• 0

Child Starves to Death while parents raised a Virtual child

Seoul, South Korea — A couple whose baby starved to death while they raised a virtual child in an online fantasy game was sentenced Friday, their defense attorney said.

Prosecutors at Suwon District Court had sought a five-year sentence for negligent homicide, but the court handed out a two-year sentence.

Sentence was suspended for the female defendant, Kim Yun-jeong, 25, who is expecting the couple’s daughter in August. Her partner, Kim Jae-beom, 41, will serve two years.

The unmarried couple’s defense attorney said he was satisfied with the sentence.

“This is the first legal case regarding Internet addiction in Korea,” said Kim Dong-young, a lawyer with the Korean Legal Aid Corp. “I am pleased that the female defendant’s Internet addiction was taken into consideration, and she was bailed.”

Three-month-old Kim Sa-rang died of malnutrition in September while her parents were engaged in 12-hour sessions of Prius Online. In the 3-D fantasy game, players nurture an online girl who gains magical powers as she grows.

Kim’s mother is a former factory worker while her father is a taxi and truck driver.

During their trial, the court heard that the toddler weighed 6.4 pounds (2.9 kgs) when she was born, but was only 5.5 pounds (2.5 kgs) at the time of her death.

The trial was in March, but sentencing was delayed after the court requested a psychological examination of the mother. Both defendants appeared contrite during the trial, with the mother frequently breaking down in tears.

Internet gaming is hugely popular in South Korea, with some 21,500 ‘PC Bangs’ — or Internet cafes — offering ultra-high speed Internet connections nationwide.

The case has highlighted the dark side of the nation’s Internet, an industry touted by South Korean officials as cutting edge. A public debate is under way in the nation over online privacy and regulating Internet rumors.

There is particular concern about gaming addiction and its effects on teenagers and those estranged from mainstream society. “Consequently, it comes as no surprise to me that two people who were disconnected from society in general found a common psychological space that kept them physically and socially divorced from reality,” said Tom Coyner, Seoul-based author of “Mastering Business in Korea.”

Suwon, the satellite town south of Seoul where the tragedy occurred, was named “Intelligent City of the Year” this month by a New York-based think-tank Intelligent Community Forum.

The honor was awarded because of the town’s investment in broadband infrastructure and its push to increase connection speeds to 1 gigabyte per second, according to reports.


  • 0

Apple Passes Microsoft in Worlds Largest Tech Company

Category : Google , Internet

What a long, strange trip it’s been.

Apple’s market capitalization officially passed Microsoft’s Wednesday afternoon, making the Cupertino, California, company — for the first time — the largest technology company in the world.

With a market cap of $241.5 billion versus Microsoft’s $239.5 billion, Apple also became the second-largest company on the S&P 500, according to Standard & Poor’s analyst Howard Silverblatt. At the moment, only Exxon Mobil is bigger.

Market cap is a measure of the total value of all the outstanding shares of a company, and it’s a proxy for what investors think the company is worth, taking into account future earnings and future growth. As such, it’s a measure of expectations, not reality: Apple’s annual revenue was $42.9 billion in the most recent fiscal year, versus Microsoft’s $58.4 billion. Both look puny next to Exxon Mobil’s $301.5 billion in annual revenue.

Market cap is also a fickle mistress, and fluctuates wildly depending on stock price, so Apple’s position as the king of the hill may be short lived.

But it’s a significant milestone for a company that looked like a has-been just one decade ago.

Ten years ago, Apple was all but written off by most expert commentators. An also-ran computer company that once dominated geeks’ hearts and minds with the Apple II and the Macintosh, Apple made serious missteps in the 1990s that relegated it to a tiny niche of the overall computer market, with market share in the low single digits. It was all but certain that its share would continue dwindling until the company faded away entirely, like Commodore, Atari, Tandy and dozens of other computer makers before it.

What the commentators didn’t count on was the string of hits Apple would deliver over the next 10 years. Founder Steve Jobs returned to Apple in 1996 and removed then-CEO Gil Amelio in 1997, making himself interim CEO (and then eventually dropping the interim title).

Jobs then instituted what can now clearly been seen as a far-reaching strategy to consolidate and simplify Apple’s product line, while gradually leveraging the company’s strengths (ease of use, consumer-friendly branding, attractive design, and high margins) to expand into new areas of consumer technology.

