<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PCMech &#187; Ryan Passey</title>
	<atom:link href="http://www.pcmech.com/article/author/rpassey/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.pcmech.com</link>
	<description>Tech Powered Life... Simplified</description>
	<lastBuildDate>Wed, 15 May 2013 16:29:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Construct Your Online Identity Carefully</title>
		<link>http://www.pcmech.com/article/construct-your-online-identity-carefully/</link>
		<comments>http://www.pcmech.com/article/construct-your-online-identity-carefully/#comments</comments>
		<pubDate>Fri, 07 Sep 2007 02:27:01 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://www.pcmech.com/article/construct-your-online-identity-carefully/</guid>
		<description><![CDATA[From teens to 59-year-old pedophiles, every Tom, Dick, and Harry is starting to establish their online identity through seemingly sophisticated methods such as blogs, social networks, and forums.  The Internet is literally flooded with free programs and methods through which one can build their own personalized web-space and use said web-space to communicate with friends, [...]]]></description>
				<content:encoded><![CDATA[<p>From teens to 59-year-old pedophiles, every Tom, Dick, and Harry is starting to establish their online identity through seemingly sophisticated methods such as blogs, social networks, and forums.  The Internet is literally flooded with free programs and methods through which one can build their own personalized web-space and use said web-space to communicate with friends, express ideas, and saturate the &#8216;net with even more unnecessary web pages.  Unbeknown to most, every man, women, and child who builds his own online profile, whether it be on <a target="_blank" href="http://www.myspace.com">MySpace</a>, <a target="_blank" href="http://www.facebook.com">Facebook</a>, or even these very <a target="_blank" href="http://forum.pcmech.com">forums</a>, is crafting his own online identity and online brand.  The calamity of this situation is that, despite the ridiculous availability to capitalize upon this concept, very few have taken such initiative to craft a favorable online identity and brand themselves through professional and personalized web-space.   Businesses have caught the social networking bug and certain <a target="_blank" href="http://www.myspace.com/pcmedia">entrepreneurs</a>  and political candidates are catching on too.  The question is: what&#8217;s stopping you from building a MySpace profile or starting a blog that actually contributes to your personal goals and aspirations?  As <a target="_blank" href="http://mashable.com/2007/05/08/brand-social-networks/">Mashable</a> (social networking news site) suggestions, the resources are there, you just have to know how to use them.</p>
<p>The media repeatedly infiltrates our minds into discerning the vastly popular social networks of MySpace and Facebook, stating that they are a breeding ground for online predators and irrelevant and inaccurate discussion between life-less teens.  Additionally, on occasion, the media further asserts that while many blogs and forums are advocates for free speech and liberalism, they lack sufficient levels of accurate data.  Such claims mask the true potential of most online networks and blogging services: they are more than just outlets for life-less teens to blab on about high-school gossip, they are opportunities for one to definitively establish their identity.  Imagine that&#8230; the Internet can actually work for you; for nothing more than the time and effort you put forth.  There are a plethora of free online resources to help build an accurate online identity that mimics your personal life and assists in helping you achieve your life-long goals.</p>
<p>Obviously, the intention of this installment of Kudos and Calamities is to highlight the profound availability of resources to construct your own online identity.  The idea truly spawned from the collective media attention to the web pages, blogs, and social networking profiles of the 2008 presidential candidates.  From Clinton to Paul, every candidate is demonstrating their presidential agenda on dynamic sites such as MySpace and <a target="_blank" href="http://www.youtube.com/youchoose">YouTube</a>.  If the presidential candidates can secure votes and reach a broad target audience on the net, so can you!  As we delve further into the concepts and methods for doing so, however, I have taken the liberty to list a few pointers here and there that should facilitate the process and have you well on your way to portraying your real world identity through online networks and personalized web pages.<br />
Whether you decide to start your own blog or simply build a professional Facebook profile, it is essential to follow a few simple guidelines. </p>
<ol>
<li>Personal information should be consolidated to interesting facts and personal accomplishments – your personal grievances and favorite foods are of little importance to anyone who would be intently examining your profile for business purposes.</li>
<li>Neutral colors and content is a must – nobody wants to be blinded by psychedelic images and vibrant, unreadable texts.</li>
<li>The images and written content must be exquisite enough to not only catch people&#8217;s attention and make them come back, but to also convince the public that you are an intellectual who commands respect.</li>
</ol>
<p>Creating a profile is just the beginning, however.  After the arduous task of constructing your aesthetically pleasing and accurate chuck of the &#8216;net, you have to be diligent enough to keep it updated frequently.  Old information that is no longer of interest to your target group can drastically impact how you and your online identity are received by the public: you will look like a lazy vagabond if you simply dump a truck load of pertinent personal information on your site, but never update it for months at a time.  Band profiles are perfect examples of why this is important.  If someone visits a band profile and samples some of their tunes, they will most likely come back every once and a while to see if something new has been uploaded.  Obviously, if fresh, new content, isn&#8217;t always being provided, the listener will most likely lose interest and start frequenting a different band&#8217;s profile (one who is on top of things and releases new tracks once a month).</p>
<p>The benefits of constructing a professional online identity are virtually limitless.  Students applying to university can use their online profiles as a supplement source of supportive information which makes the applicant more attractive (they will most likely search for each applicant&#8217;s name online to see what comes up).  Entrepreneurs can use their online profiles as surrogate business cards and free methods of advertising; not only will it help get your name out there, but it will associate your business services with a broader demographic of people.  And, likewise, those who are seeking employment can build a professional based blog and MySpace profile to function as an online resume and offer the opportunity to graphical display personal conquests (projects that you&#8217;ve contributed to, etc.).</p>
<p>In My Opinion<br />
In order to be the most successful in life, I have always believed that you need to exploit every available resource that has the potential of contributing to your life goals.  In today&#8217;s day and age, technology is certainly a viable medium for presenting yourself as the professional you are.  This can be done in a melody of ways, the most prominent being the construction of an online profile that reflects your professional side.  These online profiles, in my opinion are perfect resources for establishing your online identity; despite the fact that most MySpace pages and Facebook profiles are littered with irrelevant teenage gibberish, the potential to exploit the functions and popularity of online profiles is just too much to pass up.  That&#8217;s precisely why the 2008 candidates have dedicated so much time and effort into their online identities.</p>
