Legally, Google has itself covered. Although the terms of service for Google Play say nothing about sharing information with app makers, it’s actually Google Wallet, the company’s Paypal-like online payment platform, that handles the transaction. And just like Paypal, Google Wallet shares buyer information with the merchant, as noted in its privacy policy.
When asked to respond, Google sent over the following statement: “Google Wallet shares the information needed to process transactions, and this is clearly stated in the Google Wallet Privacy Notice.”

Tech

If you buy Android apps from the Google Play Store, you may be surprised to know that the developers of those apps get access to your name, e-mail address and zip code.

This isn’t a new policy, and apparently it’s by design. But it was news to me, and given that Google doesn’t clearly tell users about it, I imagine a lot of people don’t know about the policy.

The issue was brought up in a blog post by Dan Nolan, a developer based in Australia, before it was picked up by news.com.au and others:

With the information I have available to me through the checkout portal I could track down and harass users who left negative reviews or refunded the app purchase. …

This is a massive oversight by Google. Under no circumstances should I be able to get the information of the people who are buying my…

Ver la entrada original 383 palabras más

Anuncios

Today, the company is upgrading the feature with a new version. It now allows for two-way transfers between a Mac or PC and the iOS and Android apps, not just one-way exhanges from phone to computer. And it’s no longer just for photos: You can use a phone to send videos, contacts or any file stored on Dropbox to a computer, and can send any file on the computer to the phone. It’s nearly as simple as the previous photo-centric version, but a whole lot more versatile.

Tech

Last May, Bump — the iOS and Android app that lets you share photos and contacts with a quick bump of two phones — introduced a feature which let you transfer pictures from a phone to a Windows PC or Mac by going to the company’s website and tapping the phone on the computer’s spacebar. It felt like a magic trick, but there was a technological symphony going on in the background, including multiple geolocation methods, analysis of data from the phone’s sensors and more.

Today, the company is upgrading the feature with a new version. It now allows for two-way transfers between a Mac or PC and the iOS and Android apps, not just one-way exhanges from phone to computer. And it’s no longer just for photos: You can use a phone to send videos, contacts or any file stored on Dropbox to a computer, and can send any…

Ver la entrada original 362 palabras más


Now because Tenable sells Internet security products, the company does have a dog in the hunt. Even so, the results are impressive given the recent new reports on the hacking of government and private networks. For example:

93% of those surveyed believe that U.S. companies are at least somewhat vulnerable to state-sponsored cyber attacks
95% believe that the U.S. government is at least somewhat vulnerable to attacks
94% believe the President should have the same authority to repel cyber attacks as he has to respond to physical attacks

Read more: Defending Against Cyber Attacks A Priority — Survey – 24/7 Wall St. http://247wallst.com/2013/02/14/defending-against-cyber-attacks-a-priority-survey/#ixzz2KvEkkQK5

24/7 Wall St.

Computer PasswordRecent cyber attacks on the Federal Reserve, The New York Times, and the Washington Post have raised the spectre of a new brand of warfare — cyber war. In a recent study conducted by two research firms for Internet security company Tenable Network Security, some 60% of respondents support increased government spending “to train and equip ‘cyberwarriors’ to defend the U.S. against outside attacks.”

Now because Tenable sells Internet security products, the company does have a dog in the hunt. Even so, the results are impressive given the recent new reports on the hacking of government and private networks. For example:

  • 93% of those surveyed believe that U.S. companies are at least somewhat vulnerable to state-sponsored cyber attacks
  • 95% believe that the U.S. government is at least somewhat vulnerable to attacks
  • 94% believe the President should have the same authority to repel cyber attacks as he has to respond to…

Ver la entrada original 103 palabras más


The invisible gorilla study is the most famous example of a phenomenom called “inattentional blindness.” When we pay close attention to one thing, we often fail to notice other things – even if they are obvious.

Manage By Walking Around

Remember the invisible gorilla video?

In an experiment popularized by the book of the same name, volunteers were told to keep track of how many times a basketball was passed between players. While the ball was being tossed, someone in a gorilla suit walked between them in plain view. Very few people noticed the gorilla because they were so focused on counting the passes.

The invisible gorilla study is the most famous example of a phenomenom called “inattentional blindness.” When we pay close attention to one thing, we often fail to notice other things – even if they are obvious. The authors of the book modified the original video to reinforce the point.  Watch the updated video to see if you notice anything unusual:

If you’re like most people – including me – you didn’t notice the person leaving the game or the background curtains change color.  You…

Ver la entrada original 253 palabras más

Lovemarks.com ‘Love’ Spot // Me quieren no me quieren…


Heartwarming, inspiring and at times providing a little tingle, this spot borrows from photographers from all over the internet, and uses their emotive images to build a narrative showcasing ‘the most important thing in the world’.

Prod Co: Star Productions
Script: Tristan Holmes
Director: Tristan Holmes
Edit: WIlliam Kalmer
Voice: Tristan Holmes