Top Items:
Michael Liedtke / Associated Press:
Warner to send videos through YouTube — SAN FRANCISCO - Warner Music Group Corp. has agreed to distribute and license its copyrighted songs and other material through online video trendsetter YouTube Inc., marking another significant step in the entertainment industry's migration to the Internet.
Discussion:
Valleywag, B2Day, Mashable!, Lawgarithms, IP Democracy, Mathew Ingram, Dead2.0, paidContent.org, Mark Evans, The 463 and IPcentral Weblog
RELATED ITEMS:
MSNBC:
Warner opens video library to YouTube — By Joshua Chaffin in New York and Kevin Allison in San Francisco — Warner Music has agreed to make its library of music videos available to YouTube, marking the first time that an established record company has agreed to make its content library available to the user-generated media company.
Discussion:
Digital Micro-Markets, VentureBeat, Soaring on Ridgelift, CrunchGear and Delicate Genius Blog
Marshall Kirkpatrick / TechCrunch:
Warner to license music in YouTube videos — YouTube and Warner Music Group Corp. will announce a deal Monday that will put thousands of Warner music videos on the video sharing site and allow user created videos to legally use Warner owned music, according to a story tonight from the Associated Press.
Mark Cuban / Blog Maverick:
The Coming Dramatic Decline of Youtube — What is it about youtube.com that has made it so successful so quickly ? Is it the amazing quality of user generated content ? Is it a broadband fueled obsession with watching short videos ? — No & No. — Youtube's rapid ascension to the top …
Newsweek Columnists:
Make Room on the Couch for Steve — Our computers have become great media devices for songs, pictures and now TV and movies. — Newsweek — Steve Jobs's talk last week was nearing an end and coming dangerously close to a letdown. The stuff he introduced—a freshening-up of the iPod line …
Discussion:
The Unofficial Apple Weblog, Paul Colligan's …, Googling Google, Google Operating System and Slashdot
RELATED ITEMS:
Richard Siklos / New York Times:
Not in the Real World Anymore — At MTV, reality has always been a moving target. Sixteen years ago, the network heralded the era of reality television with "The Real World." Three years ago, it pushed the genre further with "Laguna Beach: The Real OC," in which the mundane lives of a clique …
Discussion:
Techdirt, Monkey Bites, Valleywag, CNNMoney.com, VoIP & Gadgets Blog, 3pointD.com and Wonderland
RELATED ITEMS:
Mike / Techdirt:
How Dare Google Send Belgian News Sites Traffic! Court Orders Them To Stop — from the not-getting-it dept — The issue of the legality of "deep linking" has gone on for many years — and while we had hoped that, by now, people would realize why there should be nothing wrong with linking …
RELATED ITEMS:
Ed Felten / Freedom to Tinker:
"Hotel Minibar" Keys Open Diebold Voting Machines — Like other computer scientists who have studied Diebold voting machines, we were surprised at the apparent carelessness of Diebold's security design. It can be hard to convey this to nonexperts, because the examples are technical.
John Markoff / New York Times:
A Chip That Can Transfer Data Using Laser Light — Researchers plan to announce on Monday that they have created a silicon-based chip that can produce laser beams. The advance will make it possible to use laser light rather than wires to send data between chips, removing the most significant bottleneck in computer design.
Wall Street Journal:
IPod, TheyPod: Rivals Imitate Apple's Success — After years of watching Apple Computer Inc.'s success in digital music, rivals are ripping a page from the company's playbook. — RealNetworks Inc. today plans to announce a deal with SanDisk Corp. to sell a digital music device that's specifically designed …
Discussion:
GigaOM, CrunchGear, Engadget, Michael Gartenberg, Blackfriars' Marketing and IPcentral Weblog
Damon Darlin / New York Times:
Hewlett Review Is Said to Detail Deeper Spying — A secret investigation of news leaks at Hewlett-Packard was more elaborate than previously reported, and almost from the start involved the illicit gathering of private phone records and direct surveillance of board members and journalists …
Discussion:
B2Day, Techdirt, 27B Stroke 6, robhyndman.com, Silicon Valley Watcher, GrokLaw, SharkJumping, TechBlog, Paul Kedrosky's … and Slashdot
RELATED ITEMS:
Om Malik / GigaOM:
8020: American Idol of Digital Photography? — With online advertising on an upswing, it is hardly a surprise that traditional media, including magazine and newspaper publishers, are embracing the web. 8020 Publishing, Inc., a four-person San Francisco startup co-founded by Technorati …
Gizmodo:
Rumor: Touchscreen iPod Before Christmas? — We're still disappointed Apple didn't roll out its touchscreen iPod last week, and so we're doubly interested in any rumors having to do with the unpredictable release of the phantom product. Now tongues are wagging at Think Secret …
Alan Breznick / blog.cabledigitalnews.com:
Cable Racks Up Over 1 Million VOIP Subs in Q2 — Shattering their old quarterly record for VOIP subscriber gains, North American cable operators signed up more than 1 million IP phone customers for the first time during the spring, according to the latest figures compiled byCable Digital News.
Peter Rojas / Engadget:
Welcome to the new Engadget! It's taken us a ridiculously long time to get to this point (could everyone please stop having keynotes we have to liveblog?), but we're finally ready to introduce the latest version of Engadget. We haven't just refreshed the design, either …
Steven Schwankert / LinuxWorld News:
Google Losing Users In China: Study — Fewer Chinese users are seeking out Google for its search services, according to a new report by the China Internet Network Information Centre (CNNIC). — According to the survey by China's official Internet number cruncher, 62.1 percent …
Paperghost / The SpywareGuide Greynets Blog:
Pipeline Worm Floods AIM with Botnet Drones — Proactive research on security threats is the key to catching hidden threats before they can collect confidential data, deliver adware, or take down a network. When researchers grab a threat, it's usually been doing the rounds for some time.