<p>So what are you waiting for?&#8230; start your own blog, build a social networking profile, and start to make the Internet work in your favor.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/construct-your-online-identity-carefully/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Tell Who Sends Quality Newsletters</title>
		<link>http://www.pcmech.com/article/how-to-tell-who-sends-quality-newsletters/</link>
		<comments>http://www.pcmech.com/article/how-to-tell-who-sends-quality-newsletters/#comments</comments>
		<pubDate>Fri, 27 Jul 2007 03:13:53 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://www.pcmech.com/article/how-to-tell-who-sends-quality-newsletters/</guid>
		<description><![CDATA[We're all familiar with online newsletters -- in fact, many of you might even be reading this article on one -- and we're all familiar with junk mail, not only the discount drug variety, but also the repetitive banter and useless kind. These are the emails which are not simply spam, as they come from an established online source, but are the emails which cross the line into being pointless and uninformative advertisements, doing nothing but discrediting the emigrating source and filling our inboxes.]]></description>
				<content:encoded><![CDATA[<p>Since the dawn of email, companies have repeatedly abused the Internet&#8217;s expansive popularity as a means to distribute information on upcoming promotions, structural changes to their websites, and public oriented company news &#8212; all through the use of email newsletters. We&#8217;re all familiar with online newsletters &#8212; in fact, many of you might even be reading this article on one &#8212; and we&#8217;re all familiar with junk mail, not only the discount drug variety, but also the repetitive banter and useless kind. These are the emails which are not simply spam, as they come from an established online source, but are the emails which cross the line into being pointless and uninformative advertisements, doing nothing but discrediting the emigrating source and filling our inboxes.</p>
<p>The concept of company newsletters is great: a cost effective method of sending out informative broadcasts to thousands of members of their target audience (people who admire the company enough to ask to be on their mailing list). In reality, it is the company&#8217;s dedication to providing quality content that drives one to even want to subscribe to their email newsletter. Take this site for example; PC Mechanic is renowned for its unprecedented ability to deliver quality computer related content and its <a href="http://www.pcmech.com/newsletter/">newsletter</a> (in addition to its <a href="http://www.pcdailytips.com/">daily tips</a>) support this attribute of PC Mechanic. Despite the occasional email-based advertisement regarding the site&#8217;s products, PC Mechanic&#8217;s newsletters are informative, reliable, and entertaining. The same cannot be said for many other company newsletters, and while I&#8217;m not going to point fingers, I am going detail the ascending calamity that many company newsletters are becoming a part of.</p>
<p>Avoiding the obtrusive junk mail that tries to pass itself off as being a company newsletter isn&#8217;t ridiculously difficult. A vast majority of these phony email newsletters emigrate from sites that force their newsletter upon you. These are often commerce sites that, once you do a transactions through, already have your email on file (for purchase confirmation letters, etc.), or companies that have little depth to their main site. Simply resisting the &#8220;join our newsletter&#8221; pop-ups and unchecking the persistent &#8220;check here to receive site updates, promotions, and more&#8221; options that appear after providing your email to online commerce sites, will drastically reduce the magnitude of useless and uninformative mail you receive in place of pertinent company newsletters. GoDaddy, another site which does, in fact, offer a rather informative and entertaining newsletter service, allows users to choose whether or not they would like to receive email updates on sales and upcoming promotions. Despite having promotional emails that in reality are mildly obtrusive, simply having this option to select which email newsletters you would like to receive is a Godsend.</p>
<p>Identifying which email newsletter services are actually worthwhile is slightly more difficult. If a site regularly publishes content and doesn&#8217;t force its newsletter on you, you are pretty safe subscribing to their service. Other clues that indicate that a site&#8217;s newsletter is more than just trivial promotions and advertisements can be uncovered as well. If a site willingly publishes, or archives, back issues of its newsletter, you can always take a gander at the depth of the email&#8217;s content before subscribing. Additionally, if a site broadcasts that it is easy to unsubscribe from their mailing service and then promotes the fact that they don&#8217;t redistribute your email address to spammers, it is more likely that you will be receiving quality newsletters as opposed to uninformative trash. Distinguishing which sites are going to fill your inbox with junk newsletters and which ones aren&#8217;t is often a trial and error ordeal &#8212; it is tough to find sites, like PC Mechanic, which email quality newsletters with regularity.</p>
<h3>In My Opinion</h3>
<p>I can&#8217;t necessarily blame the vast number of sites which use email newsletters as a means to broadcast uninformative advertisements and useless banter and testimonials. All in all, it is just another source of income, and over time, the natural selection of the Internet will weed out newsletters that nothing but junk mail in comparison to some of the quality email-based content that is available. While it may be a hassle to continuously try out new newsletters and then unsubscribe from their mailing service, it is often worth it in the end if you run across a site like ours which offers superb content both on the site and through its email newsletter. One tip to subscribing is that you can set up a separate account specifically for trying newsletter subscriptions, so in case you do receive undesirable content even after unsubscribing, your main account won&#8217;t be bombarded by it.</p>
<p>It seems like more and more the Internet is overflowing with ludicrous and unnecessary websites and services; many of whom won&#8217;t last long in the highly competitive World Wide Web. Chances are you won&#8217;t tumble across too many quality newsletters. But, if you look for the aforementioned indications that the site you are visiting has a reliable and informative newsletter, the hunt for quality email-based information should be relatively easy.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/how-to-tell-who-sends-quality-newsletters/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Use Online Forums Instead of Annoying Phone Support</title>
		<link>http://www.pcmech.com/article/use-online-forums-instead-of-annoying-phone-support/</link>
		<comments>http://www.pcmech.com/article/use-online-forums-instead-of-annoying-phone-support/#comments</comments>
		<pubDate>Thu, 12 Jul 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://49297199</guid>
		<description><![CDATA[Tired of fumbling through tiers of tech support operators on the phone to answer a question? There are certainly better ways to find an answer.]]></description>
				<content:encoded><![CDATA[<p>Ah, the dreaded phone support frenzy.&nbsp; You call in and are greeted by the warming tones of a recorded answering service, you wait on hold, you speak to someone who emits barely audible and faintly distinguishable English, and then you are back on hold again.&nbsp; When technical calamities and installation queries force you into contacting phone-based tech support, you are often thrown into a lengthy and often futile conversation with an alleged computer technician.&nbsp; But wait; there is a light at the end of the tunnel; a fair bit of salvation: online forums and online support services. </p>
