Call Is&nbsp'Dead]]></title>
<link>http://www.haaze.com/story.php?title=the-phone-call-isnbspdead</link>
<comments>http://www.haaze.com/story.php?title=the-phone-call-isnbspdead</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=the-phone-call-isnbspdead</guid>
<description><![CDATA[photo a4s 2008 mike | more info (via: Wylio) In the tech industry saying that something is dead actually means &amp;''It&amp;'s on the decline.&amp;'' And yes, the phone call is on an inexorable decline.My original title for this post was &amp;''The Phone Call Will Be Dead In __ Years&amp;'' but since consumer inertia is somehow still keeping our parent company Aol in the dialup business, a4sI thought it might be prudent not to include an ETA on the death of the call.Less obsolete but more annoying than a handwritten letter, the phone call is fading as a mode of communication even if the nostalgic will be singing its praises for awhile. We reached a breaking point ina4s2008 when text messaging topped mobile phone calling in usage, and we&amp;'ve been living in a world dominated by text based communication ever since (Thanks Twitter).If old media has taught us anything, it&amp;'s that it takes most industries at least a generation to be completely disrupted, especially something as powerful as Big Telco.But we are definitely on our way there. According to Nielsen data, voice usage has been dropping in every age group except for those past the of age of 54. Text is just easier.&amp;''Now, 78 percent of teens recognize the functionality and convenience of SMS, considering it easier (22 percent) and faster (20 percent) than voice calls (though still fun). Voice activity has decreased 14 percent among teens, who average 646 minutes talking on the phone per month.&amp;''Interest in voice calling is nowa4ssharply differentiated by age, and few technological advancements have ever survived while failing to capture the interest of 22 year olds.Mike likes to rub it in MG&amp;'s face that the iPhone can&amp;'t actually make calls due to terrible AT&amp;amp'T reception, but the truth is that we iPhone users (and to greater extent smartphone users in general) are not primarily using our phones to make calls. We may carry around things we call &amp;''phones&amp;'' but to us they&amp;'re just pocket-sized computers.MG&amp;'s response to Mike,a4s&amp;''It doesna4a4t need to. I use the phone mostly for apps and browsing, not calls.&amp;'' On background: MG is in his 20s and Mike is in his 40s. As if we needed more proof, MobileCrunch editor Greg Kumparak&amp;'s AT&amp;amp'T phone bill is indicative of the voice habits of an entire generation.Sorry Telcom industry, we are increasingly provided with reasons to not use your voice services. While still not exactly mainstream, we now have access to a plethora of free, internet-based calling options like Google Voice. When I&amp;'m interviewing startups and ask to &amp;''get on a call&amp;'' they usually direct me to their Skype usernames.When I do cold call someone for information (and am more often than not directed to an automated message) companies send back their responses via email. And I have countless times declared a fatwa on PR people who think it&amp;'s cool to cold call me, especially before 9 am.It&amp;'s not just job related calls that are annoying. The other day somebody from my bank called me to talk about my 401K. Fair enough. The problem is I wasn&amp;'t exactly expecting the call as I only get 3 or 4 a week now. And I picked up right as I was trying to write a post breaking news (One thing a phone call does signify is EMERGENCY). I ended up mumbling something rude and hanging up on the person. I still don&amp;'t even know what a 401K is even though I&amp;'m sure I&amp;'ll eventually get around to Googling it.The saddest thing is that since I became a millionaire in the TC/Aol sale (not) it really is about time I started to do stuff with my money other then pray that I&amp;'ll still have a paycheck tomorrow. That phone call might have actually provided me with useful information had its unabashed interruption not been so abhorrent.Ideally, here&amp;'s how that interaction should have gone down: Chase Bank should have sent me an EMAIL about the fact that they noticed I had more money in my account, with a link directing me to my 401K option plan. There I could decide BY READING and not listening to some customer service rep&amp;'s scripted drivel on what plan was right for me. Now, as it stands, I&amp;'ve got a random phone number in my Stickies that I will never call back. I won&amp;'t give a second thought to my 401K until I&amp;'m up late at night surfing the Internet and find out it&amp;'s like important five years from now.What&amp;'s maybe sadder than the 401K episode is what this phone call generational schism means for people who are older than you. Much like Mike thinks his mom is silly for using chain emails to get in touch, I dread the inevitable Sunday phone calls from relatives that I have to return lest they think I&amp;'m dead. a4sI wish they would just @reply me on Twitter or something. Instead I&amp;'ve now got 18+ voicemails I have no desire to deal with.Maybe I should start making people write me handwritten lettersCrunchBase InformationResearch In MotioniPhoneAndroidInformation provided by CrunchBase<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Badgeville raises $2.5M to spread game mechanics across the web]]></title>
<link>http://www.haaze.com/story.php?title=badgeville-raises-2-5m-to-spread-game-mechanics-across-the-web</link>
<comments>http://www.haaze.com/story.php?title=badgeville-raises-2-5m-to-spread-game-mechanics-across-the-web</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=badgeville-raises-2-5m-to-spread-game-mechanics-across-the-web</guid>
