|TITLE:||GUEST & TITLE: Darren Kitchen, Len Peralta, Shannon Morse, Justin Robert Young|
|Stories subject to change up until showtime|
|DK||This is the Daily Tech News for Friday August 21st, I'm Darren Kitchen|
|Shannon Morse & Justin Robert Young are here!|
Shocker: Many Spotify users were upset, and launched of a wave of Tweets threatening to cancel the service.
Spotify CEO Daniel Ek quickly apologized in a blog post, and explained "If you don’t want to share this kind of information, you don’t have to" and Spotify will "ask for your express permission before accessing any of this data and...will only use it for specific purposes that will allow you to customize your Spotify experience."
Ek also explained that the partner sharing was not new, and since some Spotify users sign up through their mobile carrier, some information sharing was necessary. He reassured users that information transmitted to marketers and others is always de-indentified.
|DK||CNET reports Samsung will give iPhone users the chance to test drive a new Galaxy S6 Edge+ OR a Galaxy Note 5 with a free data plan for 30 days. |
The program is for iPhone users only, and works with the subscriber’s current wireless carrier.
Included in the box that delivers the Samsung phone is a smart switch cable to let you move your photos, apps and music onto the new device.
iPhone users who are interested in taking advantage of Samsung's offer, must register using their iPhone's Web browser at promo.samsungpromotions.com
The cost for the trial is $1.
|Jury||New Android powered phones will soon arrive with less Google bloatware. |
According to androidcentral.com, the rule change means that Google Play Games, Google Play Books, Google+, Google Newsstand, Google Earth and Google Keep are no longer part of the mandatory package of installs for phone makers who want to include the most popular apps like the Google Play Store or Gmail.
All the apps are still available for download in the Google Play store. Sadly, this change does not apply to carrier-installed bloatware.
|SM||Ars Technica has a bone to pick with the three Windows 10 updates released so far. |
Each of the updates has contained both security fixes and non-security fixes.
According to Ars Technica, the security fixes have been well described, but descriptions of those non-security fixes are a little thin. For example: "This update includes improvements to enhance the functionality of Windows 10" doesn't do ALL that much to tell you WHAT update you're getting, and HOW they update functionality.
A Microsoft representative told The Register that while the company may perform "additional promotion" of new features depending on their significance, there is "no intention of providing full release notes."
|DK||Reuters got a look at a recent presentation intended for Uber investors. |
The ride-sharing company has projected its global bookings will rise to $10.84 billion dollars this year -- that's three times greater than last year's bookings.
In 2016, bookings are projected to increase to 26.13 billion dollars. Uber currently operates in more than 50 countries, and was last valued by investors at $50 billion dollars - the most for a privately held technology firm worldwide.
|JuRY||Ars Technica reports that The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when current cryptography will be rendered obsolete by quantum computing. |
Quantum computers have capabilities not found in current computers -- like the ability to instantly finding prime factors in large numbers, or to compute discrete logarithm mod primes and discrete logs over elliptic curves. These are the mathematical computations used by current cryptography to secure data.
The NSA updated their advisory suggesting users rely on the same regimen of algorithms and key sizes that have already been recommended, while officials figure out quantum-computing secure crypto algorithms.
The advisory is significant because it signals the growing recognition that quantum computing could soon represent a practical threat on US national security.
|DK||Engadget reports that MIT unveiled a new 3-D printing method that uses transparent glass instead of plastic. |
The new method is called 3-D-G-P (3 guesses what that stands for) and allows the user to modulate light transmission, reflection and refraction qualities of the glass by varying the thickness of the print.
This is probably not something that's showing up in a home-based model anything soon, as it uses a pair of heated chambers and of them has to heat up to 1900-degree Farenheight.
The MIT team believes that the method could eventually lead to better quality and less expensive fiber optics.
|SM||AND NOW THE NEWS FROM YOU|
|SM||yaniv05 and starfuryzeta sent us the Engadget reports Chatroulette users stumbled across a live streaming First Person Shooter style game created by UK production team Realm Pictures. |
To play, users talked the hero character through the scenes, giving commands like "Run! Run, fat boy, run!", "Go for the head shot!" or "Check what's in that pot!"
The "game" was replete with sound effects, blood and guns, including a "rhino turret" and rocket launcher. The team released a making-of video and said they spent about $1450 making the game. The main actor wore a motorcycle helmet with a GoPro camera, light and Teradek HDMI transmitter.
30 extras from a nearby town played the zombies.
|DK||KAPT_Kipper sent us the news that Google has presented a paper at the Association for Computing Machinery's SIGCOMM 2015 conference in London detailing how it scales its network. |
According to the Wall Street Journal, the presentation outlines how Google custo- developed software defined networking architecture as a cheaper and less hands-on alternative to hardware network switches while providing more flexibility on scaling.
Software defined networking is a paradigm in computer networking that allows a logically centralized software program to control the behavior of an entire network.
|JuRY||And finally, SPSheridan sent us some ho-hum, no big deal news from space.com. Turns out physicists at the Autonomous University in Barcelona, Spain have crafted a something similar to a wormhole. |
A wormhole as you of course know was theorized in 1935 by Albert Einstein and Nathan Rosen as a bridge that could link two different points in space-time.