<p>The quickly evolving online community is a growing outlet to the hassles of phone support lines.&nbsp; While the benefits of phone based tech support often include solid and accurate responses to your technical troubles, variously online communities accommodate your requests in a timely manner without the auxiliary interfacing with automated phone services, extended periods of waiting on hold, and being passed around from tech to tech re-explaining your problem without persistent answers.&nbsp; There are definitely pros and cons to both online support communities, like the PC Mechanic forums, and direct technical service phone lines.&nbsp; Progressively, however, it is becoming easier and easier to find assistance through the many active and well moderated online support sites.&nbsp; Such truth was presented thoroughly to me just a few days ago. </p>
<p>At work this week, a customer brought in a seasoned Kenwood graphic EQ that supposedly was working previously, but no longer will turn on.&nbsp; Both my boss and my associate, in addition to myself, were dumbfounded by the apparatus: it wasn&#8217;t like any of today&#8217;s EQ devices and it certainly wasn&#8217;t labeled well enough for us to determine whether there was simply an issue with how it was wired into his vehicle.&nbsp; I searched online for more distinctive wiring guides while my associate called the Kenwood support line.&nbsp; Within a few minutes, I found definitive and helpful information that suggested the device wasn&#8217;t wired correctly into his vehicle.&nbsp; Sufficient evidence existed on online communities to solve our customer&#8217;s issue and finding it didn&#8217;t even require setting up an account on the forums and making a new thread.&nbsp; Meanwhile, my associate was still being passed around from technician to technician.&nbsp; Fortunately, after about 25 minutes, he was able to talk to someone who relayed the same conclusion that I found on the Internet; he, however, wasn&#8217;t able to provide an accurate wiring diagram via the telephone.&nbsp; In this case, not only was time and money saved, but the same conclusion was reached through the use of online communities.&nbsp; </p>
<p>Later this week, the regional technical specialist for Pioneer came into our store to show us the brand new Mobile Electronics Live (MEL) community that Pioneer has launched.&nbsp; This service not only hosts forums that are exclusive to authorized Pioneer dealers, but it also hosts a variety of official installation guides and technical videos.&nbsp; The resources of MEL parallel those available through Pioneer&#8217;s phone service, but offer the ability for installers to communicate and share installation information with each other &#8212; something that the technical phone service doesn&#8217;t.&nbsp; MEL also permits stores to show off the custom work they do with Pioneer products.&nbsp; The immediate popularity of MEL demonstrates the growing popularity of online communities and the steady progression away from phone based support lines: the forums and features available through Pioneer&#8217;s MEL permit a greater level of information sharing that isn&#8217;t possible via telephone.</p>
<h3>In My Opinion</h3>
<p>As online communities continue to grow and manufactures, like Pioneer, begin to host more dynamic forums and online services, people&#8217;s reliance upon phone-based support will continue to diminish.&nbsp; While both mediums may vary well lead to the same conclusion, experience dictates that online searches and forum posts yield accurate responses in a more time efficient manner.&nbsp; Additionally, the ability to use the Internet to display installation videos and images alleviates the need to contact tech support with individual queries regarding how to install a unit.</p>
<p>My predictions indicate that manufactures will more frequently promote online support services rather than phone based support.&nbsp; Not only will the technicians be able to respond to posts on forums (instead of phone requests), they can actually post videos and images to help their customers.&nbsp; The evolving online community is steadily growing in popular in comparison to phone based support lines.&nbsp; If you&#8217;re looking for specific information regarding electronic units, I would highly suggest looking on the Internet before calling the manufacturer.&nbsp; Chances are you&#8217;ll find what your looking for somewhere on the &#8216;net before you&#8217;ll be successful in getting a hold of an actual human on the company&#8217;s tech support line.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/use-online-forums-instead-of-annoying-phone-support/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What Happened to Product Knowledge?</title>
		<link>http://www.pcmech.com/article/what-happened-to-product-knowledge/</link>
		<comments>http://www.pcmech.com/article/what-happened-to-product-knowledge/#comments</comments>
		<pubDate>Thu, 28 Jun 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://1578821827</guid>
		<description><![CDATA[Taking a trip down to the retail store for computer hardware isn't helpful anymore.]]></description>
				<content:encoded><![CDATA[<p>About a month ago, I was sitting at my computer desk working away on a class presentation when my monitor suddenly went completely black.&nbsp; I had little attachment to the rather inexpensive 17&quot; BENQ, but a great portion of my class grade was reliant upon my completion of the presentation.&nbsp; So,&nbsp; immediately I started to try various quick fixes and troubleshooting procedures to narrow down the problem.&nbsp; I tried a new power cable, a new DVI cable, and I even tried switching to analog input.&nbsp; Nothing.&nbsp; At this point, I was determined not to let this slight calamity destroy my chances of getting a great grade on the presentation.&nbsp; So, I walked down stairs and stole my parent&#8217;s monitor (surprisingly, they didn&#8217;t mind).&nbsp; </p>
<p>After three weeks of &quot;sharing&quot; monitors with my parents, I decided it was about time to purchase a new one.&nbsp; I made the obligatory post on the PC Mechanic Forums and I browsed meticulously throughout ZipZoomFly&#8217;s monitor selection.&nbsp; Yet, I just couldn&#8217;t commit to a monitor purchase without physically seeing and testing the monitor out in person.&nbsp; What&#8217;s wrong with wanting to get the full monitor experience before buying?&nbsp; So, I hit the strip with every intention of finding the perfect monitor.&nbsp; Were my adventures successful?&nbsp; Unfortunately not; and it wasn&#8217;t because there were a lack of applicable monitors &#8212; it was due to a much deeper issue that struck a chord with me.&nbsp; This generally not-so-picky shopper uncovered the awful truth that salesmen are no longer experts in their field.&nbsp; This week&#8217;s Kudos &amp; Calamities focuses primarily on this very misfortune that is spreading through the digital retail world: salesmen, in general, are not well versed in the products they sell.&nbsp; </p>
<p>So as I sit here in front of my parent&#8217;s monitor (once again), I try to compile my rage against the three&nbsp; large retail stores of which I walked out of without a new monitor, filled with disappointment.&nbsp; I&#8217;ll give you the play-by-play from my eyes &#8212; through the point of view of an individual who has a pretty good understanding of computers and is ready to spend money.</p>
<p>My first inquiry was a pretty basic question; I wanted to start a conversation and test the waters.&nbsp; &quot;Will older video cards such as the nVidia 6 series support these wide-screen resolutions?&quot;&nbsp; To my surprise (and frustration), all three were pretty dumbfounded and either admitted directly that they didn&#8217;t know for sure or faked a response that covered their butts if they were wrong: &quot;Don&#8217;t hold me too it, but I believe that this monitor should work.&quot;&nbsp; Now, it wasn&#8217;t the fact that they didn&#8217;t know the answer to my question that made me mad, it was the fact that they didn&#8217;t offer to research my query or verify with someone more knowledgeable. Of all that a monitor salesman should know, one of the most important things would obviously be compatibility.&nbsp; </p>