<description><![CDATA[Badgeville, a white-label platform for publishers looking to integrate social rewards into their websites, announced today that it has raised a $2.5 million round.The startup offers widgets and APIs topublishers looking to add game mechanics such as badges and rewards to their sites. Publishers can add existing widgets or create a more personalized experience through working with Badgeville&amp;'s APIs to reward visitors for performing various actions on their site &amp;8212' for example, leaving a comment.CEO Kris Duggan says offering social rewards helps increase reader engagement and build a community. a4AIta4a4s not about pageviews anymore,a4 he told us when we spoke to him in September, also mentioning that the company is on track to reach $1 million in revenue by the end of this year.Since launching at theTechCrunch Disrupt conference in September where it won the audience choice award, Badgeville has garnered an impressive amount of traction. It has partnered with publishers such as Comcast Sports, TechCrunch, Philly.com, The Next Web, and Blackbook.Its competitors include BigDoor, which raised $5.47 million last month.Previously, Badgeville raised $250,000 as part of an angel round. Investors in this first institutional round include senior executives from eBay, Paypal, Chegg, Shopping.com, Drugstore.com, Palantir, and Warner Music.Previous Story: Paula Abdul takes a crack at startups with a way to find fame on the InternetPrintEmailTwitterFacebookGoogle BuzzLinkedIn      DiggStumbleUponRedditDeliciousGoogleMore&amp;8230'          Tags: APIs, badges, Game mechanics, rewards, Social rewards, whitelabelCompanies: Badgeville, BigDoorPeople: Kris Duggan          Tags: APIs, badges, Game mechanics, rewards, Social rewards, whitelabelCompanies: Badgeville, BigDoorPeople: Kris DugganSid Yadav is a contributor to VentureBeat. He currently studies computer science and psychology at the University of Auckland in New Zealand. He is also the creator of Memiary, a micro-diary utility. You can reach him at sidyadav@gmail.com (all story pitches should also be sent to tips@venturebeat.com), and on Twitter at @sidyadav.VentureBeat has new weekly email newsletters.  Stay on top of the news, and don't miss a beat.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Announcing The Winners Of The 2010 TechFellow&nbsp'Awards]]></title>
<link>http://www.haaze.com/story.php?title=announcing-the-winners-of-the-2010-techfellownbspawards</link>
<comments>http://www.haaze.com/story.php?title=announcing-the-winners-of-the-2010-techfellownbspawards</comments>
<pubDate>Mon, 30 Nov -001 00:00:00 +0000</pubDate>
<dc:creator>webmyne</dc:creator>
<category>Latest News</category>
<guid>http://www.haaze.com/story.php?title=announcing-the-winners-of-the-2010-techfellownbspawards</guid>
<description><![CDATA[Tonight in San Francisco, many of the Valley&amp;'s stars are coming together for the second annual TechFellow Awards, a fellowship designed to help recognize some of the most accomplished leaders in technology a4&quot; and to help foster further innovation by granting them $100,000 to invest in startups.The awards program, which TechCrunch co-hosts along with Founders Fund, has been expanded this year to include New Enterprise Associates. Together, Founders Fund and NEA will grant each TechFellow $100,000 to invest in a start-up of their choice, which more than doubles how much each winner is being granted.  The fund structure has also been adjusted to allow each TechFellow to share in the success of all 2010 TechFellow companies. Last yeara4a4s TechFellows helped fund and found fFlick, Bidfire, Quora, Flipboard, HipChat and others (you can see a list of last year&amp;'s winners here).The awards this evening were broken into four categories, encompassing Engineering Leadership, Product Design and Marketing, General Management, and Disruptive Innovation.  Below is a listing of the winners by category.Disruptive InnovationThis category is meant to highlight the visionaries, the starry-eyed fools who believe when no one else will. They are undaunted when told NO by stern parents, when told it WONa4a4T WORK by a thousand dismissive VCs, when failure after failure would dash the hopes of lesser mortals. These are the men and women whose incredible ideas burst forth like Athena from their foreheads, and they know what it means to make Fire, the Wheel, and the Printing Press.Omar HamouiDavid FriedbergJeff LawsonPaul GrahamJack DorseyEngineering LeadershipEngineering Leadership candidates are people who have demonstrated technical excellence, built amazing technology infrastructure and products, or led teams that together built complex and elegant solutions that changed our lives. They are the uber geeks who calculate 10-digit squares in their heads, and write a thousand bug-free lines of code on the fly without skipping a beat.Tom ConradChristophe BiscigliaSep KamvarRoss FubiniJoseph SmarrProduct Design and Marketing Product Design and Marketing candidates are people who have designed insanely great products, who have made technology beautiful, who have created the marketing campaign that blows you away and make you want to go out and buy ten of them for your whole family. These are the storytellers, the artists, the people who make our dreams come alive.Aaron SittigMatt MullenwegKhoi VinhCourtney HoltDave MorinGeneral ManagementGeneral Management candidates are people who have built the teams and organizations that create and deliver great technology and products to the world. They are company builders who provide foundations and processes for all the rest of the geeks and dreamers to make their dreams reality. They are the folks who wake up at 6am and open the doors, make the donuts, play reveille, and lead the charge to take the hill. They make it *happen*.Neil RosemanPatrick ChiangDave SchneiderSebastien de HalleuxMaria ThomasAaron Patzer<br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
