Thursday, October 17, 2013

Escape Plan: Film Review




Alan Markfield/Summit Entertainment


"Escape Plan"




The Bottom Line


Two former heavyweights can't lift the lame concoction.




Opens


October 18 (Summit Entertainment)


Cast


Sylvester Stallone, Arnold Schwarzenegger, Jim Caviezel, Curtis “50 Cent” Jackson, Sam Neill, Vinnie Jones, Faran Tahir,


Director


Mikael Hafstrom




The spirit of 1980s Cannon Films rises from the grave in Escape Plan. With Sylvester Stallone and Arnold Schwarzenegger taking on roles that, back in those days, might have been played by Chuck Norris and Dolph Lundgren, it's a chance to relive the cheesy look, demented plotting, cardboard characterizations and tacky style that characterized the lower tier of action filmmaking once upon a time. They just don't make 'em like this anymore, and a good thing, too. A portion of the Expendables audience will reliably turn out for this claptrap, but it really is a blown opportunity to do something at least amusing, if not special, with the two still-pumping muscle-bound legends.



Devising a story that would enable Stallone and Schwarzenegger to share the screen for more than a few seconds, as in the first two Expendables installments, is the only justification for a jerry-rigged venture like Escape Plan. Stallone remains his customary taciturn self in the role of a high-security guru who gets himself incarcerated in allegedly escape-proof prisons just to ingeniously devise ways to get out. But Schwarzenegger, as the sharpest inmate in the most tightly sealed slammer of all, gets pretty amped up here in some of the dialogue scenes (notably one in which he switches into speaking German), suggesting he might be ready for some different sorts of parts than what he's been known for in the past.


PHOTOS: Senior Superheroes: 19 Action Stars Kicking Butt Past 50


Just as imperturbable as ever, Stallone plays Ray Breslin, the renowned author of the definitive tome on prison security, who somehow manages to anonymously get himself locked up in the toughest prisons in the United States (14 and counting) and then break out, thus exposing their deficiencies. His office partners who have his back are played by the not entirely convincing team of Amy Ryan, Vincent D'Onofrio and Curtis “50 Cent” Jackson.


Normally, Ray is implanted with a sensor so that his partners know where he's incarcerated. But when he accepts a lucrative invitation from the CIA to test his abilities in a secret, corporately run joint where really bad types are sent to permanently disappear, Ray ends up on his own there under the name of Portos (the fourth musketeer). The cells in this vast chamber, which bears a passing resemblance to the industrial core in Monsters Inc., are clear glass, enabling the inmates to be seen at all times. If you're really a bad boy, you get sent to cramped quarters where banks of bright lights keep you warm, toasty and virtually blinded the whole time.
The place is presided over by the warden Hobbes, a carefully attired, soft-spoken sadist played by Jim Caviezel as if planting the flag for any Anthony Perkins-like weirdo roles that might come along in the near future. Also on the staff are an English enforcer played by Vinnie Jones and a doctor (Sam Neill) who may not have particularly wanted this assignment.


Most of Ray's time is taken up by Emil Rottmayer (Schwarzenegger), who notices how Ray is always observing guard behavior and checking things out. Aside from chatting him up at meal-time, Emil saves Ray from a violent mob but then engages him in a fist-fight (“You fight like a vegetarian,” he insults his smaller opponent) and finally engages in a joint effort to find the stir's weak spot, not to mention where in the world they might be.


The interplay in the screenplay by Miles Chapman and Arnell Jesko ping-pongs between banal and the dumb, but this is still preferable to the incoherence of the final stretch, when Ray spends mostly in a vertical chamber that keeps filling with and then losing water while mayhem breaks loose on board. The absurdities mount as director Mikael Hafstrom reveals who's been in cahoots with whom (including the leader of a sizable group of Muslim prisoners), how they figure out their geographic location and how the good guys, as always, are so much more accurate shots than the company goons. And in one hour, any rewrite expert in Hollywood could have come up with a dozen better “Hasta la vista, baby”-type tag lines for Arnold than the ultra-lame salutation he uses here.


