Thursday, October 17, 2013

Escape Plan: Film Review




Alan Markfield/Summit Entertainment


"Escape Plan"




The Bottom Line


Two former heavyweights can't lift the lame concoction.




Opens


October 18 (Summit Entertainment)


Cast


Sylvester Stallone, Arnold Schwarzenegger, Jim Caviezel, Curtis “50 Cent” Jackson, Sam Neill, Vinnie Jones, Faran Tahir,


Director


Mikael Hafstrom




The spirit of 1980s Cannon Films rises from the grave in Escape Plan. With Sylvester Stallone and Arnold Schwarzenegger taking on roles that, back in those days, might have been played by Chuck Norris and Dolph Lundgren, it's a chance to relive the cheesy look, demented plotting, cardboard characterizations and tacky style that characterized the lower tier of action filmmaking once upon a time. They just don't make 'em like this anymore, and a good thing, too. A portion of the Expendables audience will reliably turn out for this claptrap, but it really is a blown opportunity to do something at least amusing, if not special, with the two still-pumping muscle-bound legends.



Devising a story that would enable Stallone and Schwarzenegger to share the screen for more than a few seconds, as in the first two Expendables installments, is the only justification for a jerry-rigged venture like Escape Plan. Stallone remains his customary taciturn self in the role of a high-security guru who gets himself incarcerated in allegedly escape-proof prisons just to ingeniously devise ways to get out. But Schwarzenegger, as the sharpest inmate in the most tightly sealed slammer of all, gets pretty amped up here in some of the dialogue scenes (notably one in which he switches into speaking German), suggesting he might be ready for some different sorts of parts than what he's been known for in the past.


PHOTOS: Senior Superheroes: 19 Action Stars Kicking Butt Past 50


Just as imperturbable as ever, Stallone plays Ray Breslin, the renowned author of the definitive tome on prison security, who somehow manages to anonymously get himself locked up in the toughest prisons in the United States (14 and counting) and then break out, thus exposing their deficiencies. His office partners who have his back are played by the not entirely convincing team of Amy Ryan, Vincent D'Onofrio and Curtis “50 Cent” Jackson.


Normally, Ray is implanted with a sensor so that his partners know where he's incarcerated. But when he accepts a lucrative invitation from the CIA to test his abilities in a secret, corporately run joint where really bad types are sent to permanently disappear, Ray ends up on his own there under the name of Portos (the fourth musketeer). The cells in this vast chamber, which bears a passing resemblance to the industrial core in Monsters Inc., are clear glass, enabling the inmates to be seen at all times. If you're really a bad boy, you get sent to cramped quarters where banks of bright lights keep you warm, toasty and virtually blinded the whole time.
The place is presided over by the warden Hobbes, a carefully attired, soft-spoken sadist played by Jim Caviezel as if planting the flag for any Anthony Perkins-like weirdo roles that might come along in the near future. Also on the staff are an English enforcer played by Vinnie Jones and a doctor (Sam Neill) who may not have particularly wanted this assignment.


Most of Ray's time is taken up by Emil Rottmayer (Schwarzenegger), who notices how Ray is always observing guard behavior and checking things out. Aside from chatting him up at meal-time, Emil saves Ray from a violent mob but then engages him in a fist-fight (“You fight like a vegetarian,” he insults his smaller opponent) and finally engages in a joint effort to find the stir's weak spot, not to mention where in the world they might be.


The interplay in the screenplay by Miles Chapman and Arnell Jesko ping-pongs between banal and the dumb, but this is still preferable to the incoherence of the final stretch, when Ray spends mostly in a vertical chamber that keeps filling with and then losing water while mayhem breaks loose on board. The absurdities mount as director Mikael Hafstrom reveals who's been in cahoots with whom (including the leader of a sizable group of Muslim prisoners), how they figure out their geographic location and how the good guys, as always, are so much more accurate shots than the company goons. And in one hour, any rewrite expert in Hollywood could have come up with a dozen better “Hasta la vista, baby”-type tag lines for Arnold than the ultra-lame salutation he uses here.


Still, Schwarzenegger, sporting salt-and-pepper hair and a becoming goatee (there is actually a “Look for Mr. Schwarzenegger created by...” line in the final credits), comes across as unusually energized, much better than he did in his first post-governator starring vehicle, The Last Stand, released in January. Near the end, Rottmayer tells Breslin, “I hope I never see you again.” A feeble wish: The two stars will be back on screens together again next August in The Expendables 3.


Production: Mark Canton, Emmett/Furla Films, Envision Entertainment, Bois/Schiller
Cast: Sylvester Stallone, Arnold Schwarzenegger, Jim Caviezel, Curtis “50 Cent” Jackson, Sam Neill, Vinnie Jones, Faran Tahir Vincent d'Onofrio, Amy Ryan, Graham Beckel, Matt Gerald, Caitriona Balfe
Director: Mikael Hafstrom
Screenwriters: Miles Chapman, Arnell Jesko, story by Miles Chapman
Producers: Mark Canton, Randall Emmett, Remington Chase, Robbie Brenner, Kevin King-Templeton
Executive producers: George Furla, Mark Stewart, Zack Schiller, Alexander Boies, Nicolas Stern, Jeff Rice, Brandt Andersen
Director of photography: Brendan Galvin
Production designer: Barry Chusid
Costume designer: Lizz Wolf
Editor: Elliot Greenberg
Music: Alex Heffes
R rating, 116 minutes


Source: http://feedproxy.google.com/~r/thr/film/~3/CVPov3QCG4Q/story01.htm
Category: seattle seahawks   Julie Chen   JJ Cale  

Newark Mayor Cory Booker wins U.S. Senate race (Washington Post)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS Feeds and Widgets via Feedzilla.
Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/334637828?client_source=feed&format=rss
Tags: drew brees   cher   meteor shower tonight  

What Happened When Piers Morgan Asked Bill O'Reilly to Appear on CNN



Bill O'Reilly didn't give Piers Morgan the time of day -- until he had to. 



That, at least, was the story told by the CNN host when he appeared on Howard Stern's SiriusXM show on Wednesday morning.


