|“Downloads from iTunes are still in the AAC file format regardless of whether they are DRM-free. The AAC file format is only compatible with iPods/iPhones and a limited number of other devices. So consumers who buy downloads from iTunes are still restricted to where they can play that music regardless of whether it’s DRM free or not.”
Ben Drury as quoted in Apple iTunes tracks go DRM-free
I’m the only one in my family who doesn’t have an iPhone or iPod. I like having a radio on my MP3 player so I use a tiny player by Insignia. If I want to download something from the iTunes store, I use a third-party tool to convert the file from AAC to MP3.
So when I heard yesterday that Apple was ditching DRM altogether, it caught my attention. Would that make it easier for me to buy content from the iTunes store? Could I synch up my little Insignia player and not have to stop and covert file formats?
I think the answer right now is “no.” Besides getting rid of the number of times an iPod or iPhone owner can copy something he’s purchased, I’m not seeing a whole lot of difference for those of us who use Insignia or some other brand of player. We’ll still be shopping for MP3s at Amazon.
Update: I did find this on the Apple Web site…but it’s talking about CDs.
When you import unprotected WMA files or music from CDs, iTunes saves them as AAC files. Easily convert them to MP3 in a few clicks: Select the song you want converted, then choose “Create MP3 Version” from the Advanced menu.
|I have a feeling we’ll start seeing phishers adding Twitter to their stable of targets in 2009. That’s unfortunate, because it almost certainly means we’ll be hearing the term “twishing” being bandied about this year.
Brian Krebs, Phishers Now Twittering Their Scams
Is it a right of passage — a sign that Twitter is now deemed valuable enough that bad guys want to expolit it?
More likely it’s just a sign that Twitter needs to pay more attention to security. Businesses have been embracing Twitter lately. I wonder if this week’s breaches will cool the love affair? I’m guessing yes. Look for “enterprise ready” versions of the service coming to a firewall near you.
The global downturn has been a brutal awakening for the youngest members of the workforce—variously dubbed “the Millennials”, “Generation Y” or “the Net Generation” by social researchers.
From The Economist print edition Generation Y goes to work
|It’s not too often Google shocks people these days, but declaring its Chrome browser a finished, 1.0 product after only four months was sure one of those moments. Google, the land of the perpetual beta (five years and counting for GMail, three years for Docs), declared the bits golden code after 100 days of public consumption.
Andy Patrizio, Does Google’s Chrome Need More Polish?
Google may or may not have a secret operating system project in the works, one that mimics the interface of the Android operating system for mobile phones, but for PCs. If it does, it would fit with Google’s revised mission statement for Chrome, “to build a browser to give users a better experience of the Web.”
|The George W. Bush Library Foundation has retrieved its domain name. A small Internet company had bought www.georgewbushlibrary.com for less than $10 after it expired and then sold it back it to the library for $35,000.
Christopher Beam, answering the question Is Cybersquatting Against the Law?
I thought for sure that cybersquatting was an old dot.com relic, but apparently it’s not. MarkMonitor, a company that specializes in helping companies protect their brands on the Internet, reports that there were 428,617 instances of cybersquatting in the second quarter of 2008. That’s a 38% increase from 2007.
In the largest cybersquatting judgment ever, a federal court in the Northern District of California awarded Verizon $33.15 million. It seems that OnlineNIC had registered 663 domain names that were either identical or similar to Verizon trademarks.
According to the NY Times: OnlineNic registered more than 900,000 domain names similar to some of the world’s biggest companies, including Google, Adidas, the News Corporation’s MySpace, Wal-Mart Stores and Yahoo, Verizon said in court papers. Verizon accused OnlineNic of using an automated process to register the addresses and employing “numerous means to conceal its true identity.”
|Novatel might be on to something with its MiFi device. It’s basically a rechargeable, portable wireless router that ingests mobile data signals and spits them back out as standard Wi-Fi. The company is calling the technology an “Intelligent Mobile Hotspot,” in case you were longing for some industry jargon.
Doug Aamoth, Novatel intros ‘MiFi’ mobile broadband router
A lot of the blog buzz about MiFi pitches the idea that with your handy-dandy portable router, you’ll be carrying around a personal cloud of high-speed Internet connectivity that can be shared between multiple users and Wi-Fi devices. I can see it being useful to share connectivity, but I’m a little pessimistic about how the pricing structure for service will pan out. The label “personal cloud” sounds pricey.
|Controlling electrons — and the “magnetic moment” their spin produces — offers the prospect of breaking away from the transistor, a 1948 invention that is still the main element of computers.
Corydon Ireland, Pioneer in spintronics celebrates birthday
|Fundamentally, we believe virtualization sprawl can be a much bigger problem than physical sprawl.
Thomas Bittman, as quoted in Virtual server sprawl kills cost savings, experts warns
[kml_flashembed movie="http://www.youtube.com/v/z0pTBNkt9g4" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://www.youtube.com/v/mTbpuQzMnxA" width="425" height="350" wmode="transparent" /]