Still, Schwarzenegger, sporting salt-and-pepper hair and a becoming goatee (there is actually a “Look for Mr. Schwarzenegger created by...” line in the final credits), comes across as unusually energized, much better than he did in his first post-governator starring vehicle, The Last Stand, released in January. Near the end, Rottmayer tells Breslin, “I hope I never see you again.” A feeble wish: The two stars will be back on screens together again next August in The Expendables 3.


Production: Mark Canton, Emmett/Furla Films, Envision Entertainment, Bois/Schiller
Cast: Sylvester Stallone, Arnold Schwarzenegger, Jim Caviezel, Curtis “50 Cent” Jackson, Sam Neill, Vinnie Jones, Faran Tahir Vincent d'Onofrio, Amy Ryan, Graham Beckel, Matt Gerald, Caitriona Balfe
Director: Mikael Hafstrom
Screenwriters: Miles Chapman, Arnell Jesko, story by Miles Chapman
Producers: Mark Canton, Randall Emmett, Remington Chase, Robbie Brenner, Kevin King-Templeton
Executive producers: George Furla, Mark Stewart, Zack Schiller, Alexander Boies, Nicolas Stern, Jeff Rice, Brandt Andersen
Director of photography: Brendan Galvin
Production designer: Barry Chusid
Costume designer: Lizz Wolf
Editor: Elliot Greenberg
Music: Alex Heffes
R rating, 116 minutes


Source: http://feedproxy.google.com/~r/thr/film/~3/CVPov3QCG4Q/story01.htm
Category: seattle seahawks   Julie Chen   JJ Cale  

Newark Mayor Cory Booker wins U.S. Senate race (Washington Post)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS Feeds and Widgets via Feedzilla.
Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/334637828?client_source=feed&format=rss
Tags: drew brees   cher   meteor shower tonight  

What Happened When Piers Morgan Asked Bill O'Reilly to Appear on CNN



Bill O'Reilly didn't give Piers Morgan the time of day -- until he had to. 



That, at least, was the story told by the CNN host when he appeared on Howard Stern's SiriusXM show on Wednesday morning.


Morgan recounted that when he first joined the cable news network, he approached the Fox News personality to appear on his talk show. The O'Reilly Factor host apparently didn't show a flicker of recognition for Morgan and quickly declined the offer.


STORY: Piers Morgan Talks Gun Control and Jeff Zucker 


"I've just joined CNN, you may have seen the promos? Nothing," Morgan remembered of the incident, later adding: "What a dick."


But then Morgan said that shortly after the conversation, O'Reilly approached him. The Fox News host asked if his daughter and her friend could take a picture with him because she was a fan of America's Got Talent, which the CNN personality previously hosted.


O'Reilly was "simmering with volcanic lava" at the time, Morgan said. 


The CNN host appeared on Stern's radio program during the press tour for his new book, Shooting Straight


In his book, Morgan notes that he similarly invited News Corp chairman Rupert Murdoch to appear on his show. He was told there would be a "zero in a hundred" chance of that happening. 




Source: http://feedproxy.google.com/~r/thr/television/~3/8Xq1NhxszDs/story01.htm
Related Topics: Dusty Baker   eddie aikau   liberace   burn notice   hell on wheels  

Wednesday, October 16, 2013

TV's Top Showrunners Talk Deleted Scenes, Network Censorship, More




Getty Images


Liz Meriwether, Dan Harmon, Aaron Sorkin



How I Met Your Mother's Carter Bays is still mourning the loss of Goodwin Games. New Girl's Liz Meriwether is coming clean about the do's and don'ts of "vagina" talk. And Community's reinstalled showrunner Dan Harmon is simply relieved security let him back on the lot.



Below, 13 top showrunners from this year's Power List offer candid responses about scrapped plans, debates in their writers room and the thing they wish they knew before becoming a showrunner.


PHOTOS: Power Showrunners: Inside the Minds Behind 'Walking Dead,' 'Bates Motel,' 'Arrow'


Before I became a showrunner, I wish someone had warned me about …


Beau Willimon (House of Cards): Fraturday -- when a night shoot on Friday night continues until Saturday morning. Think long weekend, but the opposite of that.


Aaron Sorkin (Newsroom): Having to write a second episode after the pilot.