Morgan recounted that when he first joined the cable news network, he approached the Fox News personality to appear on his talk show. The O'Reilly Factor host apparently didn't show a flicker of recognition for Morgan and quickly declined the offer.


STORY: Piers Morgan Talks Gun Control and Jeff Zucker 


"I've just joined CNN, you may have seen the promos? Nothing," Morgan remembered of the incident, later adding: "What a dick."


But then Morgan said that shortly after the conversation, O'Reilly approached him. The Fox News host asked if his daughter and her friend could take a picture with him because she was a fan of America's Got Talent, which the CNN personality previously hosted.


O'Reilly was "simmering with volcanic lava" at the time, Morgan said. 


The CNN host appeared on Stern's radio program during the press tour for his new book, Shooting Straight


In his book, Morgan notes that he similarly invited News Corp chairman Rupert Murdoch to appear on his show. He was told there would be a "zero in a hundred" chance of that happening. 




Source: http://feedproxy.google.com/~r/thr/television/~3/8Xq1NhxszDs/story01.htm
Related Topics: Dusty Baker   eddie aikau   liberace   burn notice   hell on wheels  

Wednesday, October 16, 2013

TV's Top Showrunners Talk Deleted Scenes, Network Censorship, More




Getty Images


Liz Meriwether, Dan Harmon, Aaron Sorkin



How I Met Your Mother's Carter Bays is still mourning the loss of Goodwin Games. New Girl's Liz Meriwether is coming clean about the do's and don'ts of "vagina" talk. And Community's reinstalled showrunner Dan Harmon is simply relieved security let him back on the lot.



Below, 13 top showrunners from this year's Power List offer candid responses about scrapped plans, debates in their writers room and the thing they wish they knew before becoming a showrunner.


PHOTOS: Power Showrunners: Inside the Minds Behind 'Walking Dead,' 'Bates Motel,' 'Arrow'


Before I became a showrunner, I wish someone had warned me about …


Beau Willimon (House of Cards): Fraturday -- when a night shoot on Friday night continues until Saturday morning. Think long weekend, but the opposite of that.


Aaron Sorkin (Newsroom): Having to write a second episode after the pilot.


Liz Meriwether (New Girl): All the sleep I would get! It's almost too much sleep!


Christopher Lloyd (Modern Family): Executives and notes. I'm often reminded of a story about Marvin Gaye. In his prime, he was a big strong guy, who fancied himself a decent boxer. One day he met this heavyweight fighter (not a champion, but a contender) and told him he wanted to spar with him. They made the date and Marvin Gaye came in kind of cocky, sure he was going to beat this guy, demanding that the guy not go easy on him, and … the guy kind of beat him up. Afterward, a reporter who had observed the whole thing asked the boxer why he'd done so and he said, "This is what I do all day long. This is all I've ever done. How could he disrespect me like that? This ring is my office."


Dan Harmon (Community): Capitalism.


Mara Brock Akil (The Game): The hair and makeup department! There should be a whole course on how to negotiate that!


Betsy Beers (Grey's Anatomy, Scandal) Keeping up with a network episodic schedule. The pace takes your breath away -- especially when you first start out -- and living at the office becomes the new normal. Oh, and the constant and endless supply of sugary food groups at said office. Beware …


The most memorable debate in our writers room this past year was …


Kurt Sutter (Sons of Anarchy): If the skittish white guy in the alley outside our office was dealing crack or meth.


Carter Bays (How I Met Your Mother): First prize: Did Walt mean what he said on the phone with Skyler or was it all a smokescreen because he knew the cops were listening in? Runner up: Should we do a season nine?


Sorkin: Whether a particular line should reference Bridget Jones or Holly Golightly.


Harmon: Whether to replace departing castmembers with NFL players or just keep grabbing dead people from Breaking Bad.


Bill Lawrence (Cougar Town): Generally, these are about where to order lunch when we're working. No one has nailed this yet.


Craig Thomas (How I Met Your Mother): Whether or not to reveal "The Mother" from our show's title (Side-bar: I've decided to start avoiding the phrase "titular mother," because gross).


STORY: 10 Power Showrunners: A Day in the Life, From Carlton Cuse to Jenji Kohan


The toughest scene I had to write this past year was …


Sutter: Figuring out new and imaginative ways to blow shit up, kill a guy, chase down/run from an enemy. Adding original, organic action to the show gets more difficult every season.


Meriwether: Some reshoot stuff. But a lady never talks about reshoots unless the lady has a drink in her. Half a drink, to be honest.


Matthew Weiner (Mad Men): Don and Ted deciding to merge their companies.


Sorkin: The scene that opened with the season premiere and ended with the season finale.


I can't believe I got away with …


Meriwether: Getting Nick and Jess together. But now I feel like I jinxed it.


Weiner: Bob Benson's shorts.


Harmon: Seasons four, three, one and two in that order.


The moment I wish had made it to air but didn't was …


Meriwether: So many moments. There was one particular joke for Winston in the premiere that we couldn't get away with because of Standards and Practices. Lamorne [Morris] knocked it out of the park. I guess you're not allowed to use the word "in" as it relates to the word "vagina." It turns out almost no prepositions are allowed near that noun.


Beers: There was a wonderful scene from last season in episode 219 -- Olivia Pope, who is starting to undress in her bedroom, remembers Jake Ballard has placed surveillance in there. She proceeds to taunt him through the camera. A terrific performance from Kerry Washington -- and a nice twist at the end when we find out it isn't Jake Ballard who is watching!


Bays: The last six episodes of The Goodwin Games.


Sorkin: The scene in "One Step Too Many" that explained the title of the episode.


STORY: The Hollywood Reporter Names the 50 Power Showrunners of 2013


The episode from this past year that I wish we could do over would be …


Meriwether: The premiere.


Thomas: I'll up the ante on this question and go from "episode" to "series": I wish we could do The Goodwin Games over with the same amazing cast and crew, but on a network that would give it a real shot.