<p>My second question was one that was really important to a student working two jobs and barely bringing home enough to cover weekly entertainment.&nbsp; &quot;Of all these models, could you describe their warranties and which one permits me to bring defective units back here for a new one?&quot;&nbsp; Apart from knowing a few basic details (such as the length of the warranty), which were probably inscribed on the product&#8217;s spec sheet, none of the associates were versed enough in their products to detail the differences between the warranty plans.&nbsp; At this point, I was not only frustrated with the employees, but I was ready to walk out the door with my money in hand and buy a monitor online without seeing the product in person.&nbsp; It&#8217;s not like the salesmen are answering my questions or demonstrating their product knowledge anyway.</p>
<p>By this point, I wasn&#8217;t expecting any of the salesmen to know the answer to my third (and final) question, but I went ahead and asked.&nbsp; &quot;What are the terms of the mail-in-rebates and how long does it take before I get my money back?&quot;&nbsp; To no surprise, the sales associates didn&#8217;t know and didn&#8217;t show any enthusiasm is looking this information up.&nbsp; On that note, I promptly thanked the salesmen for their time and left the store with steam shooting out my ears and my tail between my legs.</p>
<p>Perhaps poor product knowledge is simply a regional issue, or merely bad luck on my part, but I honestly hope that this isn&#8217;t becoming a nationwide plague.&nbsp; As I mentioned earlier, this deficiency in product knowledge really struck a chord with me.&nbsp; I, myself, am a salesman.&nbsp; I started working in sales for a specialty mobile electronics store. I&#8217;m one of a few employees there and I am in the process of becoming fully acquainted with the products we sell.&nbsp; I am far from knowing every last detail about every product we sell, but I am upfront and honest with my customers.&nbsp; I tell them that I am still familiarizing myself with my products and always offer to research prices and features.&nbsp; I do not hesitate to ask my fellow associates or my boss when I am stumped by a customer&#8217;s question and I never tell the customer something that I am not 100% knowledgeable about.&nbsp; Unfortunately, the three salesmen I encountered on my quest to purchase a new computer monitor behaved in a very unprofessional manner. Not only were they uninformed about their products and store promotions, they didn&#8217;t offer to do any research for me.&nbsp; They didn&#8217;t convince me that they wanted to make a sale and they failed to demonstrate any desire to do professional business with me.</p>
<p>I certainly hope my failed attempts to purchase a monitor shine light on a growing calamity in retail stores.&nbsp; I find that I am asking myself more frequently, &quot;What happened to product knowledge?&quot; before leaving the store with my money in hand.&nbsp; All I can say is that you are going to need to do some research of your own before going into a retail store and purchasing products &#8212; chances are, the sales associates are equally uninformed on the products available.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/what-happened-to-product-knowledge/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is Google Invading Your Privacy?</title>
		<link>http://www.pcmech.com/article/is-google-invading-your-privacy/</link>
		<comments>http://www.pcmech.com/article/is-google-invading-your-privacy/#comments</comments>
		<pubDate>Thu, 14 Jun 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://323635752</guid>
		<description><![CDATA[Google's Street View tool first offers waves of delight, shortly followed by the realization of the invasion of privacy]]></description>
				<content:encoded><![CDATA[<p>Privacy issues regarding the publication of a person&#8217;s photograph without their explicit permission have been debated for years.&nbsp; Newspapers, Internet sites, and magazines are all faced with difficulties when it comes to publishing photographs in which bystanders are visible and recognizable.&nbsp; Different countries have laws dealing with these issues and fortunately, most places are pretty strict when it comes to personal privacy.&nbsp; In general, photographs in which bystanders are caught in their private lives and are recognizable are not permitted to be printed or distributed without the individual&#8217;s consent.&nbsp; Yet, in many situations privacy regulations are disregarded. It is this very concept that is troubling many privacy advocates who are in opposition to Google&#8217;s latest technological marvel. </p>
<p>Late in May, Google launched a new application properly titled [Street View] (http://maps.google.com/help/maps/streetview/).&nbsp; As many of you may or may not know, Street View is an extension of Google&#8217;s overhead map service that offers full 360 degree panoramic scenes (taken from a special camera device attached to a van) of large cities including San Francisco, Las Vegas, and New York.&nbsp; At its core, Street View permits full navigation of cities from the street level.&nbsp; The buildings, street signs, cars, etc. are each represented accurately from all available angles and while this seemingly handy tool has its benefits, privacy advocates are in high protest to Google&#8217;s potentially obtrusive Street View application.</p>
<p>The <a href="http://daily.stanford.edu/article/2007/6/7/streetViewALittleTooCloseForComfort">main controversy</a> arises from the fact that people are photographed and placed on Google&#8217;s Street View service unbeknown to them.&nbsp; So far, various embarrassing and potentially socially threatening actions have been captured, including a disturbing photograph of a man urinating on the road side and a lady accidentally revealing her undergarments while getting into a truck.&nbsp; But these are just a few of the many Google endorsed privacy invasions.&nbsp; License plate numbers are shown to the world, addresses of apartments and homes are broadcast publicly, and plenty of people are recognizably photographed outside their offices and homes.&nbsp; Many fear that people&#8217;s private actions could end up on Street View and others fear that criminals could use the service to associate people with their addresses and vehicles to plan robberies or stalk their victims.&nbsp; At this point in Street View&#8217;s short career, it certainly appears that privacy advocates will continue to argue that Street View is simply too invasive.&nbsp; However, due to the outcry, some clearly offending scenes such as the ones mentioned above have since been taken down by Google.</p>
<p>Google, along with those who support Street View, retaliate to these accusations claiming that the photographs taken are no different that images that could be captured by any individual with a camera.&nbsp; Others support the Street View service claiming that it comes in handy when scouting out new areas of the city, finding restaurants, and even locating new places of entertainment.&nbsp; Many argue that it&#8217;s a lot more convenient to use Street View to determine whether or not a specific night club is in a safe part of town than to drive or walk there.&nbsp; Despite obvious privacy issues, Google&#8217;s Street View is loaded with various time saving and convenience features.</p>
<h3>In My Opinion</h3>
<p>I have to admit that I was pretty amazed when I first visited Google&#8217;s Street View.&nbsp; The high resolution images and outstanding navigational abilities of the application shocked me and, like many, I was soon overcome with disgust.&nbsp; It is my opinion that Street View is simply way to invasive and obtrusive.&nbsp; I&#8217;m a huge advocate for individual privacy and believe strongly that Google&#8217;s Street View crosses the line between accidentally capturing someone at a gas station pump in the background of a newspaper headline image and blatantly publishing personal information (license plate numbers, address, etc.) of people without their consent.&nbsp; My original fascination with Street View was soon banished and I joined the ranks of the millions who are opposed to this profound privacy breech by the ever-so-popular search engine service, Google.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/is-google-invading-your-privacy/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The Future of Touch Screens From Microsoft</title>