Liz Meriwether (New Girl): All the sleep I would get! It's almost too much sleep!


Christopher Lloyd (Modern Family): Executives and notes. I'm often reminded of a story about Marvin Gaye. In his prime, he was a big strong guy, who fancied himself a decent boxer. One day he met this heavyweight fighter (not a champion, but a contender) and told him he wanted to spar with him. They made the date and Marvin Gaye came in kind of cocky, sure he was going to beat this guy, demanding that the guy not go easy on him, and … the guy kind of beat him up. Afterward, a reporter who had observed the whole thing asked the boxer why he'd done so and he said, "This is what I do all day long. This is all I've ever done. How could he disrespect me like that? This ring is my office."


Dan Harmon (Community): Capitalism.


Mara Brock Akil (The Game): The hair and makeup department! There should be a whole course on how to negotiate that!


Betsy Beers (Grey's Anatomy, Scandal) Keeping up with a network episodic schedule. The pace takes your breath away -- especially when you first start out -- and living at the office becomes the new normal. Oh, and the constant and endless supply of sugary food groups at said office. Beware …


The most memorable debate in our writers room this past year was …


Kurt Sutter (Sons of Anarchy): If the skittish white guy in the alley outside our office was dealing crack or meth.


Carter Bays (How I Met Your Mother): First prize: Did Walt mean what he said on the phone with Skyler or was it all a smokescreen because he knew the cops were listening in? Runner up: Should we do a season nine?


Sorkin: Whether a particular line should reference Bridget Jones or Holly Golightly.


Harmon: Whether to replace departing castmembers with NFL players or just keep grabbing dead people from Breaking Bad.


Bill Lawrence (Cougar Town): Generally, these are about where to order lunch when we're working. No one has nailed this yet.


Craig Thomas (How I Met Your Mother): Whether or not to reveal "The Mother" from our show's title (Side-bar: I've decided to start avoiding the phrase "titular mother," because gross).


STORY: 10 Power Showrunners: A Day in the Life, From Carlton Cuse to Jenji Kohan


The toughest scene I had to write this past year was …


Sutter: Figuring out new and imaginative ways to blow shit up, kill a guy, chase down/run from an enemy. Adding original, organic action to the show gets more difficult every season.


Meriwether: Some reshoot stuff. But a lady never talks about reshoots unless the lady has a drink in her. Half a drink, to be honest.


Matthew Weiner (Mad Men): Don and Ted deciding to merge their companies.


Sorkin: The scene that opened with the season premiere and ended with the season finale.


I can't believe I got away with …


Meriwether: Getting Nick and Jess together. But now I feel like I jinxed it.


Weiner: Bob Benson's shorts.


Harmon: Seasons four, three, one and two in that order.


The moment I wish had made it to air but didn't was …


Meriwether: So many moments. There was one particular joke for Winston in the premiere that we couldn't get away with because of Standards and Practices. Lamorne [Morris] knocked it out of the park. I guess you're not allowed to use the word "in" as it relates to the word "vagina." It turns out almost no prepositions are allowed near that noun.


Beers: There was a wonderful scene from last season in episode 219 -- Olivia Pope, who is starting to undress in her bedroom, remembers Jake Ballard has placed surveillance in there. She proceeds to taunt him through the camera. A terrific performance from Kerry Washington -- and a nice twist at the end when we find out it isn't Jake Ballard who is watching!


Bays: The last six episodes of The Goodwin Games.


Sorkin: The scene in "One Step Too Many" that explained the title of the episode.


STORY: The Hollywood Reporter Names the 50 Power Showrunners of 2013


The episode from this past year that I wish we could do over would be …


Meriwether: The premiere.


Thomas: I'll up the ante on this question and go from "episode" to "series": I wish we could do The Goodwin Games over with the same amazing cast and crew, but on a network that would give it a real shot.


Bays: It's not from this last year, but season seven's "The Burning Beekeeper" will follow me to my grave. One more week of writing, one more week of shooting, one more week of editing, and it could have been something awesome. But that's how it goes when you have a 24 episode season. Sometimes you run out of time.


Sorkin: I've never written anything I wish I couldn't do over.


Weiner: What are you trying to say?