Bays: It's not from this last year, but season seven's "The Burning Beekeeper" will follow me to my grave. One more week of writing, one more week of shooting, one more week of editing, and it could have been something awesome. But that's how it goes when you have a 24 episode season. Sometimes you run out of time.


Sorkin: I've never written anything I wish I couldn't do over.


Weiner: What are you trying to say?


My proudest accomplishment this year was …


Harmon: Convincing security to let me back on the lot.


Lloyd: Finding a way to take two common sitcom stories -- a birth story and a proposal story -- and make them both funny and surprising, and ultimately touching.


Willimon: Remaining sane. Writing and producing 13 hours of story in six months is a form of voluntary insanity. A delicious, rewarding, exhilarating form of insanity, mind you. It takes a special breed of folks to put in 80 hour weeks for half a year. Luckily on our show the inmates get to run the asylum, and between our cast, crew, writers and designers, there's not other asylum I'd rather be committed to.


Thomas: The brief three or four seconds in May/June when Carter and I had two shows on TV (HIMYM and the all-too-short-lived The Goodwin Games.)


Lawrence: Hiring and empowering talented people like Adam Sztykiel (Undateable), Jeff Astrof (Ground Floor), Justin Halpern and Patrick Schumacker (Surviving Jack) and Blake McCormick (Cougar Town) to run our TV shows. Then I just step in and take credit for all their hard work. Any work they can't do is handled by Jeff Ingold and Randall Winston (my partners). I generally just drink a lot of coffee.


STORY: Power Showrunners: 10 to Watch for 2014


If my writers were to describe my style as a showrunner in five words or less, they might say …


Salim Akil (The Game): Salim -- Loveable asshole.


Sutter: Control. Control. Control. Control. Weepy.


Lloyd: Respectful, respectfully demanding, always late.


Meriwether: "Go back to set, Liz."


Weiner: "You're looking tall today, sir."


Harmon: "Quick, he's sleeping, stab him."


Lawrence: Moderately effective, disorganized chaos.


Bays: Handsome, handsome, handsome, handsome, handsome!


Sorkin: Nobody on our show uses five words or less.



Source: http://feedproxy.google.com/~r/live_feed/~3/ZaXWUY5FvIw/story01.htm
Category: constitution day   sons of anarchy   Wentworth Miller   amanda bynes   Conjuring  

Florida bullying case raises questions for parents

ST. PETERSBURG, Fla. (AP) — When two girls, aged 12 and 14, were arrested in a bullying-suicide investigation in Florida, many wondered: Where were their parents and should they be held responsible?


The mother and father of the older girl went on national TV and defended their daughter — and themselves. They said they often checked their daughter's social networking activity and don't believe their daughter bullied Rebecca Sedwick to suicide, as authorities have charged.


Whether or not you believe the family, experts say parents should use Rebecca's case to talk to their children.


"Sit down and say, 'I know most kids won't tell their parents, but tell me what you would want from me if you were being cyberbullied,'" said Parry Aftab, a New Jersey-based lawyer and expert on bullying.


She advocates a "stop, block and tell" approach. "Don't answer back, block the cyberbully online and tell a trusted adult," Aftab said.


In Rebecca's case, she did talk to her mother about the bullying and even changed schools, yet the tormenting continued online, authorities said. About a month ago, Rebecca decided she couldn't take it anymore and jumped to her death at an abandoned concrete plant.


It was a Facebook comment over the weekend that Polk County Sheriff Grady Judd said led him to arrest the girls. He repeated the online post from the older girl almost word for word at a news conference Tuesday.


"'Yes, I bullied Rebecca and she killed herself but I don't give a ...' and you can add the last word yourself," Judd said.


The sheriff was aggravated the girl's parents allowed her access to social networks after Rebecca's death and said he made the arrest so she wouldn't bully anyone else.


In an interview with ABC News that aired Wednesday, the 14-year-old's parents said their daughter would never write something like that and the girl's Facebook account had been hacked, a claim police don't believe.


"My daughter don't deserve to be in the place she's in right now and I just hope that the truth comes to the surface so we can get out of this nightmare," her father told ABC News.


A day earlier, he told The Associated Press by phone: "My daughter's a good girl and I'm 100 percent sure that whatever they're saying about my daughter is not true."


The girls were charged as juveniles with third-degree felony aggravated stalking. The sheriff said even if they are convicted, they probably won't spend time in juvenile detention because they don't have a criminal history.


He identified the girls and showed their mug shots during the news conference, but AP generally does not name juveniles charged with crimes.


Police also considered charging the parents, but so far can't prove complacency or that they knew about the bullying, sheriff's spokesman Scott Wilder said Wednesday.


Authorities said about a year ago, the bullying began after the 14-year-old girl started dating Rebecca's ex-boyfriend. The older girl threatened to fight Rebecca while they were sixth-graders at Crystal Lake Middle School and told her "to drink bleach and die," the sheriff said. She also convinced the younger girl to bully Rebecca, even though they had been best friends.


Judd said the younger girl had shown remorse while the older one was "very cold, had no emotion at all upon her arrest."


The younger girl's father told ABC News he wished he could have done more.


"I feel horrible about the whole situation," he said. "It's my fault, maybe that I don't know more about that kind of stuff. I wish I did."


He did not return a telephone call from AP.


David Tirella, a Tampa attorney who has represented the families of bullying victims in lawsuits against schools, said the publicity over Rebecca's case and the charges may further awareness in a way that few cases have in the U.S.


"Victims are being empowered, families are talking about it," said Tirella, who is also a Stetson University law professor. "We took a big step forward in Florida to help protect victims."


___


Follow Tamara Lush on Twitter at http://twitter.com/tamaralush


Source: http://news.yahoo.com/florida-bullying-case-raises-questions-parents-203501216.html
Similar Articles: Dancing With the Stars 2013   joe flacco   olinguito   oj simpson   Edward Snowden  

How to Design — And Defend Against — The Perfect Security Backdoor




Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED



We already know the NSA wants to eavesdrop on the internet. It has secret agreements with telcos to get direct access to bulk internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext — encrypted information — and figure out which programs could have created it.


