SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
Pinterest

 Get Pinning!



http://pinterest.com/search/?q=Caldecott
Pinterest & Libraries




http://pinterest.com/kristalibrarian/girls-on- re-hot-reads/
Pinterest Infographics . . . & Infographics




http://mashable.com/2012/01/29/pinterest-retail-infographic/
http://www.schrockguide.net/infographics-as-an-assessment.html
Pinterest Statistics




https://www.google.com/adplanner/planning/site_pro le?
hl=en#siteDetails?uid=d%252Bpinterest.com&geo=001&lp=true
Pinterest Statistics




https://www.google.com/adplanner/planning/site_pro le?
hl=en#siteDetails?uid=d%252Bpinterest.com&geo=001&lp=true
Google Changes Privacy Settings,
           Combines Information from Gmail, YouTube, etc.




            Instead of 60 policies for different services
                and features, now there’s just one.
                       Oh, and by the way...



http://www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt-
out/2012/01/24/gIQArgJHOQ_print.html
http://www.youtube.com/watch?feature=player_embedded&v=KGghlPmebCY
Google Sidesteps Safari Cookie Settings




                   1st-party versus 3rd-party cookies:
                   It’s about being there.


http://marketingland.com/google-didnt-track-iphones-but-it-did-bypass-
safaris-privacy-settings-6247
Google Sidesteps Internet Explorer
         Cookie Settings


         Windows Internet Explorer Engineering Team Blog:
         By default, IE blocks third-party cookies unless the site presents a
         P3P Compact Policy Statement indicating how the site will use the
         cookie and that the site’s use does not include tracking the user.
         ...
         For example, here is the P3P Compact Policy (CP) statement from
         Microsoft.com:
         P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA
         PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
         ...
         Technically, Google utilizes a nuance in the P3P speci cation that
         has the effect of bypassing user preferences about cookies.




http://blogs.msdn.com/b/ie/archive/2012/02/20/google-bypassing-user-
privacy-settings.aspx
ReDigi: Marketplace for used MP3s




http://www.wired.com/threatlevel/2012/02/pre-owned-music-lawsuit-2/
https://www.redigi.com/buy.html
Social Media Boosts “Downton Abbey”




Olivia Wong, Senior Account Executive, National
Marketing at WGBH Educational Foundation:
The real moment when we crossed over from a
cult hit to a main-stream phenomenon was when
we began to see celebrity devotee comments and
all the fan mash-ups and tributes online. It
suddenly went to another level.


http://www.lostremote.com/2012/02/16/how-social-media-helped-turn-
downton-abbey-into-hit-pbs-show/
Penguin Unfriends Overdrive




                              +

                         Not Enough Friction
                                                                         =
                                                                                  
                            And Friction = Security in Sales


http://www.thedigitalshift.com/2012/02/ebooks/penguin-group-terminating-its-contract-with-overdrive/
http://americanlibrariesmagazine.org/e-content/ebook-talks-details
http://www.libraries.wright.edu/noshelfrequired/2012/02/09/articles-of-interest-penguin-overdrive-and-libraries/
Talking To Patrons About Penguin




http://librarianinblack.net/librarianinblack/2012/02/ebooksign.html
Are Ebooks Trapping Libraries?

  Nate Hill (The PLA Blog):
  While I’m troubled by the many difficulties public
  libraries have lending ebooks, I’ve been focusing
  instead on the many examples of public libraries
  reconsidering their mission and becoming creative
  hubs for their communities.