		<link>http://www.pcmech.com/article/the-future-of-touch-screens-from-microsoft/</link>
		<comments>http://www.pcmech.com/article/the-future-of-touch-screens-from-microsoft/#comments</comments>
		<pubDate>Thu, 31 May 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Microsoft revealed a secret project under development for the past 5 years.  Will it catch on?]]></description>
				<content:encoded><![CDATA[<p>Imagine a computer with an advanced, multi-purpose, touch screen that responds to your every touch.&nbsp; Now rotate the screen onto a horizontal plane and imagine a slew of interactive photos, puzzle pieces, or even paint cans, appearing on the screen so you can tangibly manipulate the objects with virtual freedom.&nbsp; Such a device would awe and amaze you, wouldn&#8217;t it?</p>
<p>Five years ago, a couple Microsoft developers and designers imagined this very concept: a surface computer embedded into end tables or bars that responds to multiple touch inputs and permits hands on manipulation of digital objects on the screen.&nbsp; A multitude of prototypes were developed and a series of special motion and touch sensing hardware was perfected into what is now known as the <a href="http://blog.wired.com/gadgets/2007/05/first_look_micr.html">Microsoft Milan</a>.&nbsp; A few days ago, Microsoft demonstrated its latest computer / entertainment device to the public.&nbsp; After five years of top-secret development, the Milan is Microsoft&#8217;s first device in a potentially long line of &quot;surface computers&quot; Microsoft hopes to develop.</p>
<p>The Milan, at its core, is a high-end computer running a compilation of motion sensing and touch sensing software in the Windows Vista environment.&nbsp; A projector is utilized to format the interactive images onto the screen, which is bordered by various infrared cameras.&nbsp; The cameras are used pinpoint the location of an interference on the screen (whether this be a stylus or a finger).&nbsp; The hardware, says Microsoft, is extremely durable and resistant against spills and excessive wear and tear that would come from a device which invites its users to touch it.&nbsp; The <a href="http://news.com.com/2300-1041_3-6186511-2.html?tag=ne.gall.pg">first public demonstration</a> of the Milan showcased various sample applications, including a painting program and a photo manipulation program. </p>
<p>The Milan is currently expected to sell at roughly $10,000; a price tag that&#8217;s a little too high for most home technology enthusiasts.&nbsp; Microsoft does, however, expect to have the Milan (or a Milan-like device) on sale for a much more reasonable price over the course of the next few years.&nbsp; For the time being, Microsoft plans to work closely with public venues, such as hotel lobbies and casinos, as initial locales to showcase the breathtaking surface computer technology.&nbsp; The potential of the Milan is essentially limitless.&nbsp; With various software developers working to create unique applications for the Milan, a few compelling and exciting ideas have already begun development such as programs to build virtual puzzles simply by touching and dragging your finger across the screen.&nbsp; Microsoft&#8217;s Milan is really a step forward in socially oriented computer products.&nbsp; In addition to their Xbox gaming console, the Milan will attract and cater to a crowd with photo sharing applications and interactive jukebox programs.</p>
<p>What&#8217;s really compelling about the Milan is its ability to be fitted into various pieces of furniture and venues.&nbsp; From coffee tables at Starbucks to local bars and clubs, the Milan could easily function as both an entertainment device and a medium to order drinks and food without having to wait for a waitress or stand in infamously long coffee shop lines.&nbsp; At product expositions and museums, the Milan can function as a medium to simulate physical contact with objects and their environment.&nbsp; And in the classroom, the Milan can offer various educational purposes through interactive and always changing flash-card games and dynamic puzzle solving games.&nbsp; Obviously, the Milan is a versatile device with plenty of potential.</p>
<h3>In My Opinion</h3>
<p>The real question on my mind is whether or not the Microsoft Milan will be successful.&nbsp; As far as I can tell, the concept of surface computers has unlimited potential: the Milan is equally capable of functioning well in public casinos as it is in the classroom. The images and articles I have seen on the Milan are truly captivating.&nbsp; <a href="http://news.com.com/How+the+Milan+table+PC+was+born/2100-1041_3-6186928.html?tag=ne.gall.related">The story</a>&nbsp;of how a few Microsoft employees crafted the ground breaking concept and secretly made it a reality over the course of five years indicates that the Milan is more than just another whimsical touch-screen monitor for fast food joints.&nbsp; It points toward a successful integration in public venues.&nbsp; Even the versatility of the Milan suggests that it will intrigue those looking for a stylish means to implement technology into their daily lives in more dynamic and interactive ways.&nbsp; While the hefty $10,000 price tag is sure to deter some initial sales of the Milan, I can easily see the device becoming a popular entity in trendy bars, casinos, and hotels in the near future.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/the-future-of-touch-screens-from-microsoft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Preventative Measures For Copyrighted Material on MySpace and YouTube</title>
		<link>http://www.pcmech.com/article/preventative-measures-for-copyrighted-material-on-myspace-and-youtube/</link>
		<comments>http://www.pcmech.com/article/preventative-measures-for-copyrighted-material-on-myspace-and-youtube/#comments</comments>
		<pubDate>Thu, 17 May 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Ryan takes a look at the concept and possible solution behind preventing the posting of unauthorized copyrighted material on MySpace and YouTube]]></description>
				<content:encoded><![CDATA[<p>In recent months, both MySpace and Google (the parent company of YouTube) have had to deal with stressing lawsuits and legal actions regarding the unauthorized use of copyrighted materials on their websites.&nbsp; With the threat of further legal pursuits, both companies have sought new ways to control content on their sites and prevent the distribution of copyrighted material.&nbsp; MySpace has drafted a new tactic called &quot;Take Down Stay Down,&quot; which basically summarizes their new content management initiative: copyrighted material which is taken down from their site will be forever filtered and prevented from ever reappearing on different MySpace profiles.&nbsp; Likewise, Google is implementing a service titled &quot;Claim Your Content,&quot; on YouTube to enable copyright owners to identify unauthorized use of their material to have it taken off the site permanently.&nbsp; Both systems look to be extremely promising, but how efficient will they actually be in reducing the unauthorized hosting of copyrighted material?</p>
<p>Both content management systems are utilizing software similar to <a href="http://www.audiblemagic.com/index.asp">Audible Magic</a>, a content protection program that forms digital fingerprints of videos and songs.&nbsp; This new technology will not only allow copyright owners to notify MySpace and YouTube that their material is being redistributed without authorization, but will also permit the respective websites to add the material to a content filter which will prevent the same video or song from ever being uploaded to a web page again.&nbsp; With the pressures of more lawsuits lurking around the corner, the solutions implemented by MySpace and Google are seeming to please copyright publishers and major media companies such as Fox and NBC.&nbsp; While their content filtering software is obviously very confidential, evidence shows that the digital fingerprints the filters will use are capable of identifying and blocking video and audio clips of differing quality, resolution, and length.&nbsp; </p>