But what the NSA wants is to be able to read that encrypted information in as close to real-time as possible. It wants backdoors, just like the cybercriminals and less benevolent governments do.


And we have to figure out how to make it harder for them, or anyone else, to insert those backdoors.



How the NSA Gets Its Backdoors






Bruce Schneier is a security technologist and author. His latest book is Liars and Outliers: Enabling the Trust Society Needs to Survive.






The FBI tried to get backdoor access embedded in an AT&T secure telephone system in the mid-1990s. The Clipper Chip included something called a LEAF: a Law Enforcement Access Field. It was the key used to encrypt the phone conversation, itself encrypted in a special key known to the FBI, and it was transmitted along with the phone conversation. An FBI eavesdropper could intercept the LEAF and decrypt it, then use the data to eavesdrop on the phone call.


But the Clipper Chip faced severe backlash, and became defunct a few years after being announced.


Having lost that public battle, the NSA decided to get its backdoors through subterfuge: by asking nicely, pressuring, threatening, bribing, or mandating through secret order. The general name for this program is BULLRUN.


Defending against these attacks is difficult. We know from subliminal channel and kleptography research that it’s pretty much impossible to guarantee that a complex piece of software isn’t leaking secret information. We know from Ken Thompson’s famous talk on “trusting trust” (first delivered in the ACM Turing Award Lectures) that you can never be totally sure if there’s a security flaw in your software.


Since BULLRUN became public last month, the security community has been examining security flaws discovered over the past several years, looking for signs of deliberate tampering. The Debian random number flaw was probably not deliberate, but the 2003 Linux security vulnerability probably was. The DUAL_EC_DRBG random number generator may or may not have been a backdoor. The SSL 2.0 flaw was probably an honest mistake. The GSM A5/1 encryption algorithm was almost certainly deliberately weakened. All the common RSA moduli out there in the wild: We don’t know. Microsoft’s _NSAKEY looks like a smoking gun, but honestly, we don’t know.


How the NSA Designs Backdoors


While a separate program that sends our data to some IP address somewhere is certainly how any hacker — from the lowliest script kiddie up to the NSA – spies on our computers, it’s too labor-intensive to work in the general case.


For government eavesdroppers like the NSA, subtlety is critical. In particular, three characteristics are important:


Low discoverability. The less the backdoor affects the normal operations of the program, the better. Ideally, it shouldn’t affect functionality at all. The smaller the backdoor is, the better. Ideally, it should just look like normal functional code. As a blatant example, an email encryption backdoor that appends a plaintext copy to the encrypted copy is much less desirable than a backdoor that reuses most of the key bits in a public IV (“initialization vector”).


High deniability. If discovered, the backdoor should look like a mistake. It could be a single opcode change. Or maybe a “mistyped” constant. Or “accidentally” reusing a single-use key multiple times. This is the main reason I am skeptical about _NSAKEY as a deliberate backdoor, and why so many people don’t believe the DUAL_EC_DRBG backdoor is real: They’re both too obvious.


Minimal conspiracy. The more people who know about the backdoor, the more likely the secret is to get out. So any good backdoor should be known to very few people. That’s why the recently described potential vulnerability in Intel’s random number generator worries me so much; one person could make this change during mask generation, and no one else would know.


These characteristics imply several things:


• A closed-source system is safer to subvert, because an open-source system comes with a greater risk of that subversion being discovered. On the other hand, a big open-source system with a lot of developers and sloppy version control is easier to subvert.


• If a software system only has to interoperate with itself, then it is easier to subvert. For example, a closed VPN encryption system only has to interoperate with other instances of that same proprietary system. This is easier to subvert than an industry-wide VPN standard that has to interoperate with equipment from other vendors.


• A commercial software system is easier to subvert, because the profit motive provides a strong incentive for the company to go along with the NSA’s requests.


• Protocols developed by large open standards bodies are harder to influence, because a lot of eyes are paying attention. Systems designed by closed standards bodies are easier to influence, especially if the people involved in the standards don’t really understand security.


• Systems that send seemingly random information in the clear are easier to subvert. One of the most effective ways of subverting a system is by leaking key information — recall the LEAF — and modifying random nonces or header information is the easiest way to do that.


Design Strategies for Defending Against Backdoors


With these principles in mind, we can list design strategies. None of them is foolproof, but they are all useful. I’m sure there’s more; this list isn’t meant to be exhaustive, nor the final word on the topic. It’s simply a starting place for discussion. But it won’t work unless customers start demanding software with this sort of transparency.


Vendors should make their encryption code public, including the protocol specifications. This will allow others to examine the code for vulnerabilities. It’s true we won’t know for sure if the code we’re seeing is the code that’s actually used in the application, but surreptitious substitution is hard to do, forces the company to outright lie, and increases the number of people required for the conspiracy to work.


The community should create independent compatible versions of encryption systems, to verify they are operating properly. I envision companies paying for these independent versions, and universities accepting this sort of work as good practice for their students. And yes, I know this can be very hard in practice.


There should be no master secrets. These are just too vulnerable.


All random number generators should conform to published and accepted standards. Breaking the random number generator is the easiest difficult-to-detect method of subverting an encryption system. A corollary: We need better published and accepted RNG standards.


Encryption protocols should be designed so as not to leak any random information. Nonces should be considered part of the key or public predictable counters if possible. Again, the goal is to make it harder to subtly leak key bits in this information.


***


This is a hard problem. We don’t have any technical controls that protect users from the authors of their software.


And the current state of software makes the problem even harder: Modern apps chatter endlessly on the internet, providing noise and cover for covert communications. Feature bloat provides a greater “attack surface” for anyone wanting to install a backdoor.


In general, what we need is assurance: methodologies for ensuring that a piece of software does what it’s supposed to do and nothing more. Unfortunately, we’re terrible at this. Even worse, there’s not a lot of practical research in this area — and it’s hurting us badly right now.


Yes, we need legal prohibitions against the NSA trying to subvert authors and deliberately weaken cryptography. But this isn’t just about the NSA, and legal controls won’t protect against those who don’t follow the law and ignore international agreements. We need to make their job harder by increasing their risk of discovery. Against a risk-averse adversary, it might be good enough.