My proudest accomplishment this year was …


Harmon: Convincing security to let me back on the lot.


Lloyd: Finding a way to take two common sitcom stories -- a birth story and a proposal story -- and make them both funny and surprising, and ultimately touching.


Willimon: Remaining sane. Writing and producing 13 hours of story in six months is a form of voluntary insanity. A delicious, rewarding, exhilarating form of insanity, mind you. It takes a special breed of folks to put in 80 hour weeks for half a year. Luckily on our show the inmates get to run the asylum, and between our cast, crew, writers and designers, there's not other asylum I'd rather be committed to.


Thomas: The brief three or four seconds in May/June when Carter and I had two shows on TV (HIMYM and the all-too-short-lived The Goodwin Games.)


Lawrence: Hiring and empowering talented people like Adam Sztykiel (Undateable), Jeff Astrof (Ground Floor), Justin Halpern and Patrick Schumacker (Surviving Jack) and Blake McCormick (Cougar Town) to run our TV shows. Then I just step in and take credit for all their hard work. Any work they can't do is handled by Jeff Ingold and Randall Winston (my partners). I generally just drink a lot of coffee.


STORY: Power Showrunners: 10 to Watch for 2014


If my writers were to describe my style as a showrunner in five words or less, they might say …


Salim Akil (The Game): Salim -- Loveable asshole.


Sutter: Control. Control. Control. Control. Weepy.


Lloyd: Respectful, respectfully demanding, always late.


Meriwether: "Go back to set, Liz."


Weiner: "You're looking tall today, sir."


Harmon: "Quick, he's sleeping, stab him."


Lawrence: Moderately effective, disorganized chaos.


Bays: Handsome, handsome, handsome, handsome, handsome!


Sorkin: Nobody on our show uses five words or less.



Source: http://feedproxy.google.com/~r/live_feed/~3/ZaXWUY5FvIw/story01.htm
Category: constitution day   sons of anarchy   Wentworth Miller   amanda bynes   Conjuring  

Florida bullying case raises questions for parents

ST. PETERSBURG, Fla. (AP) — When two girls, aged 12 and 14, were arrested in a bullying-suicide investigation in Florida, many wondered: Where were their parents and should they be held responsible?


The mother and father of the older girl went on national TV and defended their daughter — and themselves. They said they often checked their daughter's social networking activity and don't believe their daughter bullied Rebecca Sedwick to suicide, as authorities have charged.


Whether or not you believe the family, experts say parents should use Rebecca's case to talk to their children.


"Sit down and say, 'I know most kids won't tell their parents, but tell me what you would want from me if you were being cyberbullied,'" said Parry Aftab, a New Jersey-based lawyer and expert on bullying.


She advocates a "stop, block and tell" approach. "Don't answer back, block the cyberbully online and tell a trusted adult," Aftab said.


In Rebecca's case, she did talk to her mother about the bullying and even changed schools, yet the tormenting continued online, authorities said. About a month ago, Rebecca decided she couldn't take it anymore and jumped to her death at an abandoned concrete plant.


It was a Facebook comment over the weekend that Polk County Sheriff Grady Judd said led him to arrest the girls. He repeated the online post from the older girl almost word for word at a news conference Tuesday.


"'Yes, I bullied Rebecca and she killed herself but I don't give a ...' and you can add the last word yourself," Judd said.


The sheriff was aggravated the girl's parents allowed her access to social networks after Rebecca's death and said he made the arrest so she wouldn't bully anyone else.


In an interview with ABC News that aired Wednesday, the 14-year-old's parents said their daughter would never write something like that and the girl's Facebook account had been hacked, a claim police don't believe.


"My daughter don't deserve to be in the place she's in right now and I just hope that the truth comes to the surface so we can get out of this nightmare," her father told ABC News.


A day earlier, he told The Associated Press by phone: "My daughter's a good girl and I'm 100 percent sure that whatever they're saying about my daughter is not true."


The girls were charged as juveniles with third-degree felony aggravated stalking. The sheriff said even if they are convicted, they probably won't spend time in juvenile detention because they don't have a criminal history.


He identified the girls and showed their mug shots during the news conference, but AP generally does not name juveniles charged with crimes.