Jobs also carefully created a new company culture, one that’s centered on innovation, control and secrecy. That approach has alienated many people — and runs counter to Silicon Valley received wisdom about the value of openness and sharing — but the proof is in the pudding. With a CEO of Jobs’ caliber, at least, that kind of top-down control works.


  • 0

Human Computer Virus!

The machines are going to take over.

And so a British scientist says he is the first man in the world to become infected with a computer virus. Dr. Mark Gasson from the University of Reading, who sadly does not have wild white hair, contaminated a computer chip which was then inserted under the skin in his hand.

The gizmo, which enables him to pass through security doors and activate his mobile phone, is a version of the ID chips used to tag your pet dog.

In trials, Dr. Gasson showed that the chip was able to pass on the computer virus to other control systems, though, hopefully, not including his nervous system. The doc thinks this has important implications for a future where medical devices such as pacemakers become more sophisticated and risk being contaminated by other human implants.

Gasson also predicts that implanted technology will spread: “This type of technology has been commercialized in the United States as a type of medical alert bracelet, so that if you’re found unconscious you can be scanned and your medical history brought up.”

We give it three weeks before Gasson begins to morph into a cyborg. Watch the video of the man looking human while you still can.

Watch the Human Computer Virus Video


  • 0

Internet Takeover by FCC

House Republican Leader John Boehner (Ohio) is using language from the just-completed healthcare debate to blast the FCC’s attempt to rein in broadband providers.

Boehner accused the agency Thursday of pursuing a “government takeover of the Internet,” just hours after FCC Chairman Julius Genachowski unveiled the plan, which would place broadband providers under some of the same rules that have long governed phone companies.

“Under this job-killing big government scheme, the Obama administration is seeking to expand the power of the federal government,” Boehner said in a statement.

“The success of the Internet is a perfect example of what happens when entrepreneurship and innovation are allowed to flourish, but today’s decision will undermine its success and hurt our economy,” the GOP leader continued. “The American people are asking ‘Where are the jobs?’  They aren’t asking for yet another government takeover that imposes new job-killing federal regulations and puts bureaucrats in charge of the Internet.

Republicans attacked the healthcare bill for almost a year as a job-killer and a government takeover of private enterprise. They’ve made similar arguments about other efforts — some of which were backed by Republicans, including the Bush administration — to bailout banks and auto companies.

The FCC, however, has explicitly sought to shed any mention that hope to regulate or takeover the Internet. Rather, the commission has framed its efforts as an attempt to store the same rules and procedures that were in place before a federal court in April invalidated the FCC’s ability to regulate broadband providers.

Two FCC officials on a conference call with reporters on Thursday declined to address Boehner’s criticisms directly. They also noted that full implementation of Genachowski’s proposal — including rules that would safeguard open Internet — was still some time away.

But Boehner on Thursday implored lawmakers to act preemptively to stop the FCC from encroaching too much on private business.

“Congress should listen to the American people and act to reverse this unnecessary federal government power grab,” he said.


  • 0

Stephen Hawking: “Time travel possible”

In his new documentary, Stephen Hawking offers the view that humans will be able to travel millions of years ahead of their own time.


  • 0

Stephen Hawking: “Time travel possible”

In his new documentary, Stephen Hawking offers the view that humans will be able to travel millions of years ahead of their own time.


  • 0

Internet Explorer Finally Fades Away!

Microsoft’s Internet Explorer browser market share has dipped to a historic all-time-low in April, at under 60 percent, according the latest NetApplications statistics. Internet Explorer’s losses are at the expense of Mozilla’s Firefox and Google’s Chrome browser which continue to grow more popular.

For the first time since Internet Explorer 4 won over Netscape over 10 years ago, Microsoft’s browser has dropped in usage to 59.95 per cent market share in April this year. Internet Explorer had an 80 percent market share less than two years ago.

NetApplications browser market share statistics for April 2010.NetApplications browser market share statistics for April 2010.

According to the NetApplications statistics, Mozilla’s Firefox browser now has nearly 25 percent market share, and has been stationery for the last two months at around a quarter of the market. Firefox is still the largest threat to Internet Explorer‘s dominance.