Source: http://feeds.wired.com/c/35185/f/661370/s/328744bb/sc/7/l/0L0Swired0N0Copinion0C20A130C10A0Chow0Eto0Edesign0Eand0Edefend0Eagainst0Ethe0Eperfect0Ebackdoor0C/story01.htm
Similar Articles: darren sproles   grand theft auto 5   Malcom Floyd   green bay packers   VMAs  

Roku 2


Sometimes a device gets even better when it loses a few frills, especially if it becomes even more affordable in the bargain. The Roku 3 stood as our Editors' Choice media hub because of its low price, huge selection of online services and channels, an intuitive menu system, and the option to listen to what you're watching through a headphone jack on the remote control. The Roku 2 keeps all of these handy features and still supports full 1080p HD. It only loses the motion-sensing remote control for games and an Ethernet port, neither of which are must-have features. And at $79.99 (direct) it's $20 less expensive, making it our new Editors' Choice. 



Design
Almost physically identical to the Roku 3, the Roku 3 is a small, square, black plastic puck measuring 3.7 inches on each side and standing 1.2 inches tall. It weighs just 3.5 ounces, so particularly heavy HDMI cables can potentially throw the little player off-balance and lift it up. It has no buttons and only one indicator light on the front. The back panel only holds HDMI and composite outputs and the power connector. The lower price tag and composite video output come at the cost of an Ethernet connector; you need to use the Roku 2's integrated dual-band (802.11a/b/g/n) Wi-Fi to take it online.




The remote is also similar, though it lacks the motion controls and video game support of the Roku 3's remote. That means you'll have to turn to another electronic device to play Angry Birds. It's a small, slightly curved wand with a prominent direction pad, standard playback and menu navigation buttons, and dedicated service buttons for Netflix, M-GO, Hulu Plus, and Blockbuster. It connects to the Roku 2 via Wi-Fi Direct rather than infrared, so you don't need to point it directly at the box.


The left side of the remote features a 3.5mm jack for headphones , which was one of the most welcome new features on the Roku 3. (Volume control is on the right.) You get a cheap-sounding pair of earbuds in the box, but you can use any pair of headphones with a standard 3.5mm connector. Plugging in the headphones automatically mutes the HDTV audio, which enables private listening. It's a useful feature we've not seen elsewhere.


You can also control the box with the Roku app for Android and iOS. It turns your smartphone or tablet into a remote control, and lets you stream local media to the Roku 2. This is a nice alternative to the Apple TV and AirPlay, especially if you have an Android smartphone.


Channels
Like the Roku 3, the Roku 2 currently uses a panel- and tile-based layout that displays information on the screen in a much more dense, but accessible way than previous Roku menu systems. It's a simple, functional interface that shows more than a dozen icons for channels, movies, and shows at once. It's easy to set up, with a few on-screen prompts to configure the Roku 2's Wi-Fi and a short code to enter on Roku's website to sync it with your Roku account and manage your channels.



Roku's Channel Store offers more than 1,000 free and for-pay online services and apps, including the aforementioned Netflix, Hulu Plus, and Blockbuster streaming services (each with their own dedicated button on the remote). There are hundreds more services available, including on-demand options for major television networks, news portals, sports portals, and more targeted services like CrunchyRoll (Anime) and Midnight Pulp (horror and exploitation films).


The extremely useful Search function polls Netflix, Hulu Plus, Amazon Video-on-Demand, Vudu, and several other services, listing the various ways the movie you want to watch is available. However, the main menu focuses mostly on M-GO, a Vudu-like on-demand service that integrates into the Movies and TV Shows sections in the Roku 2's main menu. Fortunately, those are the only places where M-GO is forced upon your attention. Expect to spend much, much more time in the Search and Channel menus than the M-GO-heavy, curated Movies and TV Shows menus.


If you want a simple way to watch Netflix, Hulu Plus, and other online services on your HDTV, the Roku 2 is the most affordable and functional one out there. It's $20 less than the Roku 3, and the few things you lose stepping down to the Roku 2 are worth parting with for the price break. For $80 it brings together all of your most commonly used online media services, lets you search for your favorite movies and shows through many of them, and offers an impressive selection of more than 1,000 specialized and general interest content channels on top of that. This slightly more affordable, streamlined media hub unseats the Roku 3 as our Editors' Choice with its lower price tag and equally as compelling feature set. If you really want to save money and only want to watch Netflix, YouTube, and a handful of other services, the Google Chromecast can be had for $35. You'll have to give up the tons of channels and support for streaming media from your smartphone or tablet, though.


Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/4vW75WMBwo8/0,2817,2425735,00.asp
Related Topics: Lake Natron   VMA Awards  

Pynchon, Lahiri finalists for National Book Awards

(AP) — Thomas Pynchon, Jhumpa Lahiri and George Saunders are among the finalists for the National Book Awards.

A month after releasing long-lists of 10 in each of the four competitive categories, the National Book Foundation on Wednesday announced the five remaining writers for fiction, nonfiction, poetry and young people's literature. Finalists for nonfiction include three New Yorker staff writers: Lawrence Wright, George Packer and Jill Lepore.

Winners will be announced Nov. 20 at a dinner ceremony in Manhattan. Each winner will receive $10,000.

Associated PressSource: http://hosted2.ap.org/APDEFAULT/4e67281c3f754d0696fbfdee0f3f1469/Article_2013-10-16-National%20Book%20Awards/id-5721faba4b23434eb046a2c630d9a528
Related Topics: Texas A&m Football   NBA 2K14   betrayal   Joy Covey   Danny Garcia  

Intel CEO takes on Apple A7, cites 'Moore's Law advantage'

Responding to an analyst's question, Intel CEO waxes eloquent about the advantage of Intel's manufacturing technology compared with Apple's.


New Intel CEO Brian Krzanich

New Intel CEO Brian Krzanich


(Credit: Intel)

Intel CEO Brian Krzanich touted the merits of Intel's manufacturing process compared with that of Apple's new 64-bit A7 chip today after the company's earnings report.