  There is a great opportunity there. The 20th century
  library was a monument to knowledge consumption,
  the 21st century library has the opportunity to devote
  half of its resources back to knowledge production.

http://www.thedigitalshift.com/2012/02/ebooks/penguin-group-terminating-its-contract-with-overdrive/#comment-11143
http://plablog.org/
Pew Finds Leap In E-Reader/Tablet Ownership




http://pewinternet.org/Reports/2012/E-readers-and-tablets/Findings.aspx
Apple iBooks Author




Announced January 19
http://www.apple.com/ibooks-author/
Apple iBooks Author: Widgets




http://www.apple.com/ibooks-author/
iBooks Author
 ‣ Free Software (Mac-only)
 ‣ McGraw-Hill, Pearson Education,
    & Houghton Mifflin Harcourt
 ‣ Maximum Textbook Price:
                                                               ê
    $14.99
 ‣ Full-featured for iPad only
 ‣ Full-featured sold through
    iBookstore only
 ‣ Apple gets 30% cut
 ‣ No EPUB import/export                                       
http://www.apple.com/education/ibooks-textbooks/
http://www.tuaw.com/2012/01/19/ibooks-author-under-the-hood/
Apple iBooks Author: The EULA




      Chamber Four:

      “...You can’t sell the books you make
      with iBooks Author through any
      distributor except Apple.”

http://www.zdnet.com/blog/bott/apples-mind-bogglingly-greedy-and-evil-license-agreement/4360
http://chamberfour.com/2012/01/20/relax-the-ibooks-author-eula-is-not-nearly-that-bad/
Apple iBooks Author: The Revised EULA




http://512pixels.net/apple-updates-ibooks-eula/
Inkling: Reinventing Textbooks




http://www.inkling.com/blog/textbooks-rede ned/
Inkling: Reinventing the Publishing “Habitat”




http://www.youtube.com/watch?feature=player_embedded&v=z5bborgjHF4
Morgue File - Stock Image Resource




http://www.morgue le.com/
Don’t Mess with GPS


                 ✓ Have 4G wireless broadband idea
                 ✓ Buy spectrum
                 ✓ Get shut down by the F.C.C.




http://www.nytimes.com/2012/02/15/business/media/fcc-bars-airwave-use-for-broadband-plan.html?_r=1
http://arstechnica.com/tech-policy/news/2012/02/why-lightsquared-failed.ars
Flaw in SSL Security Found(?)





                                          •   2 random (large) primes, (p) & (q)
                                          •   (p)*(q)=(n)

                                         •
                                          •
                                          •
                                              Content is encrypted with (n)
                                              & decrypted with (p) & (q)
                                              If a (p) is discovered,
                                              can calculate (q) from (n) ������

            Nadia Heninger, Security researcher at Princeton:




http://www.nytimes.com/2012/02/15/technology/researchers- nd- aw-in-an-online-encryption-method.html
http://dankaminsky.com/2012/02/17/primalfear/
https://freedom-to-tinker.com/blog/nadiah
iOS “Path” App & Address Book Privacy




http://mclov.in/2012/02/08/path-uploads-your-entire-address-book-to-
their-servers.html
Everything Is A Remix: System Failure




http://www.everythingisaremix.info/

Más contenido relacionado

La actualidad más candente

Discover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, LoveDiscover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, Love
Anthony Molaro
 
Ubiquitous Information Architecture - OZ IA 2010
Ubiquitous Information Architecture - OZ IA 2010Ubiquitous Information Architecture - OZ IA 2010
Ubiquitous Information Architecture - OZ IA 2010
Samantha Starmer
 

La actualidad más candente (19)

Likemindsjj
LikemindsjjLikemindsjj
Likemindsjj
 
Like Minds February 2010 Keynote
Like Minds February 2010 KeynoteLike Minds February 2010 Keynote
Like Minds February 2010 Keynote
 
Fluency for Free!
Fluency for Free!Fluency for Free!
Fluency for Free!
 
Internet 4 Educators
Internet 4 EducatorsInternet 4 Educators
Internet 4 Educators
 
BlackBerry 10 Rises
BlackBerry 10 RisesBlackBerry 10 Rises
BlackBerry 10 Rises
 
Suit up, bring extra oxygen Internet space explorers needed.
Suit up, bring extra oxygen Internet space explorers needed.Suit up, bring extra oxygen Internet space explorers needed.
Suit up, bring extra oxygen Internet space explorers needed.
 