Lower down in the NetApplication rankings was Google’s Chrome (6.7 percent), leading the WebKit-powered browsers, ahead of Apple’s Safari (4.7 percent). Chrome’s surge in use is impressive, considering it had zero percent share prior to 2009.

Opera, which has been recently in the news with their new Opera Mini browser for iPhone, commands only 2.3 percent of the market in the NetApplications statistics.

NetApplciation’s numbers are not too far off from StatCounter data either, which says that Internet Explorer has 56.5 percent of the market share, followed by Firefox with 31.3 per cent, then by Chrome and Safari with 5.3 and 3.6 percent respectively. StatCounter measures Opera at 2.2 percent.

Nielsen data on the other hand, via a BBC report, suggest that Internet Explorer has not lost much ground against its fellow rival browsers, and still commands 70 per cent of the market, while Mozilla has only 18 percent.


  • 0

How to fix your McAfee crippled computer

McAfee pushed out a malformed security patch early on Wednesday that wound up crippling computers running Windows XP, but there is a fix available. Users should note that it’s labor-intensive and must be applied manually to each computer. If you’re running Windows Vista or Windows 7, your computer shouldn’t be affected by the bad update.

As of 3 p.m. PDT, McAfee had yet to link on its front door to a fix for a false positive update with disastrous consequences that went out Wednesday morning.

If your computer is shutting down automatically, you must address that before you can fix anything else.

  • Step 1: Open a command prompt: Start menu, Run, then type cmd and hit Enter
  • Step 2: Type shutdown -a, which will prevent the shutdown from occurringMcAfee has revealed two fixes for the problem. Each one requires multiple steps, and can be confusing. If you’re not comfortable with advanced computer fixes, you should get help with this.For the first fix, go to the McAfee interface through the Start menu, and disable Access Protection and On-Access Scanner.
  • Step 1: Click Start, Programs, McAfee, and then VirusScan Console
  • Step 2: Right-click “Access Protection”
  • Step 3: Select “Disable”If you have Internet access, download the EXTRA.ZIP file provided by McAfee and unzip the EXTRA.DAT within. (Note that Nai.com is a safe site maintained by McAfee, for those who were wondering.) Once EXTRA.DAT has been extracted:
  • Step 1: Click Start, Run, then type services.msc and click “OK”
  • Step 2: Right-click the McAfee McShield service and select “Stop”
  • Step 3: Copy EXTRA.DAT to “Program FilesCommon FilesMcAfeeEngine”
  • Step 4: Then restart the McAfee McShield service by right-clicking on it and choosing “Start” from the context menu
  • Step 5: Re-enable access protection by going back to the VirusScan Console
  • Step 6: Right-click “Access Protection”
  • Step 7: Select “Enable”
  • Step 8: In the VirusScan Console, go to the Quarantine Manager Policy
  • Step 9: Click the Manager tab
  • Step 10: Right-click on each file in the Quarantine and choose “Restore”There is, of course, one massive hang-up with this McAfee-recommended solution: More likely than not, you don’t have Internet access on your McAfee-borked computer. In fact, it’s highly unlikely that you have access to much of anything, since deleting SVCHOST.EXE prevents key Windows 32-bit sub-system processes from functioning at all. To get the EXTRA.DAT on your computer, you’ll probably have to download it on an unaffected computer, then copy it to either a USB drive or a CD-ROM and use the command prompt to copy it over to your C: drive.The second workaround requires that you apply the EXTRA.DAT fix as detailed above before beginning and that you have access to a second, unaffected Windows XP computer. On that computer, go to C:WINDOWSsystem32 and copy SVCHOST.EXE to a network location or a removable media device such as a USB stick. Then copy the SVCHOST.EXE from the unaffected computer to the affected computer, and restart the McAfee-afflicted computer. There are details on applying the EXTRA.DAT via ePolicy Orchestrator at McAfee’s fix on Nai.com.Severe problems caused by buggy or false positive security updates are rare, but not unheard of. Recent instances include an update from Avast that marked hundreds of legitimate files as threats in December 2009, Computer Associates flagging a Windows system file as a virus in July 2009, and AVG marking ZoneAlarm as malware in October 2008.

    McAfee did not immediately responded to a request for comment.

