Offline video, background playback, and music/audio only are features that are relatively trivial and are frequently implemented by third party YouTube players.
It seems they are launching this in a poor way by even including these as "features."
The best the US administration can hope for here is to shatter the US software industry into a thousand small associated companies with strict data sharing agreements to handle overseas data. Worst case they slowly succeed at destroying any ability to run a US business that handles overseas customer information.
What is the goal here? There is no way that demanding that kind of access will be sustainable (short of all out secrecy which has obviously failed in this instance.)
SoyChemist writes: The physics of moving droplets of water around in the channels of a microfluidics chip is tricky. Even simple tasks, like merging two drops, required a lot of problem solving. At the International Conference on Bioengineering and Nanotechnology at the Biopolis in Singapore, Professor David Wietz explained how his research group at Harvard tackled those problems. Prototype devices can sort, combine, and split drops so fast that they are rated in kilohertz. In that sense, the rapid evolution of microfluidics technology feels like the dawn of personal computing all over again. It kinda looks like it too. The many videos that he showed during his presentation bore a funny resemblance to classic video games like Pac Man and Bubble Bobble.
LiquidCoooled writes: The New York Times have recently begun offering an exact digital replica of the daily newspaper. However to get a look at this nifty sounding site, you must signup and leave your credit card details. The only thing which concerns me is the following:
Page Headline: Free: Try The New York Times Electronic Edition For 7 Days
Clause lower down: The first charge will be on the 5th day of your 7-day free trial.
My question then, how do I get a free 7 day trial?
ancientribe writes: As if you need another reason not to use WiFi unprotected, here's one: a researcher has released a tool that lets hackers "sidejack" your machine and access your Web accounts. Called Hamster, the tool basically clones the victim's cookies by sniffing their session IDs and controlling their Website accounts.
PatPending writes: MOSCOW — Two small manned Russian submarines completed a voyage of 2 1/2 miles to the Arctic shelf below the North Pole Thursday, planting a titanium capsule on the Arctic Ocean floor to symbolically claim what could be vast energy reserves beneath the seabed. The dive was part serious scientific expedition and part political theater. But it could mark the start of a fierce legal scramble for control of the sea bed among nations that border the Arctic, including Russia, the U.S., Canada, Norway and Denmark, through its territory Greenland.
not5150 writes: "Using Gmail or most other webmail programs over an unsecured access points just got a bit more dangerous. At Black Hat, Robert Graham, CEO of errata security, showed how to capture and clone session cookies. He even hijacked a shocked attendee's Gmail account in the middle of his Black Hat speech."
Ryan N. Kamfolt - ClickAway writes: "Apple may begin implementing software in its I-Tunes suite to track serial numbers of I-Pods and compare them to a stolen I-Pod database. Due to the worlds most successful and popular product being on the #1 most stolen items list. This may alert the local police to come knocking on your door, if "Your" I-Pod is in question. Weather it be stolen or legit, people are not taking this to heart kindly at all. With the right to privacy walls closing in on us ever so fast, this seems to be another push to take our privacy rights away even more, or is it? Those who have had their I-Pods stolen love the idea. Others are not so happy about the idea. Some privacy right advocates have suggested implementing I-Pods or I-Phones with owner ID verification, such as a password or other forms of verification that must be entered into the devices before they will take a charge or allow you to place songs on the device. Or offer a service that is apart of Apple iCare, which allows users who feel they may become a victim of theft, to join this database, to further protect them in the even their I-Pod is stolen."
from the who-wants-to-drink-from-the-firehose dept.
Logged in users have noticed for some time the request to drink from the Slashdot Firehose. Well now we're ready to start having everybody test it out. It's partially a collaborative news system, partially a redesigned & dynamic next-generation Slashdot index. It's got a lot of really cool features, and a lot of equally annoying new problems for us to find and fix for the next few weeks. I've attached a rough draft of the FAQ to the end of this article. A quick read of it will probably answer most questions from how it works, what all the color codes mean, to what we intend to do with it.
hate-those-telemarketers writes: I just had one of those telemarketers call me despite being on the do-not-call list. There's still organizations that don't need to adhere to that list. Having googled the caller-id I came accross http://www.whocalled.us/ that seems to be a very comprehensive database of annoying caller-id's calling. What's even better is that in the "about" tab there's a script for asterisk to check all calls against that database.
This is like a IP-list for spammers only for real telephony. Fantastic. I've implemented this and now I wish I weren't on the do-not-call list to see telemarketers deal with the very annoying Telemarket torture script that can be found on this site: http://www.voip-info.org/wiki/view/Asterisk+Telema rketer+Torture
coondoggie writes: "If you signed up for the federal or your state's Do Not Call Registry a few years ago, you might want to thing about refreshing it. Pennsylvanians this week got a wake up call, so to speak from the state's Attorney General Tom Corbett who kicked off a public awareness campaign designed to remind people what many have forgotten or never knew — that the 2002 law set registrations to expire after five years. That is of course unless you want to start hearing from those telemarketers as you sit down to dinner. Corbett said about 2 million people signed up in the immediate aftermath of the law taking effect and those who do not act by Sept. 15 will have their numbers dropped from the registry on Nov. 1. The Pennsylvania action is a reminder that the National Do Not Call Registry has a five year life span as well. The Federal Trade Commission is set to being a nation campaign in Spring 2008 to remind all US citizens to refresh their federal Do Not Call Registry standing.
Bandor Mia writes: Last November, it was reported that UCLA cops Tasered a student, who forgot to bring his ID, at the UCLA library. While an internal probe by UCLAPD cleared the officers of any wrongdoing, an outside probe by Police Assessment Resource Center has found that the police actions on Mostafa Tabatabainejad were indeed out of UCLA policy. The probe was conducted at the behest of acting UCLA Chancellor Norman Abrams.
From the report: "In light of UCLAPD's general use of force policy and its specific policies on pain compliance techniques, Officer 2's three applications of the Taser, taken together, were out of policy. Officer 2 did not take advantage of other options and opportunities reasonably available to de-escalate the situation without the use of the Taser. Reasonable campus police officers, upon assessing the circumstances, likely would have embraced different choices and options that appear likely to have been more consistent both with UCLAPD policy and general best law enforcement practices."