Police also considered charging the parents, but so far can't prove complacency or that they knew about the bullying, sheriff's spokesman Scott Wilder said Wednesday.


Authorities said about a year ago, the bullying began after the 14-year-old girl started dating Rebecca's ex-boyfriend. The older girl threatened to fight Rebecca while they were sixth-graders at Crystal Lake Middle School and told her "to drink bleach and die," the sheriff said. She also convinced the younger girl to bully Rebecca, even though they had been best friends.


Judd said the younger girl had shown remorse while the older one was "very cold, had no emotion at all upon her arrest."


The younger girl's father told ABC News he wished he could have done more.


"I feel horrible about the whole situation," he said. "It's my fault, maybe that I don't know more about that kind of stuff. I wish I did."


He did not return a telephone call from AP.


David Tirella, a Tampa attorney who has represented the families of bullying victims in lawsuits against schools, said the publicity over Rebecca's case and the charges may further awareness in a way that few cases have in the U.S.


"Victims are being empowered, families are talking about it," said Tirella, who is also a Stetson University law professor. "We took a big step forward in Florida to help protect victims."


___


Follow Tamara Lush on Twitter at http://twitter.com/tamaralush


Source: http://news.yahoo.com/florida-bullying-case-raises-questions-parents-203501216.html
Similar Articles: Dancing With the Stars 2013   joe flacco   olinguito   oj simpson   Edward Snowden  

How to Design — And Defend Against — The Perfect Security Backdoor




Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED



We already know the NSA wants to eavesdrop on the internet. It has secret agreements with telcos to get direct access to bulk internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext — encrypted information — and figure out which programs could have created it.


But what the NSA wants is to be able to read that encrypted information in as close to real-time as possible. It wants backdoors, just like the cybercriminals and less benevolent governments do.


And we have to figure out how to make it harder for them, or anyone else, to insert those backdoors.



How the NSA Gets Its Backdoors






Bruce Schneier is a security technologist and author. His latest book is Liars and Outliers: Enabling the Trust Society Needs to Survive.






The FBI tried to get backdoor access embedded in an AT&T secure telephone system in the mid-1990s. The Clipper Chip included something called a LEAF: a Law Enforcement Access Field. It was the key used to encrypt the phone conversation, itself encrypted in a special key known to the FBI, and it was transmitted along with the phone conversation. An FBI eavesdropper could intercept the LEAF and decrypt it, then use the data to eavesdrop on the phone call.


But the Clipper Chip faced severe backlash, and became defunct a few years after being announced.


Having lost that public battle, the NSA decided to get its backdoors through subterfuge: by asking nicely, pressuring, threatening, bribing, or mandating through secret order. The general name for this program is BULLRUN.


Defending against these attacks is difficult. We know from subliminal channel and kleptography research that it’s pretty much impossible to guarantee that a complex piece of software isn’t leaking secret information. We know from Ken Thompson’s famous talk on “trusting trust” (first delivered in the ACM Turing Award Lectures) that you can never be totally sure if there’s a security flaw in your software.


Since BULLRUN became public last month, the security community has been examining security flaws discovered over the past several years, looking for signs of deliberate tampering. The Debian random number flaw was probably not deliberate, but the 2003 Linux security vulnerability probably was. The DUAL_EC_DRBG random number generator may or may not have been a backdoor. The SSL 2.0 flaw was probably an honest mistake. The GSM A5/1 encryption algorithm was almost certainly deliberately weakened. All the common RSA moduli out there in the wild: We don’t know. Microsoft’s _NSAKEY looks like a smoking gun, but honestly, we don’t know.


How the NSA Designs Backdoors


While a separate program that sends our data to some IP address somewhere is certainly how any hacker — from the lowliest script kiddie up to the NSA – spies on our computers, it’s too labor-intensive to work in the general case.


For government eavesdroppers like the NSA, subtlety is critical. In particular, three characteristics are important:


Low discoverability. The less the backdoor affects the normal operations of the program, the better. Ideally, it shouldn’t affect functionality at all. The smaller the backdoor is, the better. Ideally, it should just look like normal functional code. As a blatant example, an email encryption backdoor that appends a plaintext copy to the encrypted copy is much less desirable than a backdoor that reuses most of the key bits in a public IV (“initialization vector”).