<p>Is this the solution to the copyright scrambles online entertainment and social networking sites have been facing? Will this system prove to be as effective as MySpace and Google hype it up to be?&nbsp; These questions, which are flooding the minds of many, cannot truly be answered until after each respective filtering software solution is fully implemented.</p>
<h3>The Controversy</h3>
<p>Despite the promises of &quot;Take Down Stay Down&quot; and &quot;Claim Your Content&quot; to prevent the redistribution and unauthorized use of copyright material, many doubt that MySpace and YouTube will effectively be able to purge their sites of illegally uploaded content.&nbsp; Many fear that the filter system will be much too strict, eventually blocking videos and songs which are neither copyrighted material, nor previously identified in the filter system. Others have observed the history of digital rights management and copyright protection and assume that MySpace and YouTube&#8217;s new systems will be just as susceptible to hackers.&nbsp; Critics of &quot;Take Down Stay Down&quot; and &quot;Claim Your Content&quot; state that it is only a matter of time before hackers circumvent the filters and upload copyrighted material to their sites.&nbsp; Only time will tell if the new systems are capable of staying on top of the unauthorized use of copyright material.&nbsp; </p>
<p>MySpace, however, has already come forward and addressed those who doubt their content filter&#8217;s integrity. MySpace claims that their digital fingerprinting technology will <em>only</em> block previously identified copyrighted material and will be complex enough to present even the most dedicated hackers with difficulties.&nbsp; Although MySpace and Google are both confident about their new filter software, each company has noted that they will have to continue fighting the illegal use of copyrighted material on their sites in new and dynamic ways to alleviate the threat of potential lawsuits; keeping the support of the media companies will be vital in avoiding multi-million dollar legal battles.</p>
<h3>In My Opinion</h3>
<p>In all honesty, it is about time that MySpace and YouTube implemented an automated &quot;take down&quot; system.&nbsp; Copyright infringement is a major crime and massive media corporations aren&#8217;t going to sit by quietly while MySpace and YouTube profit off the unauthorized use of copyright material.&nbsp; I actually have quite a bit of faith in &quot;Take Down Stay Down&quot; and &quot;Claim Your Content.&quot;&nbsp; Each respective filtering system looks promising enough to proficiently reduce the amount of unauthorized copyrighted materials on both MySpace and YouTube.&nbsp; While I do feel as if hackers will eventually penetrate the system, as they have done with all previous methods of content protection, MySpace and YouTube are motived (they don&#8217;t want to lose millions of dollars in lawsuits) to permanently purge copyrighted materials from their sites.</p>
<p>Hopefully, the implementation of new filter software will not upset dedicated site visitors; it is hard to tell whether the potential loss of MySpace and YouTube visitors will disrupt each site&#8217;s success in their respective Internet niches.&nbsp; Nonetheless, something had to be done to combat the excessive unauthorized use copyrighted materials on the massive social networking and online entertainment sites of MySpace and YouTube.</p>
<p>This is certainly a step forward in the fight to prevent the unauthorized use of copyrighted material on the Internet.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/preventative-measures-for-copyrighted-material-on-myspace-and-youtube/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>James Burgett: Saving Our Planet One Computer at a Time</title>
		<link>http://www.pcmech.com/article/james-burgett-saving-our-planet-one-computer-at-a-time/</link>
		<comments>http://www.pcmech.com/article/james-burgett-saving-our-planet-one-computer-at-a-time/#comments</comments>
		<pubDate>Thu, 03 May 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false">http://698696211</guid>
		<description><![CDATA[Ryan takes a look at a person responsible for recycling unwanted computers and giving them to those who need them.]]></description>
				<content:encoded><![CDATA[<p>This week&#8217;s Kudos and Calamities installment doesn&#8217;t discuss the latest online censorship debates nor the most recent Apple developments.&nbsp; In fact, this week&#8217;s Kudos and Calamities has very little to do with advancements (or conundrums) in the technological ecosystem.&nbsp; This week&#8217;s Kudos and Calamities, however, commends the valiant efforts of an ex-junkie who has revolutionized the computer recycling world.&nbsp; <a href="http://www.vintage.org/2002/main/bio.php?id=12">James Burgett</a> has distributed over 16,000 repaired and recycled computers to schools and individuals who cannot afford personal computers and he properly processed thousands of tons of electronic waste annually.&nbsp; James Burgett&#8217;s actions are deserving of recognition and this week&#8217;s K &amp; C pays tribute to his ongoing efforts to protect the planet from contaminating e-waste while supplying the economically unfortunate with fully functioning computer systems.</p>
<p>During his teenage years, <a href="http://www.wired.com/culture/lifestyle/news/2002/05/52669#">James Burgett</a> developed a serious drug addiction and persistently scrambled for money to feed his drug habit.&nbsp; While living on the streets, Burgett&#8217;s affinity toward computers manifested itself: he began to salvage discarded computers, repair them, and sell them for money which he used to fund his addiction.&nbsp; Time passed and James decided to turn his life around.&nbsp; Burgett conquered his drug addictions, stating that &quot;giving away computers gave him a self image&quot; that he no longer needed drugs to attain, and rapidly started to collect and repair discarded computers for charity purposes.&nbsp; His initiative escalated, and thirteen years later, Burgett runs one of the largest computer recycling nonprofit organizations in the United States, the <a href="http://www.accrc.org/">Alameda County Computer Resource Center</a>.&nbsp; Through his organization, James is not only distributing free computers to schools and individuals, but he is also responsible for properly disposing of thousands of tons of electronic waste that would otherwise contaminate the environment.</p>
<p>Recently, Burgett was featured on <a href="http://www.cnn.com/SPECIALS/2007/cnn.heroes/interactive/gallery.heroes/frameset.7.exclude.html">CNN&#8217;s &quot;Heroes&quot; segment</a>, where he was commended for both his charity and environmental work.&nbsp; This honorable recognition truly illuminated the efforts of Burgett, who is responsible for making the lives of hundreds of people more prosperous.&nbsp; The mini-documentary was both inspirational and educational; encouraging everyone to think twice before simply throwing away an old computer which still has the potential of being repaired and reused.&nbsp; James&#8217; heartbreaking story is exceptionally inspirational; Burgett is not only helping to eliminate electronic waste contamination, but also helping the lives of hundreds of people.&nbsp; James is extremely proud of his work and the work of his employees, most of whom are ex-convicts and prior drug addicts, stating that their charity work gives them a purpose to get up every morning and help others.&nbsp; In addition to a personal interview with James, <a href="http://www.cnn.com/SPECIALS/2007/cnn.heroes/">CNN played videos</a> of Burgett&#8217;s moderately large warehouse, which houses stacks of reusable computer components and waste materials waiting to be repaired or disposed of appropriately.&nbsp; James concludes his interview by saying that his current project is &quot;the best thing he has ever done.&quot;</p>
