Top Items:
Michael Liedtke / Associated Press:
Warner to send videos through YouTube — SAN FRANCISCO - Warner Music Group Corp. has agreed to distribute and license its copyrighted songs and other material through online video trendsetter YouTube Inc., marking another significant step in the entertainment industry's migration to the Internet.
Discussion:
Mashable!, IP Democracy, Dead2.0, paidContent.org, Mathew Ingram, The 463 and Mark Evans
RELATED ITEMS:
Mark Cuban / Blog Maverick:
The Coming Dramatic Decline of Youtube — What is it about youtube.com that has made it so successful so quickly ? Is it the amazing quality of user generated content ? Is it a broadband fueled obsession with watching short videos ? — No & No. — Youtube's rapid ascension to the top …
MSNBC:
Warner opens video library to YouTube — By Joshua Chaffin in New York and Kevin Allison in San Francisco — Warner Music has agreed to make its library of music videos available to YouTube, marking the first time that an established record company has agreed to make its content library available to the user-generated media company.
Marshall Kirkpatrick / TechCrunch:
Warner to license music in YouTube videos — YouTube and Warner Music Group Corp. will announce a deal Monday that will put thousands of Warner music videos on the video sharing site and allow user created videos to legally use Warner owned music, according to a story tonight from the Associated Press.
Richard Siklos / New York Times:
Not in the Real World Anymore — At MTV, reality has always been a moving target. Sixteen years ago, the network heralded the era of reality television with "The Real World." Three years ago, it pushed the genre further with "Laguna Beach: The Real OC," in which the mundane lives of a clique …
RELATED ITEMS:
Newsweek Columnists:
Make Room on the Couch for Steve — Our computers have become great media devices for songs, pictures and now TV and movies. — Newsweek — Steve Jobs's talk last week was nearing an end and coming dangerously close to a letdown. The stuff he introduced—a freshening-up of the iPod line …
RELATED ITEMS:
Wall Street Journal:
IPod, TheyPod: Rivals Imitate Apple's Success — After years of watching Apple Computer Inc.'s success in digital music, rivals are ripping a page from the company's playbook. — RealNetworks Inc. today plans to announce a deal with SanDisk Corp. to sell a digital music device that's specifically designed …
RELATED ITEMS:
Rafat / paidContent.org:
RealNetworks In Deal With SanDisk For Music Player; Ditches MSFT DRM
RealNetworks In Deal With SanDisk For Music Player; Ditches MSFT DRM
Discussion:
Gizmodo
Steven Schwankert / LinuxWorld News:
Google Losing Users In China: Study — Fewer Chinese users are seeking out Google for its search services, according to a new report by the China Internet Network Information Centre (CNNIC). — According to the survey by China's official Internet number cruncher, 62.1 percent …
RELATED ITEMS:
John Markoff / New York Times:
A Chip That Can Transfer Data Using Laser Light — Researchers plan to announce on Monday that they have created a silicon-based chip that can produce laser beams. The advance will make it possible to use laser light rather than wires to send data between chips, removing the most significant bottleneck in computer design.
Reuters:
Belgian newspapers win court action against Google —Text+BRUSSELS (Reuters) - A Belgian court has ordered Google Inc. to stop reproducing articles from French-speaking newspapers in the news section of one of its Belgian websites, a local press organisation said.
RELATED ITEMS:
Om Malik / GigaOM:
8020: American Idol of Digital Photography? — With online advertising on an upswing, it is hardly a surprise that traditional media, including magazine and newspaper publishers, are embracing the web. 8020 Publishing, Inc., a four-person San Francisco startup co-founded by Technorati …
JJ Hawkins / PVR Wire:
2.5 Terabyte Hard Drives in PVRs by 2009? — My TiVo has a paltry 40 hour recording capacity while my Media Center has a slightly more respectable 160 gig hard drive installed. — Needless to say, I'm pretty much forced to delete shows almost immediately after viewing them to ensure there's enough space …
RELATED ITEMS:
Ed Felten / Freedom to Tinker:
"Hotel Minibar" Keys Open Diebold Voting Machines — Like other computer scientists who have studied Diebold voting machines, we were surprised at the apparent carelessness of Diebold's security design. It can be hard to convey this to nonexperts, because the examples are technical.
Gizmodo:
Rumor: Touchscreen iPod Before Christmas? — We're still disappointed Apple didn't roll out its touchscreen iPod last week, and so we're doubly interested in any rumors having to do with the unpredictable release of the phantom product. Now tongues are wagging at Think Secret …
Damon Darlin / New York Times:
Hewlett Review Is Said to Detail Deeper Spying — A secret investigation of news leaks at Hewlett-Packard was more elaborate than previously reported, and almost from the start involved the illicit gathering of private phone records and direct surveillance of board members and journalists …
Discussion:
Techdirt, 27B Stroke 6, Silicon Valley Watcher, robhyndman.com, GrokLaw, SharkJumping, TechBlog, Paul Kedrosky's … and Slashdot
Alan Breznick / blog.cabledigitalnews.com:
Cable Racks Up Over 1 Million VOIP Subs in Q2 — Shattering their old quarterly record for VOIP subscriber gains, North American cable operators signed up more than 1 million IP phone customers for the first time during the spring, according to the latest figures compiled byCable Digital News.
Niall Kennedy / Niall Kennedy's Weblog:
Authenticated and private feeds — Some syndication feeds are not meant to be displayed for the world to see. Our everyday lives contain private and confidential data we wouldn't want anyone else to see, and especially not search. There are a few options for trying to keep things private …
Paperghost / The SpywareGuide Greynets Blog:
Pipeline Worm Floods AIM with Botnet Drones — Proactive research on security threats is the key to catching hidden threats before they can collect confidential data, deliver adware, or take down a network. When researchers grab a threat, it's usually been doing the rounds for some time.