    Updated at 5 p.m. PDT with additional information.

    McAfee Executive Vice President of Technical Support and Customer Service Brian MacPherson has written a blog post and a follow-up commenting on the situation, although neither addresses how the bad update made it past quality-control testing in the first place.


    • 0

    How to fix your McAfee-crippled computer

    McAfee pushed out a malformed security patch early on Wednesday that wound up crippling computers running Windows XP, but there is a fix available. Users should note that it’s labor-intensive and must be applied manually to each computer. If you’re running Windows Vista or Windows 7, your computer shouldn’t be affected by the bad update.

    As of 3 p.m. PDT, McAfee had yet to link on its front door to a fix for a false positive update with disastrous consequences that went out Wednesday morning.

    If your computer is shutting down automatically, you must address that before you can fix anything else.

  • Step 1: Open a command prompt: Start menu, Run, then type cmd and hit Enter
  • Step 2: Type shutdown -a, which will prevent the shutdown from occurringMcAfee has revealed two fixes for the problem. Each one requires multiple steps, and can be confusing. If you’re not comfortable with advanced computer fixes, you should get help with this.For the first fix, go to the McAfee interface through the Start menu, and disable Access Protection and On-Access Scanner.
  • Step 1: Click Start, Programs, McAfee, and then VirusScan Console
  • Step 2: Right-click “Access Protection”
  • Step 3: Select “Disable”If you have Internet access, download the EXTRA.ZIP file provided by McAfee and unzip the EXTRA.DAT within. (Note that Nai.com is a safe site maintained by McAfee, for those who were wondering.) Once EXTRA.DAT has been extracted:
  • Step 1: Click Start, Run, then type services.msc and click “OK”
  • Step 2: Right-click the McAfee McShield service and select “Stop”
  • Step 3: Copy EXTRA.DAT to “Program FilesCommon FilesMcAfeeEngine”
  • Step 4: Then restart the McAfee McShield service by right-clicking on it and choosing “Start” from the context menu
  • Step 5: Re-enable access protection by going back to the VirusScan Console
  • Step 6: Right-click “Access Protection”
  • Step 7: Select “Enable”
  • Step 8: In the VirusScan Console, go to the Quarantine Manager Policy
  • Step 9: Click the Manager tab
  • Step 10: Right-click on each file in the Quarantine and choose “Restore”There is, of course, one massive hang-up with this McAfee-recommended solution: More likely than not, you don’t have Internet access on your McAfee-borked computer. In fact, it’s highly unlikely that you have access to much of anything, since deleting SVCHOST.EXE prevents key Windows 32-bit sub-system processes from functioning at all. To get the EXTRA.DAT on your computer, you’ll probably have to download it on an unaffected computer, then copy it to either a USB drive or a CD-ROM and use the command prompt to copy it over to your C: drive.The second workaround requires that you apply the EXTRA.DAT fix as detailed above before beginning and that you have access to a second, unaffected Windows XP computer. On that computer, go to C:WINDOWSsystem32 and copy SVCHOST.EXE to a network location or a removable media device such as a USB stick. Then copy the SVCHOST.EXE from the unaffected computer to the affected computer, and restart the McAfee-afflicted computer. There are details on applying the EXTRA.DAT via ePolicy Orchestrator at McAfee’s fix on Nai.com.Severe problems caused by buggy or false positive security updates are rare, but not unheard of. Recent instances include an update from Avast that marked hundreds of legitimate files as threats in December 2009, Computer Associates flagging a Windows system file as a virus in July 2009, and AVG marking ZoneAlarm as malware in October 2008.

    McAfee did not immediately responded to a request for comment.

    Updated at 5 p.m. PDT with additional information.

    McAfee Executive Vice President of Technical Support and Customer Service Brian MacPherson has written a blog post and a follow-up commenting on the situation, although neither addresses how the bad update made it past quality-control testing in the first place.


    • 0

    FCC to Regulate Internet?

    Category : Internet

    A federal appeals court ruled this week that Congress never granted the Federal Communications Commission authority to impose “network management” regulations on Internet service providers and that the FCC’s overly “expansive view” of its power did not merely strain the outer limits of its authority but “seeks to shatter them entirely.” In real terms, this rebukes the commission for its effort to order high-speed Internet service providers such as Comcast to treat equally all traffic that flows through their pipelines.