Social Media Confusion? How to Choose the Right Network
Social Media Confusion? How to Choose the Right NetworkSocial Media Confusion? How to Choose the Right Network
Social Media Confusion? How to Choose the Right Network
 
A Digital Toolkit for Years 5 to 8 teachers - July 2010
A Digital Toolkit for Years 5 to 8 teachers - July 2010A Digital Toolkit for Years 5 to 8 teachers - July 2010
A Digital Toolkit for Years 5 to 8 teachers - July 2010
 
Discover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, LoveDiscover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, Love
 
Gamify Entertainment
Gamify EntertainmentGamify Entertainment
Gamify Entertainment
 
Exploring Web 2
Exploring Web 2Exploring Web 2
Exploring Web 2
 
Kdp tech tools for teachers
Kdp tech tools for teachersKdp tech tools for teachers
Kdp tech tools for teachers
 
Ubiquitous Information Architecture - OZ IA 2010
Ubiquitous Information Architecture - OZ IA 2010Ubiquitous Information Architecture - OZ IA 2010
Ubiquitous Information Architecture - OZ IA 2010
 
Ollie I I
Ollie  I IOllie  I I
Ollie I I
 
What's New?
What's New? What's New?
What's New?
 
Taxonomy Bootcamp 2012 Keynote - Improving Information Interactions
Taxonomy Bootcamp 2012 Keynote - Improving Information InteractionsTaxonomy Bootcamp 2012 Keynote - Improving Information Interactions
Taxonomy Bootcamp 2012 Keynote - Improving Information Interactions
 
Bid 2015
Bid 2015Bid 2015
Bid 2015
 
Join the Secret Revolution
Join the Secret RevolutionJoin the Secret Revolution
Join the Secret Revolution
 
The Secret Revolution (Keene State College)
The Secret Revolution (Keene State College)The Secret Revolution (Keene State College)
The Secret Revolution (Keene State College)
 

Destacado

Destacado (6)

SWON 2012 Teen Reading Challenge Results Show
SWON 2012 Teen Reading Challenge Results ShowSWON 2012 Teen Reading Challenge Results Show
SWON 2012 Teen Reading Challenge Results Show
 
Twitter 1.0
Twitter 1.0Twitter 1.0
Twitter 1.0
 
Unidad3
Unidad3Unidad3
Unidad3
 
SWONtech News, January 2012
SWONtech News, January 2012SWONtech News, January 2012
SWONtech News, January 2012
 
SWONtech News for March, 2012
SWONtech News for March, 2012SWONtech News for March, 2012
SWONtech News for March, 2012
 
SWONtech News for May, 2012
SWONtech News for May, 2012SWONtech News for May, 2012
SWONtech News for May, 2012
 

Similar a SWONtech News for February, 2012

Finite Incatatem - Accessibility is not black magic
Finite Incatatem - Accessibility is not black magicFinite Incatatem - Accessibility is not black magic
Finite Incatatem - Accessibility is not black magic
Christian Heilmann
 
Reading Beyond the Book for ICJSE
Reading Beyond the Book for ICJSEReading Beyond the Book for ICJSE
Reading Beyond the Book for ICJSE
Jen LaMaster
 
Emerging Educational Technologies
Emerging Educational TechnologiesEmerging Educational Technologies
Emerging Educational Technologies
Noelle Morris
 
When responsive web design meets the real world
When responsive web design meets the real worldWhen responsive web design meets the real world
When responsive web design meets the real world
Jason Grigsby
 

Similar a SWONtech News for February, 2012 (20)

Finite Incatatem - Accessibility is not black magic
Finite Incatatem - Accessibility is not black magicFinite Incatatem - Accessibility is not black magic
Finite Incatatem - Accessibility is not black magic
 
Cloud computing Sustainabilty
Cloud computing SustainabiltyCloud computing Sustainabilty
Cloud computing Sustainabilty
 
Technology for engagement
Technology for engagementTechnology for engagement
Technology for engagement
 