High deniability. If discovered, the backdoor should look like a mistake. It could be a single opcode change. Or maybe a “mistyped” constant. Or “accidentally” reusing a single-use key multiple times. This is the main reason I am skeptical about _NSAKEY as a deliberate backdoor, and why so many people don’t believe the DUAL_EC_DRBG backdoor is real: They’re both too obvious.


Minimal conspiracy. The more people who know about the backdoor, the more likely the secret is to get out. So any good backdoor should be known to very few people. That’s why the recently described potential vulnerability in Intel’s random number generator worries me so much; one person could make this change during mask generation, and no one else would know.


These characteristics imply several things:


• A closed-source system is safer to subvert, because an open-source system comes with a greater risk of that subversion being discovered. On the other hand, a big open-source system with a lot of developers and sloppy version control is easier to subvert.


• If a software system only has to interoperate with itself, then it is easier to subvert. For example, a closed VPN encryption system only has to interoperate with other instances of that same proprietary system. This is easier to subvert than an industry-wide VPN standard that has to interoperate with equipment from other vendors.


• A commercial software system is easier to subvert, because the profit motive provides a strong incentive for the company to go along with the NSA’s requests.


• Protocols developed by large open standards bodies are harder to influence, because a lot of eyes are paying attention. Systems designed by closed standards bodies are easier to influence, especially if the people involved in the standards don’t really understand security.


• Systems that send seemingly random information in the clear are easier to subvert. One of the most effective ways of subverting a system is by leaking key information — recall the LEAF — and modifying random nonces or header information is the easiest way to do that.


Design Strategies for Defending Against Backdoors


With these principles in mind, we can list design strategies. None of them is foolproof, but they are all useful. I’m sure there’s more; this list isn’t meant to be exhaustive, nor the final word on the topic. It’s simply a starting place for discussion. But it won’t work unless customers start demanding software with this sort of transparency.


Vendors should make their encryption code public, including the protocol specifications. This will allow others to examine the code for vulnerabilities. It’s true we won’t know for sure if the code we’re seeing is the code that’s actually used in the application, but surreptitious substitution is hard to do, forces the company to outright lie, and increases the number of people required for the conspiracy to work.


The community should create independent compatible versions of encryption systems, to verify they are operating properly. I envision companies paying for these independent versions, and universities accepting this sort of work as good practice for their students. And yes, I know this can be very hard in practice.


There should be no master secrets. These are just too vulnerable.


All random number generators should conform to published and accepted standards. Breaking the random number generator is the easiest difficult-to-detect method of subverting an encryption system. A corollary: We need better published and accepted RNG standards.


Encryption protocols should be designed so as not to leak any random information. Nonces should be considered part of the key or public predictable counters if possible. Again, the goal is to make it harder to subtly leak key bits in this information.


***


This is a hard problem. We don’t have any technical controls that protect users from the authors of their software.


And the current state of software makes the problem even harder: Modern apps chatter endlessly on the internet, providing noise and cover for covert communications. Feature bloat provides a greater “attack surface” for anyone wanting to install a backdoor.


In general, what we need is assurance: methodologies for ensuring that a piece of software does what it’s supposed to do and nothing more. Unfortunately, we’re terrible at this. Even worse, there’s not a lot of practical research in this area — and it’s hurting us badly right now.


Yes, we need legal prohibitions against the NSA trying to subvert authors and deliberately weaken cryptography. But this isn’t just about the NSA, and legal controls won’t protect against those who don’t follow the law and ignore international agreements. We need to make their job harder by increasing their risk of discovery. Against a risk-averse adversary, it might be good enough.



Source: http://feeds.wired.com/c/35185/f/661370/s/328744bb/sc/7/l/0L0Swired0N0Copinion0C20A130C10A0Chow0Eto0Edesign0Eand0Edefend0Eagainst0Ethe0Eperfect0Ebackdoor0C/story01.htm
Similar Articles: darren sproles   grand theft auto 5   Malcom Floyd   green bay packers   VMAs  

Roku 2


Sometimes a device gets even better when it loses a few frills, especially if it becomes even more affordable in the bargain. The Roku 3 stood as our Editors' Choice media hub because of its low price, huge selection of online services and channels, an intuitive menu system, and the option to listen to what you're watching through a headphone jack on the remote control. The Roku 2 keeps all of these handy features and still supports full 1080p HD. It only loses the motion-sensing remote control for games and an Ethernet port, neither of which are must-have features. And at $79.99 (direct) it's $20 less expensive, making it our new Editors' Choice. 