<p>Getting into some statistics, The Alameda County Computer Resource Center is responsible for properly processing more than 200,000 pounds of <a href="http://en.wikipedia.org/wiki/Electronic_waste">electronic waste</a> each month.&nbsp; When disposed of incorrectly, electronic waste releases dangerous toxins into the environment, and thus, Burgett and his team are pioneers in the recycling and reduction of electronic waste: their efforts are helping to significantly reduce contamination and toxicity levels in their region.&nbsp; Furthermore, Burgett and his team have repaired and distributed over 16,000 computers to those in need.&nbsp; Burgett claims that they have had computers on all the world&#8217;s continents, and states that he has regularly contributed computers to nations such as Cambodia, Chile, and Vietnam to help with research, education, and government operations.&nbsp; Individuals in need of a free computer only need to fill out a request form and to wait temporarily for their request to be examined.&nbsp; Burgett&#8217;s charity initiative has helped bring additional mediums of education to the world&#8217;s economically unfortunate: he is a modern <a href="http://en.wikipedia.org/wiki/Philanthropist">philanthropist</a>.</p>
<h3>In My Opinion </h3>
<p>I cannot express how much I admire James Burgett for his valiant efforts.&nbsp; Not only has he successfully found a profession in which he can wake up every morning and feel as if he has a purpose in life, but he is also helping thousands of students and adults around the world develop computer oriented skills.&nbsp; Additionally, his efforts to reduce electronic waste are ground breaking. Each and every individual should be reminded by Burgett and his team that there are more efficient ways to dispose of our electronics.&nbsp; Whether that may be donating the items to charity or sending the items to hazardous waste facilities, we cannot continue destroying the environment with toxins and waste.&nbsp; In tribute to James and his motivational profession, I would like to personally say &quot;thanks&quot; for all you are doing to help save the planet and provide the economically unfortunate with functional computers systems.&nbsp; As noted by CNN, James Burgett is truly a hero.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/james-burgett-saving-our-planet-one-computer-at-a-time/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Technology as a Lifeline</title>
		<link>http://www.pcmech.com/article/technology-as-a-lifeline/</link>
		<comments>http://www.pcmech.com/article/technology-as-a-lifeline/#comments</comments>
		<pubDate>Wed, 18 Apr 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Ryan takes a look at how technology helped friends and family through the Virginia Tech massacre.]]></description>
				<content:encoded><![CDATA[<p>If you&#8217;ve been active on the Internet or tuned into the news over the last couple of days, I&#8217;m sure that you are well aware of the <a href="http://en.wikipedia.org/wiki/Virginia_Tech_massacre">Virginia Tech massacre</a>.&nbsp;&nbsp; The tragedy that occurred was entirely unexpected and I, as the rest of the world, are truly sorry for those involved and impacted by the incident. This installment of K&amp;C is to both function as a recognition for the those who were injured and killed in the shooting (the affected families and student body will be in our thoughts and prayers), and to discuss the role modern technology played during, immediately after, and in the days after the tragedy on the Virginia Tech campus occurred.&nbsp;&nbsp; Technology acted as lifeline for the students and families affected by the unfortunate and depressing massacre.</p>
<p>Cellphones, social networking sites, and blogging services played, and continue to play, a crucial role on the VT campus.&nbsp; In the moments of confusion immediately after the massacre, the emotionally shocked student body was able to find solace in their mobile phones.&nbsp; Cellular towers erupted with an increase in traffic; students were calling their friends and family to inform them of their physical and emotional status and to learn more about developments made in the massacre&#8217;s investigation.&nbsp; Cellphones were truly a blessing to the parents and friends who sat nervously in front of their televisions, watching the story unfold.&nbsp; A single &quot;mom and dad, I&#8217;m okay&#8230;&quot; call in the short hours after the massacre was of indescribable significance to the parents who feared for the life of their child.&nbsp; Mobile phones functioned a means to keep family members and friends updated with one&#8217;s current condition. Camera phones also served a dual purpose in the moments after the massacre.&nbsp; Camera phones supplied some of the first photographs of the massacre and the devastation it has caused.&nbsp; As images of mourning students, distraught faculty, and heroic police officers were being captured on camera phones, the scrambled emotions of the involved parties were locked into an image for eternity.</p>
<p>Social networking sites, such as Facebook, functioned in a similar fashion.&nbsp; CNET reports that &quot;<a href="http://news.com.com/Facebook+becomes+bulletin+board+for+Virginia+Tech/2100-1038_3-6176794.html">Facebook [has] become a bulletin board</a>&quot; at Virginia Tech, stating that VT students are using the online groups to inquire about their friends and to quickly spread news throughout the entire campus.&nbsp; CNET states that Verizon Wireless noted an increase in cellphone usage on the day of the massacre by 400%, which pushed transmission towers over their threshold, and thus, Facebook groups and other online organizations&nbsp; were formed.&nbsp; While social networking services are perhaps the most suitable means to spread news and organize student based events in the post-massacre days, they also serve as a means of emotional expression.&nbsp; Thanks to blogs and social networking groups, Students are able to express their emotions to a group of highly supportive students who are undergoing similar emotionally traumatic experiences, such as losing a best friend.&nbsp; Dedicated blogs, such as <a href="http://www.collegemedia.com/">College Times</a>, provide updated news and offer services like emotional assistance.&nbsp; Computer World <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9017027&amp;pageNumber=2">comments on the use of social networking</a> at Virginia Tech, stating that Facebook was a medium in which students could stay informed on the issues, seek assistance, and communicate with friends and family.&nbsp; Social networking sites will continue to play a crucial role in the days following the VT massacre; students can log on to not only seek emotional assistance and consolation, but to also stay informed on the status of their friends who were injured both physically and emotionally in the crisis. Facebook has assisted in the organization and execution of a candlelight vigil in memory of those who were sadly victims in the massacre, and will continue to help organize similar events.</p>
<p>It is apparent that cellular phones, blogs, and social networking groups are assisting significantly in the healing process after the Virginia Tech Massacre.&nbsp; The student body is able to unite and mourn together, thanks to the aforementioned services.</p>
<p><strong>In My Opinion</strong><br />I would like to acknowledge the significant roles mobile phones and social networking sites have played over the past few days.&nbsp; Cell phones have permitted students to quickly inform and update their families with their current condition and seek family based assistance.&nbsp; Facebook and other social networking sites have initiated student oriented support groups and offer condolences to the mass number of students affected by the massacre.&nbsp; Such services have truly functioned as a lifeline for those impacted by the massacre; they are means to communicate, ask for help, and stay informed on the latest news.</p>
<p>The Virginia Tech massacre must have been a very frightening experience, and while online social groups and cellphones can never bring back one of the many innocent victims, they function as a outlet for those affected by the shooting.</p>
<p>Again, I would like to say how sorry I am for the deaths of so many innocent students.&nbsp; Such a massacre is truly horrifying and I will keep the affected families and students in my thoughts.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/technology-as-a-lifeline/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking The Apple TV</title>