Polc 2007
Polc 2007Polc 2007
Polc 2007
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
Reading Beyond the Book for ICJSE
Reading Beyond the Book for ICJSEReading Beyond the Book for ICJSE
Reading Beyond the Book for ICJSE
 
RAA 2013
RAA 2013RAA 2013
RAA 2013
 
Collective Intelligence Lecture 1: Introduction
Collective Intelligence Lecture 1: IntroductionCollective Intelligence Lecture 1: Introduction
Collective Intelligence Lecture 1: Introduction
 
Informatics in the Auto Industry
Informatics in the Auto IndustryInformatics in the Auto Industry
Informatics in the Auto Industry
 
Digital Divide Updated
Digital Divide UpdatedDigital Divide Updated
Digital Divide Updated
 
The Web, The User and the Library (and why to get in between)
The Web, The User and the Library (and why to get in between)The Web, The User and the Library (and why to get in between)
The Web, The User and the Library (and why to get in between)
 
Responsive Design
Responsive Design Responsive Design
Responsive Design
 
Intro to data visualisation
Intro to data visualisationIntro to data visualisation
Intro to data visualisation
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
DIY Infographics for Data Reporting
DIY Infographics for Data ReportingDIY Infographics for Data Reporting
DIY Infographics for Data Reporting
 
Emerging Educational Technologies
Emerging Educational TechnologiesEmerging Educational Technologies
Emerging Educational Technologies
 
Kathmandu ToastMasters 2022.pptx
Kathmandu ToastMasters 2022.pptxKathmandu ToastMasters 2022.pptx
Kathmandu ToastMasters 2022.pptx
 
Power Up Your Professional Learning Network
Power Up Your Professional Learning NetworkPower Up Your Professional Learning Network
Power Up Your Professional Learning Network
 
Power Up Your Professional Learning Network
Power Up Your Professional Learning NetworkPower Up Your Professional Learning Network
Power Up Your Professional Learning Network
 
When responsive web design meets the real world
When responsive web design meets the real worldWhen responsive web design meets the real world
When responsive web design meets the real world
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