During Intel's third-quarter earnings conference call on Tuesday, an analyst questioned Intel about the advantages of going to a 14-nanometer manufacturing process, compared with Apple's 28-nanometer A7 chip.


"[Apple] has been able to show very impressive benchmarks on 28-nanometer silicon," the analyst stated.


Generally, the smaller the chip geometries, the more advanced the chip manufacturing process and thus the faster and/or more power efficient the chip can be. Intel claims that it's jumped well ahead of the rest of the chip industry by moving to a cutting-edge 14-nanometer process first.


Here's what Krzanich said in response to the analyst's comment, citing, among other things, Moore's Law, which states that the number of transistors doubles approximately every two years.



All of our products are 64-bit. The products we're shipping today are already 64-bit. And if you take a look at things like transistor density. And if you compare, pardon the pun, apples to apples, and compare the A7 to our Bay Trail, which has a high-density 22-nanometer technology, then our transistor density is higher than the A7 is.


The A7 is a good product, but we do see the Moore's Law advantage from 28 [nanometer] to 22, when you compare dense technology to dense technology. And we believe 14 nanometers is just another extension of Moore's Law. That is, twice the density [of 22-nanometers].



Apple is the first to get a 64-bit chip into a consumer smartphone.

Apple is the first to get a 64-bit chip into a consumer smartphone.


(Credit: iFixit)

The challenge for Intel is that Apple is proving to be a world-class designer of fast-yet-power-efficient smartphone and tablet silicon with its A series of processors, essentially obviating the need for Apple to look to Intel for silicon in those devices.



And Apple is dropping hints that its 64-bit processors may be destined for devices that more directly challenge the traditional laptop PC.


"When Apple announced the iPhone 5S, it called the processor 'desktop-class,' and I don't think that was an accident -- it was sending what we think is a very clear signal that it will converge the iPhone and the MacBook Air," Canonical founder Mark Shuttleworth said recently in an interview, speculating on Apple's plans.


Source: http://news.cnet.com/8301-13579_3-57607636-37/intel-ceo-takes-on-apple-a7-cites-moores-law-advantage/?part=rss&tag=feed&subj=News-Apple
Category: miguel cotto   zac efron   djokovic   Miley Cyrus Vmas 2013 Youtube   Ross Lynch  

Tuesday, October 15, 2013

'Jump boxes' improve security, if you set them up right



With malicious hackers and malware infesting nearly every enterprise network these days, "jump boxes" have become very popular. A jump box is a specially secured computer that administrators must (or should) log on to in order to gain access to other computers and administrate them. The hope is that these jump boxes are specially secured -- and are less likely to get exploited by hackers or malware.


Jump boxes can decrease risk, but you need to implement their special protections properly. Many enterprises start with the best of intentions, but when I audit jump boxes, I often see a jumble of weak security policies and high-risk behaviors that make them just as insecure as a regular user's PC.


[ Take a tour of the latest threats and what you can do to stop them in InfoWorld's Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter. ]


In the computer security world, a basic premise underlies setting up a "secure environment": Systems of lower trust should never be able to modify or control systems of higher trust or importance. Most jump boxes tend to break this basic rule because the computers people use to connect to jump boxes are less trustworthy than the jump boxes themselves.


Often, PCs that connect to jump boxes are open to the Internet all day long and can be as infected and exploited as any other computer in your environment. What good is a jump box if the computer connecting to it has a keylogging Trojan copying every password or smartcard token you use? Your jump box and the computer linking to it -- let's call it the "originating computer" for this discussion -- should both be highly secure systems.


Here are the protective measures you should take for jump boxes and the systems that connect to them.


Security hardened
Most of today's operating systems and applications come fairly well secured. Don't mess it up. Consider configuring the originating computer and jump server with the "high security" settings if they exist. You want to enforce only the best and most secure protocols and options.


Strong authentication
If you use regular passwords, they should be long and complex (15 characters or more). Try to require smartcards or other two-factor authentication methods for all elevated users. If you're managing multiple environments (that is, different forests), make sure logon credentials are not shared among environments. If you use smartcards, key fobs, or other two-factor authentication, make sure those aren't shared, either. Yes, it'll be harder to administrate multiple environments. But if you share that stuff, why have different environments in the first place?


No browsing the Internet
If I check your jump box and see it has a browser installed or can browse to the Internet unhindered, then you've failed the audit. Browsing the Internet is a high-risk activity that should not be allowed either on the jump box or the originating computer. I know many of you probably use your regular workstation to connect to jump boxes. This is a bad idea. Use a separate computer (or VM) to connect to your jump box. That originating computer should not be able to browse the Internet to any site; if you allow it to connect only to vendor sites and legitimate driver download sites, that's OK.


Source: http://www.infoworld.com/d/security/jump-boxes-improve-security-if-you-set-them-right-228742?source=rss_infoworld_blogs
Related Topics: torrie wilson   twerking  

Pa. Caterpillars Predict Wet, Cold Winter


Over the weekend, people in Lewisburg, Pa., gathered for a weather forecast from caterpillars. Woolly bear caterpillars are black, with a brown stripe down the middle. Folklore says the larger the stripe, the milder the winter.



Copyright © 2013 NPR. For personal, noncommercial use only. See Terms of Use. For other uses, prior permission required.


DAVID GREENE, HOST:


Good morning. I'm David Greene. Sit down, Punxsutawney Phil. Over the weekend, people in Lewisburg, Pennsylvania, gathered for a weather forecast from caterpillars. Woolly bear caterpillars are black, with a brown stripe down the middle and folklore says the larger the stripe, the milder the winter. At the 17th annual Woolly Worm Winter Weather Prognostication Festival - say that twice - several woolly bears predicted a wet, cold winter ahead. Of course, they were wrong last year. It's MORNING EDITION.


Copyright © 2013 NPR. All rights reserved. No quotes from the materials contained herein may be used in any media without attribution to NPR. This transcript is provided for personal, noncommercial use only, pursuant to our Terms of Use. Any other use requires NPR's prior permission. Visit our permissions page for further information.