Essentially the scientists created a device that sends a magnetic field on a journey from one point in space to another point, through a path that is magnetically invisible. Study co-author Jordi Prat-Camps said "From a magnetic point of view, this device acts like a wormhole, as if the magnetic field was transferred through an extra special dimension."
No truth to the rumor that if you put your ear very close to the device you can hear Matthew McConnauchey yelling MURRRRRRRRPH and weeping.
|HEADLINES OUT Sound|
|jj||Jennie launches w/ the content warning for the one guy who listens w/ his kid|
|Justin|| 1. What's the difference between the AM hack and other high profile hacks? (Think Sony, Target, OPM) |
2. Are IP addresses places? Are email addresses people?
3. In the real world there's no expectation of privacy in public, but the web is made up of private networks. What's the expectation of privacy online?
4. Much has been made about the size of the hack. How big is it? How much of it is relevant data? Is there anything else not user data related that's been revealed?
5. Can I take a nap now?
|The mind-bending messiness of the Ashley Madison data dump||www.theverge.com/2015/8/19/9178855/ashley-madison-data-breach-implications|
|Yesterday's second data dump||http://www.forbes.com/sites/lisabrownlee/2015/08/20/second-new-alleged-ashley-madison-data-dump-confirmed/|
|Here’s why the Dark Web just got a lot darker||http://www.computerworld.com/article/2973958/emerging-technology/here-s-why-the-dark-web-just-got-a-lot-darker.html||x23:40,25:10bk|
|JJ||Pick of the day:|
Adam in No-One-Actually-Calls-It-Hotlanta has our pick of the day
I just wanted to pass on a tip, more than a pick. My tip is to pay attention to any emails you get saying ApplePay has been added to your credit card.
This happened to me yesterday. Unfortunately, several phone calls to Capital One didn't help and I had to resort to Twitter to get someone at Capital One to check into it, but turns out my account WAS stolen.
Someone got my CC number & attached it to ApplePay, then tried to use Apple Pay at Walgreens for $800. Luckily it was declined.
But little tip: pay attention to those emails saying ApplePay was added to your account.
Thanks again and I love the show, Tom. I appreciate the daily bit of great listening content you provide for my hour-long commute.
|Send your picks to feedbackatdailytechnewsshow.com and you can find Tom's picks at||http://www.dailytechnewsshow.com/picks/|
|jj||Messages of the day (firstname.lastname@example.org)|
|jj||Kenny Brooks wrote in:|
Hi Justin and DTNS gang,
While I agree with the journalistic argument against the Right to Forget and a government intervention to that effect, I disagree with the harshness of the criticism.
We are becoming increasingly aware of the consequences of technology and the easily accessible (due to both amount of online content and improvement of online search algorithms) archive of what happens in people's lives.
It could be either a bad life choice such as stealing, or something silly like an immature video or photo or a blog post (or critical response referencing your blog post) that may no longer even correlate with your beliefs.
This becomes more serious if it is a case of someone making a gain, while you live with the consequence of potentially negative opinions of you from content you can't control.
As such, I can understand why a government would feel a need to intervene on behalf of people.
I can wholeheartedly agree that the concept of government enforcement is not the best way to fix this, but I felt the outrage and strong criticism lacked consideration of someone who could potentially need a law in their favor to help them fight a media company or blogger because they're missing out on career opportunities because of some stupid jokingly misogynistic video they made sophomore year of college that pops up when you search their name.
As always. Love what you guys do and I hope you can understand a POV from someone who wouldn't know how to fight such a situation on their own.
|And Vernon Vincent from Springfield, IL wrote in to second that emotion, and we had a nice email back and forth about it, |
saying "Make no mistake - government intervention is about the worst of possible options. The Dispair.com poster sums it up perfectly - ""Government: If you think the problems we create are bad, you should see our solutions."" But in the absence of government - what can an average person do? Forget the people gaming the system to remove legitimate news - what about the normal guy who just wants a chance to get out from a cloud and make a life again?
As implemented, the Right to be Forgotten pretty bad. As mentioned, people many times take advantage of it in bad faith. But the concept behind it: that a person shouldn't have to suffer continually for mistakes that, in another era, would otherwise be forgotten or forgiven over the course of time - is a valid one.
Thanks for taking my email. I very much enjoy the show, present discussion excepted.
|jj||SHOW LEN ART|
|jj||Thanks to Darren, Shannon & Justin for their excellent commentary, [PLUG ALL THE THINGS]|
and thanks to ALL our DTNS contributors who chipped in this week. And of course extra special thanks to Roger Chang and Bryce Castillo for their hard work this week!
|PLUGS ALL AROUND|
|jj||AD 5,036 patrons, $16,100.63||http://www.dailytechnewsshow.com/support|
|THEME SONG Sound|
|JuRY||Our email address is email@example.com! Call us (512) 59 - DAILY (593-2459) and Listen to the show live M-F at 4:30 PM eastern at player.alphageekradio.com visit our website dailytechnewsshow.com.||http://www.reddit.com/r/dailytechnewsshow/|
|jj||Tom is BACK on Monday with Ms. Veronica Belmont|
|END OF SHOW|
|Great show everybody! What should we call it?|
|Did you see?|
|Stay tuned for [ ] immediately following [ ]|