SWONtech News for February, 2012

  • 1.
  • 4. Pinterest Infographics . . . & Infographics http://mashable.com/2012/01/29/pinterest-retail-infographic/ http://www.schrockguide.net/infographics-as-an-assessment.html
  • 7. Google Changes Privacy Settings, Combines Information from Gmail, YouTube, etc. Instead of 60 policies for different services and features, now there’s just one. Oh, and by the way... http://www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt- out/2012/01/24/gIQArgJHOQ_print.html http://www.youtube.com/watch?feature=player_embedded&v=KGghlPmebCY
  • 8. Google Sidesteps Safari Cookie Settings 1st-party versus 3rd-party cookies: It’s about being there. http://marketingland.com/google-didnt-track-iphones-but-it-did-bypass- safaris-privacy-settings-6247
  • 9. Google Sidesteps Internet Explorer Cookie Settings Windows Internet Explorer Engineering Team Blog: By default, IE blocks third-party cookies unless the site presents a P3P Compact Policy Statement indicating how the site will use the cookie and that the site’s use does not include tracking the user. ... For example, here is the P3P Compact Policy (CP) statement from Microsoft.com: P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" ... Technically, Google utilizes a nuance in the P3P speci cation that has the effect of bypassing user preferences about cookies. http://blogs.msdn.com/b/ie/archive/2012/02/20/google-bypassing-user- privacy-settings.aspx
  • 10. ReDigi: Marketplace for used MP3s http://www.wired.com/threatlevel/2012/02/pre-owned-music-lawsuit-2/ https://www.redigi.com/buy.html
  • 11. Social Media Boosts “Downton Abbey” Olivia Wong, Senior Account Executive, National Marketing at WGBH Educational Foundation: The real moment when we crossed over from a cult hit to a main-stream phenomenon was when we began to see celebrity devotee comments and all the fan mash-ups and tributes online. It suddenly went to another level. http://www.lostremote.com/2012/02/16/how-social-media-helped-turn- downton-abbey-into-hit-pbs-show/
  • 12. Penguin Unfriends Overdrive + Not Enough Friction =  And Friction = Security in Sales http://www.thedigitalshift.com/2012/02/ebooks/penguin-group-terminating-its-contract-with-overdrive/ http://americanlibrariesmagazine.org/e-content/ebook-talks-details http://www.libraries.wright.edu/noshelfrequired/2012/02/09/articles-of-interest-penguin-overdrive-and-libraries/
  • 13. Talking To Patrons About Penguin http://librarianinblack.net/librarianinblack/2012/02/ebooksign.html
  • 14. Are Ebooks Trapping Libraries? Nate Hill (The PLA Blog): While I’m troubled by the many difficulties public libraries have lending ebooks, I’ve been focusing instead on the many examples of public libraries reconsidering their mission and becoming creative hubs for their communities. There is a great opportunity there. The 20th century library was a monument to knowledge consumption, the 21st century library has the opportunity to devote half of its resources back to knowledge production. http://www.thedigitalshift.com/2012/02/ebooks/penguin-group-terminating-its-contract-with-overdrive/#comment-11143 http://plablog.org/
  • 15. Pew Finds Leap In E-Reader/Tablet Ownership http://pewinternet.org/Reports/2012/E-readers-and-tablets/Findings.aspx
  • 16. Apple iBooks Author Announced January 19 http://www.apple.com/ibooks-author/
  • 17. Apple iBooks Author: Widgets http://www.apple.com/ibooks-author/
  • 18. iBooks Author ‣ Free Software (Mac-only) ‣ McGraw-Hill, Pearson Education, & Houghton Mifflin Harcourt ‣ Maximum Textbook Price: ê $14.99 ‣ Full-featured for iPad only ‣ Full-featured sold through iBookstore only ‣ Apple gets 30% cut ‣ No EPUB import/export  http://www.apple.com/education/ibooks-textbooks/ http://www.tuaw.com/2012/01/19/ibooks-author-under-the-hood/
  • 19. Apple iBooks Author: The EULA Chamber Four: “...You can’t sell the books you make with iBooks Author through any distributor except Apple.” http://www.zdnet.com/blog/bott/apples-mind-bogglingly-greedy-and-evil-license-agreement/4360 http://chamberfour.com/2012/01/20/relax-the-ibooks-author-eula-is-not-nearly-that-bad/
  • 20. Apple iBooks Author: The Revised EULA http://512pixels.net/apple-updates-ibooks-eula/
  • 22. Inkling: Reinventing the Publishing “Habitat” http://www.youtube.com/watch?feature=player_embedded&v=z5bborgjHF4
  • 23. Morgue File - Stock Image Resource http://www.morgue le.com/
  • 24. Don’t Mess with GPS ✓ Have 4G wireless broadband idea ✓ Buy spectrum ✓ Get shut down by the F.C.C. http://www.nytimes.com/2012/02/15/business/media/fcc-bars-airwave-use-for-broadband-plan.html?_r=1 http://arstechnica.com/tech-policy/news/2012/02/why-lightsquared-failed.ars
  • 25. Flaw in SSL Security Found(?)  • 2 random (large) primes, (p) & (q) • (p)*(q)=(n)  • • • Content is encrypted with (n) & decrypted with (p) & (q) If a (p) is discovered, can calculate (q) from (n) ������ Nadia Heninger, Security researcher at Princeton: http://www.nytimes.com/2012/02/15/technology/researchers- nd- aw-in-an-online-encryption-method.html http://dankaminsky.com/2012/02/17/primalfear/ https://freedom-to-tinker.com/blog/nadiah
  • 26. iOS “Path” App & Address Book Privacy http://mclov.in/2012/02/08/path-uploads-your-entire-address-book-to- their-servers.html
  • 27. Everything Is A Remix: System Failure http://www.everythingisaremix.info/