NPR transcripts are created on a rush deadline by a contractor for NPR, and accuracy and availability may vary. This text may not be in its final form and may be updated or revised in the future. Please be aware that the authoritative record of NPR's programming is the audio.


Source: http://www.npr.org/2013/10/15/234638758/pennsylvania-caterpillars-predict-wet-cold-winter?ft=1&f=3
Category: Rashad Johnson   grand theft auto 5   futurama   neil armstrong   Beyonce Haircut  

Chrome OS 30 stable build adds select, drag-and-drop features for touchscreens

Adventurous folks running Chrome OS beta have been enjoying the platform's new touchscreen functions since September, assuming they have a Pixel. Now, touchscreen text selection and drag and drop support is arriving to the operating system's stable build aboard the latest software update. While ...


Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/gvx6sismuOw/
Similar Articles: Kwame Kilpatrick   foxnews   iOS 7   iOS 7 download   The Conjuring  

Canadian Alice Munro Wins Nobel's Literature Prize


Alice Munro, "master of the contemporary short story," has won the Nobel Prize in Literature," the Royal Swedish Academy announced Thursday morning. In 2009, she won the Man Booker International Prize for her lifetime work.


Source: http://www.npr.org/2013/10/10/231352197/canadian-alice-munro-wins-nobel-s-literature-prize?ft=1&f=1032
Similar Articles: Preachers of LA   Tropical Storm Karen   Justin Morneau   Antoinette Tuff   bachelorette  

Hajj pilgrims set for Eid al-Adha feast


Muzdalifah (Saudi Arabia) (AFP) - Throngs of Muslim pilgrims converged Monday on Muzdalifah to prepare for Eid al-Adha feast after a day of prayer on Mount Arafat for an end to disputes and bloodshed.


The faithful will spend the night in Muzdalifah to collect stones which they will use a symbolic ritual of stoning the devil in nearby Mina on Tuesday, the first day of the feast of sacrifice.


Most of the pilgrims taking part in the annual hajj to Islam's holiest sites in Saudi Arabia travelled from Arafat to Muzdalifah on foot, while others took buses and trains, some riding on the roofs.


Thousands of security men were deployed to organise the traffic flowing into Muzdalifah, which only comes to life during the five days of the hajj.


Earlier in the day men, women and children from across the Muslim world flooded the roads to Arafat chanting "Labaik Allahum Labaik" (I am responding to your call, God), as they observed the peak of the hajj.


Helicopters hovered overhead and thousands of Saudi troops stood guard.


Many pilgrims camped in small colourful tents or took shelter under trees to escape temperatures of around 40 degrees Celsius (104 Fahrenheit). Special sprinklers were set up to ward off the heat.


In his annual sermon, top Saudi cleric Sheikh Abdulaziz al-Sheikh urged Muslims to avoid divisions, chaos and sectarianism, without explicitly speaking of the turmoil unleashed by the Arab Spring.


"Your nation is a trust with you. You must safeguard its security, stability and resources," he said.


"You should know that you are targeted by your enemy... who wants to spread chaos among you... It's time to confront this."


The cleric did not speak specifically of the deadly war wracking Syria, where Sunni-led rebels backed by Saudi Arabia are at war with a regime led by Alawites -- an offshoot of Shiite Islam -- and closely allied with Shiite Iran and Hezbollah.


The cleric insisted that Islam prohibits killing and aggression and said there is "no salvation or happiness for the Muslim nation without adhering to the teachings of the religion."


Attendance is sharply down from last year, due to fears of the MERS virus which has killed 60 people worldwide, including 51 in Saudi Arabia, and to expansion work at the Grand Mosque in Mecca.


Prince Khaled al-Faisal, the governor of Mecca province who heads the central hajj committee, said 1.38 million pilgrims had come from outside the kingdom while 117,000 permits were issued for locals.


This puts the total number of pilgrims at almost 1.5 million, less than half of last year's 3.2 million, after Riyadh slashed hajj quotas.


Prince Khaled said authorities had turned back 70,000 nationals and expatriates for not carrying legal permits and had arrested 38,000 others for performing the hajj without a permit.


Authorities have also seized as many as 138,000 vehicles for violating the hajj rules, and owners would be penalised, he said.


Saudi health authorities have stressed that no cases of the Middle East Respiratory Syndrome (MERS) virus have been detected so far this pilgrimage.


Prayers for peace in troubled times


Many pilgrims said they were praying for peace in Muslim nations mired in sectarian and political strife.


"I will pray the whole day for God to improve the situation for Muslims worldwide and for an end to disputes and bloodshed in Arab countries," said 61-year-old Algerian pensioner Saeed Dherari.


"I hope that God will grace all Muslims with security and stability," said 75-year-old Ahmad Khader, who hails from the southern Syrian province of Daraa, where the country's uprising began.


"The regime is tyrannical and I pray for God to help the oppressed people," he said, referring to Syrian President Bashar al-Assad's embattled government.


Egyptian Ahmad Ali, who is performing hajj for the first time, prayed for peace in his country where hundreds have been killed in fighting between security forces and Islamist supporters of ousted president Mohamed Morsi.


"I pray for Egypt to enjoy security and stability and for the people to reach understanding and reconciliation," Ali said.


The hajj, which officially ends on Friday, is one of the five pillars of Islam that every capable Muslim must perform at least once.


The pilgrims started the hajj journey on Sunday, moving out of the holy city of Mecca to nearby Mina, where most of them spent the night following the traditions of the Prophet Mohammed, who performed the rituals 14 centuries ago.



Source: http://news.yahoo.com/muslim-pilgrims-throng-mount-arafat-hajj-climax-065848537.html
Related Topics: Common App   Tom Clancy   Gta 5 Online Not Working   cher   justin timberlake  

Automatic cuts re-emerge as budget battle issue

WASHINGTON (AP) — The broad, automatic spending cuts known as sequestration have re-emerged as a central issue in efforts to end the partial government shutdown and avert a federal default.


