Bill Gates wonders why Google would want to make a browser-based operating system. In fact he wonders what exactly a browser is anyway. We also have some crazy Steve Ballmer quotes and some crazy stats of how many people respond to spam.
Podcast
Subscribe now: iTunes (audio) | iTunes (video) | RSS (audio) | RSS (video)
![]() |
EPISODE 1019 |
Bill Gates on Google's Chrome OS
http://news.cnet.com/8301-13860_3-10286308-56.html
Ballmer: what IS this thing!?
http://paidcontent.org/article/419-microsofts-microsofts-ballmer-on-google-chrome-os-who-knows-what-this-t/
Gates: Natal to bring gesture recognition to Windows too
http://news.cnet.com/8301-13860_3-10286309-56.html
http://news.cnet.com/8301-13860_3-10286772-56.html
TechCrunch receives confidential Twitter documents from hacker
http://www.techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/
Comcast offers HBO, Cinemax on the Web and on-demand
http://arstechnica.com/media/news/2009/07/comcast-welcomes-hbo-cinemax-to-online-offerings.ars
CBS is first broadcast network to sign on for "trial" period
http://paidcontent.org/article/419-cbs-signs-on-for-comcast-broadband-trial-first-broadcast-network/
Google Voice coming to Android, BlackBerry
http://news.cnet.com/8301-17939_109-10286763-2.html
Apple cops to OS 3.0 Wi-Fi, Bluetooth problems
http://reviews.cnet.com/8301-19512_7-10285817-233.html
New Service Converts Torrents Into PNG Images
http://tech.slashdot.org/story/09/07/15/1314253/New-Service-Converts-Torrents-Into-PNG-Images
12% of e-mail users have actually tried to buy stuff from spam
http://arstechnica.com/web/news/2009/07/12-of-e-mail-users-try-to-buy-stuff-from-spam-e-mail.ars
State Dept. to Clinton: Please let us use Firefox
http://news.cnet.com/8301-13505_3-10287084-16.html
VOICEMAIL
Steve from Seattle on economics
Pastor Hudson on Verizon Store
EMAIL
Hey Buzz Hosts,
All the talk yesterday about Netflix possibly being purchased by Amazon really made me think about how Netflix is predominately a tech company and how funny it is that my grandparents have a Netflix subscription.
You see, my grandparents have never had a computer, Internet, cable, or satellite. They don't see any need for modern technology and really couldn't care less about it. That was until my family introduced them to Netflix.
My grandparents still don't have a computer, but they are in love with Netflix. They have developed their own hack to manage their que without a computer. My grandma writes down the movies she wants and calls my mother about once a week to have her add them to the Que. My grandmother manages her Que, with shipping dates, by paper and pencil. This speaks very highly of Netflix's shipping reliability as my grandmother can tell you with accuracy when her next movie will arrive without having access to her account.
I also like the set up, since I get to use the streaming feature of their account on my XBOX 360.
I've include two photos of my grandparents' "Que."
Pic #1 and Pic #2.
I thoroughly enjoy the show. Thanks for keeping my up to date on the tech world!
-Clayton from Oklahoma.
**********
Hey BOL-
In episode 1018, you mentioned what would child between Netflix and Amazon? Its already out there: RokuPlayer. After all, they both joined forces to get more content and even cross promote each other to sell more boxes. I even have an account with both and just got a RokuPlayer. Maybe they could iron out more included content if Amazon does buy them, but I enjoy what they both currently offer on the RokuPlayer.
Kevin in Pittsburgh
**********
The Risky Business podcast has the presentation of the security researchers (hilarious, actually), and an interview with them, both discussing the 2 keystroke capture techniques you talked about on the show. There are a few points that will get missed by mainstream reporting because these are corporate security researchers, not end-user security researchers.
1) An attacher who wants to use either of these method is going to choose a valuable target that meets the functionality of the attack. E.g., many, many ATMs use the PS2 keyboard interfaces required by the electrical fluctuation attack, making this a perfect exploit to capture pin #s. Niether attack is presented as a possible for use against individuals at home or in coffee shops.
2) The point is that sensors, such as those used to detect small electrical fluctuations and physical vibrations, are becoming cheaper and more sensitive every day, and these and other methods will be more and more viable proportionally.
http://risky.biz/netcasts/rb2/rb2-shakacon-presentation-hackers-freakin-laser-beams-their-heads-presentation
http://risky.biz/netcasts/rb2/rb2-shakacon-interview-hackers-freakin-laser-beams-their-freakin-heads
Ben
The Sysadmin in Minneapolis who listens to lots and lots of security podcasts.