Futurist from 1979 Predicts Modern Computers and Privacy

From David Hoffman:

Alan Westin Is a privacy expert and I got the chance to interview him in 1979 when I was making a television documentary called “The Information Society. There was a lot of talk about “privacy” back then and he presents his point of view about how society should deal with this. This is an outtake from the film itself so please pardon the technical glitches.

[David Hoffman]


The Cosplay of HeroesCon 2017 [Video]

From Beat Down Boogie:

Beat Down Boogie’s Blake Faucette and Matthew Sumner recently traveled to HeroesCon, a comic book focused convention in Charlotte, NC. This event continues to attract more amazing cosplayers each year and we were fortunate enough to have many of them take the time to be a part of our video. With it’s laid back, chill environment, awesome cosplayers, great guests, tons of comics and more, it’s easy to see why HeroesCon has become one of the biggest cons on the East Coast. Enjoy the video!

[beatdownboogie]

1997: The Birth of the Camera Phone

On June 11th, 1997, Philippe Kahn created the first camera phone solution to share pictures instantly on public networks. The impetus for this invention was the birth of Kahn’s daughter, when he jerry-rigged a mobile phone with a digital camera and sent photos in real time. In 2016 Time Magazine included Kahn’s first camera phone photo in their list of the 100 most influential photos of all time.

[Conscious Minds]

Oh, Pish Tosh: A Beauty and the Beast Mrs. Potts Sculpted Ceramic Teapot

A gorgeous teapot shaped like Mrs. Potts, the teapot from Beauty and the Beast that was introduced us 25 years ago.

Serve your guests in grand style with this Mrs. Potts Sculpted Ceramic Teapot that looks like it’s walked straight out of the animated version of Beauty and the Beast. But you don’t need guests – just pour yourself a cup! This teapot is guaranteed to make the whole experience sweeter, and everything tastes better when you smile, right? You provide your own little mug with a chip.

[Beauty and the Beast Mrs. Potts Sculpted Ceramic Teapot]

Poutine Donut? YES! Poutine Donut!

To celebrate the 150th anniversary of Canada, Canadian chain Tim Hortons will be selling what is possibly one of the most Canadian things ever: A poutine donut! The donut, which will strangely be only available in U.S. locations of the chain, will be composed of a honey donut, potato wedges, a few pieces of cheese curds, and a little poutine sauce.

A weird and disgusting mix? Yes, absolutely! Would I try it anyways? Probably… if only it would be available in Canada! On top of the donut, Tim Hortons will also be serving maple donut holes and a maple bacon iced cappuccino. Only 5 locations will be offering the full lineup though: three in the state of New York, one in Michigan, and on in Ohio.

[Picture source: Business Wire / Tim Hortons]

Windows 10 To Protect Folder Access

Windows 10 is testing a way to make it harder for ransomware to encrypt files. The optional feature would only allow approved apps to access, read from or write to a particular folder.

“Controlled folder access” is planned to be part of Windows Defender and is already being tested by some users in the Windows Insider program.

If users choose to enable the feature, some folders will be protected by default, including Documents and the Desktop. It won’t be possible to “unprotect” these folders without disabling the feature completely. Other than this, users can choose which additional folders to protect.

Although Microsoft uses the term “blacklisting”, the description suggests that app access will actually be whitelisting with only designated apps being allowed to alter or add files in the folder in question. It also appears users will have complete control over which apps to whitelist.

As well as blocking file modification from apps not on the list, Windows will also display a notification about the attempt.

Insider Program users will need to manually switch on the feature. It’s not clear if it will be enabled by default if and when it rolls out to the wider userbase.

As Arstechnica notes, the approach does have some significant limits, the main one being that it doesn’t deal with exploits that hijack “trusted” apps such as rogue Word macros changing files.