Design
Almost physically identical to the Roku 3, the Roku 3 is a small, square, black plastic puck measuring 3.7 inches on each side and standing 1.2 inches tall. It weighs just 3.5 ounces, so particularly heavy HDMI cables can potentially throw the little player off-balance and lift it up. It has no buttons and only one indicator light on the front. The back panel only holds HDMI and composite outputs and the power connector. The lower price tag and composite video output come at the cost of an Ethernet connector; you need to use the Roku 2's integrated dual-band (802.11a/b/g/n) Wi-Fi to take it online.




The remote is also similar, though it lacks the motion controls and video game support of the Roku 3's remote. That means you'll have to turn to another electronic device to play Angry Birds. It's a small, slightly curved wand with a prominent direction pad, standard playback and menu navigation buttons, and dedicated service buttons for Netflix, M-GO, Hulu Plus, and Blockbuster. It connects to the Roku 2 via Wi-Fi Direct rather than infrared, so you don't need to point it directly at the box.


The left side of the remote features a 3.5mm jack for headphones , which was one of the most welcome new features on the Roku 3. (Volume control is on the right.) You get a cheap-sounding pair of earbuds in the box, but you can use any pair of headphones with a standard 3.5mm connector. Plugging in the headphones automatically mutes the HDTV audio, which enables private listening. It's a useful feature we've not seen elsewhere.


You can also control the box with the Roku app for Android and iOS. It turns your smartphone or tablet into a remote control, and lets you stream local media to the Roku 2. This is a nice alternative to the Apple TV and AirPlay, especially if you have an Android smartphone.


Channels
Like the Roku 3, the Roku 2 currently uses a panel- and tile-based layout that displays information on the screen in a much more dense, but accessible way than previous Roku menu systems. It's a simple, functional interface that shows more than a dozen icons for channels, movies, and shows at once. It's easy to set up, with a few on-screen prompts to configure the Roku 2's Wi-Fi and a short code to enter on Roku's website to sync it with your Roku account and manage your channels.



Roku's Channel Store offers more than 1,000 free and for-pay online services and apps, including the aforementioned Netflix, Hulu Plus, and Blockbuster streaming services (each with their own dedicated button on the remote). There are hundreds more services available, including on-demand options for major television networks, news portals, sports portals, and more targeted services like CrunchyRoll (Anime) and Midnight Pulp (horror and exploitation films).


The extremely useful Search function polls Netflix, Hulu Plus, Amazon Video-on-Demand, Vudu, and several other services, listing the various ways the movie you want to watch is available. However, the main menu focuses mostly on M-GO, a Vudu-like on-demand service that integrates into the Movies and TV Shows sections in the Roku 2's main menu. Fortunately, those are the only places where M-GO is forced upon your attention. Expect to spend much, much more time in the Search and Channel menus than the M-GO-heavy, curated Movies and TV Shows menus.


If you want a simple way to watch Netflix, Hulu Plus, and other online services on your HDTV, the Roku 2 is the most affordable and functional one out there. It's $20 less than the Roku 3, and the few things you lose stepping down to the Roku 2 are worth parting with for the price break. For $80 it brings together all of your most commonly used online media services, lets you search for your favorite movies and shows through many of them, and offers an impressive selection of more than 1,000 specialized and general interest content channels on top of that. This slightly more affordable, streamlined media hub unseats the Roku 3 as our Editors' Choice with its lower price tag and equally as compelling feature set. If you really want to save money and only want to watch Netflix, YouTube, and a handful of other services, the Google Chromecast can be had for $35. You'll have to give up the tons of channels and support for streaming media from your smartphone or tablet, though.


Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/4vW75WMBwo8/0,2817,2425735,00.asp
Related Topics: Lake Natron   VMA Awards