Top Items:
Joshua Karp / Boy Genius Report:
Live video of HTC's “Dream” Android phone? — Yeah, it's not the highest quality video we've ever seen, but if you can look past the blurriness and Darth Vader breathing noises you might be pleasantly surprised. Thanks to an eagle-eyed tipster, we've some video footage of what might be the HTC Dream.
Miguel Helft / New York Times:
Is Google a Media Company? — SAN FRANCISCO — Type “buttermilk pancakes” into Google, and among the top three or four search results you will find a link to a detailed recipe complete with a photo of a scrumptious stack from a site called Knol, which is owned by Google.
Allen Stern / CenterNetworks:
Who Will Be First to Sue Alexa? — Alexa, oh Alexa, how you kill thee. I've written and spoken about Alexa since they began operations nearly a decade ago. I've watched agencies pitch advertising based on Alexa charts. There are still ad networks that use Alexa rankings as a baseline for pricing Web site advertising.
Discussion:
Geek News Central
RELATED:
Andy Beard / Collective Thoughts:
Why Are Alexa Double-Dipping Social Media Penalties?
Why Are Alexa Double-Dipping Social Media Penalties?
Discussion:
TECH.BLORGE.com
Eric A. Taub / New York Times:
Many Fail to See the Humor in ‘I Am Rich’ for the iPhone — When Apple announced in March that it would open up the iPhone to outside software developers, it promised that the resulting applications would help create “amazing” and “innovative” applications that would transform the concept of a smartphone.
Discussion:
MacRumors iPhone Blog
Brooke Crothers / CNET News.com:
Intel's Nehalem chips to get ‘Core’ branding — Intel's next-generation desktop processors will be branded “Intel Core” with an “i7” identifier for the first wave of products. — The i7 identifier will apply to the first crop of high-end desktop processors, according to George Alfs, an Intel spokesperson.
Matthew Hines / eWeek Security Watch:
Apple's Rotten Decision — One of the more hotly-discussed topics among attendees of this year's Black Hat conference in Las Vegas was Apple's last minute decision to cancel its scheduled presentations, and the somewhat disengaged stance it continues to maintain regarding the vulnerability research community in general.
Discussion:
Tech~Surf~Blog
Positech Games:
Genuine call for emails from pirates — Having read the Rock paper Shotgun coverage of this (different prices for games on PC vs Console) and the recent complaining about the price of braid, best characterised here... added to the torrent of blog comments I get from people annoyed at my attitude to piracy …
Lee Mathews / Download Squad:
Operator: Portable Anonymous Opera Browsing — I'm not a big Opera fan, but I have to say I'm pretty impressed with Operator - a portable version with built-in Tor (hence the semi-clever name) anonymous browsing. — Download the 7mb zip and extract it to your flash drive …
Taylor Buley / Forbes:
Return To Sender — Almost all of the complex exploits that make news at the Defcon hacker conference are scary. But the network vulnerability that Anton Kapela and Alex Pilosov will present is frighteningly simple. — Sunday at the Defcon hacker conference, Kapela and Pilosov are presenting …
Jason Kincaid / TechCrunch:
The Noncompete Ruling Won't Change Anything, Anywhere — Earlier this week, California's Supreme Court reaffirmed the state's position on noncompete clauses: they're almost never valid, except for in a few specific circumstances. While this has been the state's policy since 1872 …
Harry McCracken / Technologizer:
eBay: It's a Gamble! — This I know: A brand has definitively jumped the shark when it's turned into a slot machine. It's happened to That Girl and Blondie (the comic strip, not the band) and poor Dean Martin, who isn't around to give a yay or nay to gambling devices based on his likeness.
Discussion:
Lockergnome
Randall Stross / New York Times:
Goodbye, Passwords. You Aren't a Good Defense. — THE best password is a long, nonsensical string of letters and numbers and punctuation marks, a combination never put together before. Some admirable people actually do memorize random strings of characters for their passwords …