		<link>http://www.pcmech.com/article/hacking-the-apple-tv/</link>
		<comments>http://www.pcmech.com/article/hacking-the-apple-tv/#comments</comments>
		<pubDate>Thu, 05 Apr 2007 12:00:00 +0000</pubDate>
		<dc:creator>Ryan Passey</dc:creator>
				<category><![CDATA[Dustbin]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Ryan discusses Apple's latest hot product and the questions about modifying/hacking the device.]]></description>
				<content:encoded><![CDATA[<p>Since the dawn of time, man has continually attempted to improve upon his tools and technology.&nbsp; Extreme car enthusiasts make engine modifications to crank out more horsepower and computer fanatics push their hardware to the limit by overclocking their processors.&nbsp; The innate desire to improve upon current technology is one of man&#8217;s greatest attributes; this inherent obsession has contributed to the development of many of today&#8217;s most popular products. </p>
<p>Recently, Apple Inc. released one of its latest devices: <a href="http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?mco=21107DE4&amp;tg_FC57F0D4=tab1&amp;nclm=AppleTV">the Apple TV</a>.&nbsp; At just under $300, the Apple TV is capable of holding roughly 50 hours of television and wirelessly broadcasts media from one&#8217;s Mac (or PC) to his wide-screen television.&nbsp; With the Apple TV you can now enjoy, from the comfort of your couch, all the TV episodes and movies you&#8217;ve downloaded (legally of course) through services like iTunes.&nbsp; </p>
<p>Within a week of the release of the Apple TV, guides on how to hack and modify the device have already begun to surface on the Internet.&nbsp; Almost overnight, hacks such as how to replace the standard 40GB hard drive with one of a larger size, and how to run Mac OS off Apple&#8217;s latest media device are flooding the Internet.&nbsp; And, not surprisingly, site&#8217;s such as <a href="http://www.appletvhacks.net/">Apple TV Hacks</a> are busy compiling extensive libraries of Apple TV modifications. </p>
<p>Now, the question on many people&#8217;s minds is what exactly drives someone to hack an device like the Apple TV.</p>
<p><strong>Why Do It?</strong><br />There are many reasons why someone would modify the Apple TV.&nbsp; First and foremost, experienced hackers and reverse engineers like to do it for the challenge; it is a quest to uncover and decipher the software in order to develop new uses for the Apple TV (such as enabling it to run off of a keyboard and mouse, and not the provided remote control).&nbsp; There are also those who simply want to increase the functionality of the Apple TV.&nbsp; Many may feel as if the standard 40GB hard drive isn&#8217;t sufficient to meet their media demands.&nbsp; Likewise, many wish to play media which isn&#8217;t acquired through iTunes (the media which is natively supported).&nbsp; </p>
<p>There exists, however, ethical boundaries when it comes to modifying the software and hardware of any device, including the Apple TV.&nbsp; Obviously, according the Digital Millennium Copyright Act (DMCA), the redistribution of copyrighted Apple software is both illegal and ethically immoral.&nbsp; Ethically speaking, one has to decide whether or not it is acceptable to increase the functionality of a device by hacking it.&nbsp; Most would agree, though, that making enhancements to your own possessions is an acceptable process.&nbsp; Nobody would prevent you from tweaking the basic sound system in your car to play media from a laptop as well, would they?</p>
<p>An <a href="http://www.pcworld.com/article/id,130298-pg,1/article.html">article on PC World</a> further investigates why someone would be interested in hacking the Apple TV.&nbsp; They point out that, at its core, the Apple TV is truly an Intel Mac which would be capable of running Windows software (after some modifications, of course).&nbsp; Consequentially, people are going to attempt running Windows software on their Apple TV.&nbsp; The article also touches on the &quot;challenge&quot; aspect of hacking the Apple TV, and focuses on the crowd who hack just for the fun of it.</p>
<p>Whether one hacks the Apple TV solely for the challenge of it or whether he aspires to transform his $300 device into a fully operational computer, controversies regarding modifications and hacks made to the Apple TV have arisen.&nbsp; </p>
<p><strong>The Controversy</strong><br />Much like the debates about <a href="http://www.cnet.com.au/games/xbox/0,239029621,240001405,00.htm">hacking Microsoft&#8217;s Xbox</a>, there are advocates on both sides of the legal line.&nbsp; It is very difficult to make a legal ruling on this, unfortunately, because hacking the Xbox or the TiVo or the Apple TV is in a legal gray area.&nbsp; There are those who believe that modifying their devices falls under fair use; they believe that, because they purchased the device, they are permitted to make altercations to it.&nbsp; To some degree, the legality of this is obvious.&nbsp; Provided that one isn&#8217;t breaking the DMCA, making software and hardware modifications is acceptable (although it does void the device&#8217;s warranty).&nbsp; In the case of the Xbox modifications, however, various actions associated with hacking the device have been ruled illegal; it is illegal to distribute a modified BIOS (due to the fact that it contains Microsoft code) and the use of a modchip to play pirated games.&nbsp; </p>
<p>In general, most of the Apple TV hacks are classified as fair use modifications.&nbsp; Those who have managed to duplicate the Apple TV Operating System are walking right into the infamous legal gray area.&nbsp; Copying and reusing the Apple TV OS breaks copyright laws and the redistribution of copyright material is most definitely illegal (hence the reason why we can&#8217;t make copies of purchased DVDs and pass them around to all our friends).&nbsp; One should proceed with caution if they are debating whether or not to hack their Apple TV; analyze the ethical and legal issues associated with the hack you want to attempt before proceeding.</p>
<p>To complicate the issue even further, PC World (and other sources) have reported that some Apple TV hackers have noticed internal &quot;clean up&quot; scripts running on their devices.&nbsp; It seems as if Apple Inc. has included a script that returns modified permissions to their original state; reversing the effects of some hacks.&nbsp; While this might impede some enthusiasts from modifying the Apple TV, Apple is going to have to try harder if they really want to eliminate the hacking of their device.&nbsp; Suspicions of an Apple backdoor have also been established, but little evidence supports this claim.</p>
<p>No apparent resolution for the controversies regarding the hacking of devices is in view.&nbsp; There will always be advocates for and against modifying devices like the Apple TV.</p>
<p><strong>My Opinion</strong><br />As far as I&#8217;m concerned, I support the hacking for devices like the Apple TV as long as no copyright laws are broken.&nbsp; I truly believe that one should be permitted to expand and improve upon the functionality of a device (that is how we have developed today&#8217;s super computers and space shuttles).&nbsp; From an ethical perspective, modifying what you own seems to be an acceptable practice.&nbsp; Yet, at the same time, I believe that it is important to respect the hard work of others; there is no need to illegally distribute software in the process of unlocking and extending the features of the Apple TV.&nbsp; </p>
<p>The controversies surrounding these issues are legitimate; yet, in a perfect world, Microsoft and Apple wouldn&#8217;t attempt to prevent those from hacking their game consoles and media players.&nbsp; It is an inherent property of man to seek out ways to improve upon their current technology and this will continue to occur no matter how many &quot;clean up&quot; scripts </p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/hacking-the-apple-tv/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using xcache
Object Caching 754/837 objects using xcache
Content Delivery Network via cdn.pcmech.com

 Served from: www.pcmech.com @ 2013-05-15 23:47:28 by W3 Total Cache --