Many conservatives view the past seven months of lower spending levels as one of their rare accomplishments in dealing with President Barack Obama and want to continue them.


But GOP defense hawks complain that the next round of automatic cuts falls almost entirely on the Pentagon, and many Republicans want to shift that burden to domestic programs.


Obama and Democrats would do away with them altogether, substituting new taxes and maybe some spending cuts elsewhere in their place. Republicans are agreeable — Democrats much less so — to trimming future Social Security benefits or making wealthier retirees pay higher premiums for Medicare in place of the automatic cuts.


Sequestration deals mostly with the day-to-day operating budgets of federal agencies. The Veterans Administration is exempt, as are the biggest "mandatory" benefit programs like Social Security, food stamps and Medicaid. The president's health care program — "Obamacare" —also is exempt.


The impact of the automatic cuts that went into effect in March was not as harsh as many people feared. Some agencies were able to move money around to prevent or reduce furloughs.


For many Americans, however, the impacts have been real. Health research has slowed, thousands of Head Start slots have been eliminated and poor people have been left hanging on waiting lists for housing subsidy vouchers.


The future is uncertain but easing or eliminating a new round of automatic spending cuts in January is likely to be a focus of any budget talks once the government reopens fully. Giving agencies more flexibility to adjust to reduced funding levels also is being discussed.


A brief primer on the automatic spending cuts and what might happen next:


—Sequestration was established by the 2011 Budget Control Act to reduce government spending by $1.2 trillion over 10 years. The cuts were to be divided between defense and domestic programs and achieved through caps on the money Congress can appropriate each year.


—For fiscal 2013 ending Sept. 30, sequestration lowered Congress' spending cap from $1.043 trillion to $988 billion. Of the $55 billion in spending cuts, $22 billion was from a 4.5 percent cut in domestic programs and $33 billion was from a 6 percent cut in military spending. That reduced the Pentagon's budget this past year from $552 billion to $519 billion. In addition, benefit programs were cut $17 billion. Of that, $11 billion was from fee reductions for Medicare providers like doctors and hospitals. The other $6 billion was spread among smaller programs like farm subsidies. Altogether the sequester produced total budget savings of $72 billion in 2013.


—For fiscal 2014, the sequester lowers the cap on what Congress can spend to $967 billion. Virtually all of the additional savings would come from new and deeper cuts to the military. The Pentagon's budget would drop from $519 billion to $498 billion.


—The debate: House Republicans want to maintain the $967 billion cap for fiscal 2014 but shift all the sequester cuts from the Pentagon to domestic programs. Democrats want to do away with the sequester entirely and set the spending cap at $1.06 trillion.


Congressional leaders tentatively have agreed to extend the 2013 cap of $988 billion for three months while they attempt to negotiate a broader deal for easing or replacing the automatic spending cuts.


Source: http://news.yahoo.com/automatic-cuts-emerge-budget-battle-issue-060358892--finance.html
Similar Articles: Texas A&m Football   Cleveland Indians   Lady Gaga Vma   Whodunnit   hell on wheels  

Sunday, October 13, 2013

NC Chamber to help with health insurance | CharlotteObserver.com


The N.C. Chamber, the state’s powerful business lobby, is setting up a private statewide insurance exchange to sell health policies to people whose employers drop health coverage for their workers.


It’s a first for North Carolina and is scheduled to go public next week, offering a glimpse into the nation’s emerging insurance landscape. It will be one of a number similar private exchanges being prepared in about 18 states, said Jim Simpson, chief operating officer of the N.C. Chamber.


Chamber officials expect a significant healthcare shift in which companies stop offering insurance in a move to manage healthcare costs. Instead, employers will opt to pay workers a cash allowance so they can shop for their own policies.


The shift is expected to spread among small employers across the country; larger businesses, meanwhile, will be required to provide insurance under the nation’s healthcare law, the Affordable Care Act.


The Chamber’s exchange is designed to function much like the federal insurance exchange, www.healthcare.gov, that was launched Oct. 1 to sell subsidized policies to the uninsured. But the Chamber’s version will not offer federally subsidized insurance, and many of those who shop on the private exchange will be employees accustomed to workplace coverage who will be purchasing an individual insurance policy for the first time.


“The employee will have a heck of a lot more choice in what they actually need,” Simpson said. “This will be an option where they can get a full-suite package.”


Private insurance exchanges have recently been introduced by IBM, Time Warner and other large corporations as a means of providing supplemental Medicare coverage to retirees. Private exchanges make it easier to compare prices because they include policies from multiple insurers on one website.


Such exchanges are sometimes greeted with skepticism because companies use them to control runaway healthcare costs. But many also prefer the wider range of options than workplace coverage, which typically involves a single insurer.


“My only concern is consumer confusion,” said Adam Linker, a policy analyst with the N.C. Justice Center in Raleigh. “I don’t think it’s a bad thing as long as people aren’t confused about the fact that there’s only one federal exchange where you can get your subsidy.”


The Chamber will offer its private exchange through CieloStar, a nationwide health benefits technology company. The private exchange will offer at least three insurers, including the state’s biggest, Blue Cross Blue Shield.


CieloChoice will offer health, dental, vision, Medicare supplemental and other types of policies. The policies can be purchased from multiple insures but will be bundled on one bill, Simpson said.


With regard to learning about insurance policies, the other options for insurance shoppers who lose coverage at the office will be talking to an insurance agent or navigating websites of insurance companies that sell policies here. Some independent agents, however, represent only one insurer.


Simpson said the Chamber’s private exchange will also receive a “small royalty” for every policy sold through the exchange. He expects many other private exchanges to become available in North Carolina — some created by insurance companies, insurance agents and other organizations — but not all providing information about all available insurance options.


The number of private exchanges will reflect the number of employees who lose workplace coverage and are forced to buy their own policies.


“The potential pool is huge,” Simpson said.


Source: http://www.charlotteobserver.com/2013/10/11/4381668/nc-chamber-to-create-health-insurance.html
Similar Articles: david cassidy   princess diana   regions   Tim Hudson   von miller