    Despite this defeat, the FCC might still try to regulate the Internet under century-old rules made for railroads and Ma Bell phone monopolies. This mistaken effort would hinder recent successes in deploying broadband throughout the country.

    While the U.S. economy has shrunk substantially over the past two years, the Internet sector has flourished. Increasingly, our commerce and culture ride on the rails of high-speed, or “broadband,” Internet access. But this success was not inevitable.

    The Clinton administration set today’s “hands-off” policy when the Internet was privatized in the mid-1990s. Amid the rubble of the dot-com bust, in 2002 the FCC sought to energize the nascent broadband sector by formally insulating the Internet from regulation. The commission classified broadband as unregulated “information services,” establishing a framework that was designed to attract the investment of risk capital, foster competition, lower prices, fuel innovation and increase consumer adoption.

    It worked. In 2003, about 15 percent of American adults had access to broadband at home, according to a Pew Internet & American Life Study. Today that number is closer to two-thirds. Some form of broadband is available to roughly 95 percent of Americans.

    Mobile broadband was virtually unheard of in 2002. By the end of last year, an estimated 100 million Americans subscribed to wireless broadband services. We lead the world in 3G networks.

    Not only have investment and innovation been dynamic in core telecom areas, but cutting-edge economic activity has exploded. Last year Americans led the world by downloading more than 1.1 billion applications onto their mobile devices. (We should stop calling them phones; they have become our mobile computers.) That’s a ninefold increase from just two years earlier. An entire industry for mobile apps has solidly taken root.

    The Web’s free and open marketplace is thriving — and evolving faster than any government or company can measure. It is, in short, the greatest deregulatory success story of all time.

    Yet some seek government regulation of this constructively chaotic part of our economy.

    Last fall, over dissenting votes from Commissioner Meredith Attwell Baker and me, the FCC proposed rules to regulate high-speed Internet. Before embarking on any regulatory journey, it is critical for the government to ask and answer: What exactly is broken that only the government can fix?

    Curiously, the commission proposed rules even though studies by the FCC and the Federal Trade Commission found no evidence of market failure. And when the Justice and Commerce departments filed comments with the FCC in January, neither provided evidence of concentrations and abuses of market power in the broadband arena. To the contrary, the Justice Department sounded optimistic about the competitiveness of the broadband market. It even warned against imposing new regulations “to avoid stifling the infrastructure investments needed to expand broadband access.”

    Nonetheless, the FCC may still consider imposing early-20th-century vintage “common carrier” regulations on 21st-century broadband technologies. One result of the new rules could be to make it harder for the operators of broadband “pipes” to build “smart” networks, which offer connectivity and other services or products.

    As the distinction between network operators and application developers blurs, how will government keep up? Internet application developers own massive server farms and fiber-optic connectivity. Meanwhile, broadband companies develop and maintain software with millions of lines of code and have created app stores that are seamlessly connected to their networks. As technology advances, in the absence of market failure, should the government attempt to make distinctions between applications and networks under a new regulatory regime? Would it be able to do so in Internet time? Would any of this be good for innovation, investment and America’s global competitiveness?

    And how will FCC actions be perceived internationally? Countries that regulate the Internet more tend to be less free than those that are hands-off. Not only are some countries waiting for Washington to assert more authority over the Internet to justify their own state interference with the Web, but once government regulation of the Internet starts, it will become harder to pull back.

    We should also ask whether we want business decisions affecting the Internet to be caught up in election cycles. It is inevitable that more government involvement will mean enforcement decisions are politically influenced.

    Policymakers ought to agree on a sensible middle ground. In lieu of new rules, which would be tied up in court for years anyway, the FCC could forge a partnership with the long-standing nongovernmental bodies that have collaborated on Internet governance for years. Working together, we could spotlight allegations of anticompetitive conduct and seek resolution. This approach, coupled with strict enforcement of our antitrust laws, could provide the benefits some are seeking without incurring the risks and costs of a regulatory regime.

    The best antidote to potential anticompetitive conduct is more competition. Let’s work on policies that encourage more investment, innovation and competition instead of regulation and rationing.


    Call Now Button