Dom Deluise, Tivo, Macworld Expo

Total Page:16

File Type:pdf, Size:1020Kb

Dom Deluise, Tivo, Macworld Expo Search: Join TechTV Member Services Site Help Get TechTV You are here: Home > TV Shows > The Screen Savers > Show Notes > Dom DeLuise, TiVo, Macworld Expo · HOME The Screen Savers: For Technology's Biggest Fans Select a TV Show Premieres Weekdays 7 p.m. Eastern · TECH NEWS · PRODUCTS & REVIEWS Dom DeLuise, TiVo, Macworld Expo · HELP & HOW TO Printer-friendly format · ENTERTAINMENT Email this story · Interact Inside Macworld Expo · Video New York Times columnist and · TechTV Store author David Pogue gives us his The Screen Savers best and worst of Macworld 2002 Watch This on TV Broadband and comments on what this means Linux for the future strategies of Apple There are no upcoming Geek Library computers. He gives us his airdates for this episode. Big Screen Dom DeLuise -- Dumbfounded predictions for the Mac in 2003 and Show Notes "The Screen Savers" House Calls Interact patrol is back! Martin Sargent and beyond. For more information on Last aired on: Pogue's interview during the show, Wednesday 7/24 Netcam Network Kevin Rose help Dom DeLuise add About Us click here. Archive a response page to his website to Also on This Episode keep in touch with his fans. Increase Your TiVo Storage · The Case of the Missing Don't have enough hard-drive space Cellphone in your TiVo? On today's show Leo · Nvidia GeForce Chips Explained will show us how to upgrade the · House Call: Dom DeLuise hard drive to record all the shows · Filmmaking With Final he's missing. Links: Cut Pro · Free Download of the Day: TMPGEnc l The Unofficial TiVo Hackers · Talkback: Hollywood Site Hackers l Weaknees Tivo Hardware · Site of the Nite: Mods ConnectNet · Twisted List: Five Free l How To Upgrade the TiVo New Games from Hollywood More From This Episode All about this episode > Question of the day TechTV Spotlight Should Hollywood be allowed to hack? Vote in our poll and join our Talkback discussion. Site of the Nite Our nightly segment uncovers the treasures of the Web. Tonight's site: ConnectNet. Nomad Muvo 128MB MP3 Player See the site. Only $122.99 in the TechTV Store GeForce Nvidia has several versions of its GeForce video technology available. What's the difference between them all? We explain it all. Wireless and Mobile Tip When you lose your cellphone, follow the advice of a law enforcement official and fellow TSS viewer. Read the tip. Final Cut Pro tip Digital video editing with music video editor and author David Teague. Learn more. Teague's book, "Final Cut Pro 3 and the Art of Filmmaking" can be purchased at Amazon.com. Buy this product at Amazon.com Twisted List Five free games from the websites of the latest Hollywood releases. Read the list. Supergeek Challenge Test your tech knowledge in our weekly quiz. You could win free stuff. Accept the challenge. Windows tip You can quickly explore the contents of your computer by right clicking the Start button and choosing Explore. Web tip Get the Google toolbar to quickly search both the Internet and the site you're currently visiting. IM Quote of the Day Instant message us your thoughts and you could be featured here. Answers to Live Calls Macworld Expo Wrapup with David Pogue Some highlights from the Macintosh gathering in New York: l Best of Expo: New iPod features, which includes PC support. l Worst of Expo: Paying for iTools, which is now call .Mac. One of the perks of Mac ownership was free online storage, a free homepage, and free email for life. Now Apple is charging about $100 a year for the same privileges. In these thin computer times, one can't necessarily criticize Apple from making choices that can support its business, but some of it's customers are left with a mere five weeks to pay or have their accounts deleted. l Pogue says that there were no huge revelations this Expo, and maintains that Apple is moving away from making major system announcements at these conferences. l Microsoft used to need Apple around to point to as a competitor, but now that the anti -trust smoke has cleared and Apple is engaged in a direct PC-smear campaign, Microsoft is beginning to take notice. A potential club Microsoft may wield against Apple is Microsoft Office for the Mac, but Pogue maintains that enough open-source office clones exist to support Apple through any decisions Microsoft may make. l For more information about Pogue, visit his website. Boot Camp tip Charles in Raleigh, North Carolina, wants to know how to customize his system sounds in Mac OS X. All the details are here. Did we miss anything? Email us. Please note that this page is updated throughout the live broadcast of the show at 7 p.m. Eastern. (Do not send your computer questions to this email address. The address for your questions is [email protected].) Looking for a past article? Find it in our archive, which keeps a list of articles up to a year old. Originally aired July 23, 2002 Modified July 31, 2002 Join TechTV Member Services Site Help About Us Contact Us Jobs TechTV International Get TechTV Copyright © 2003 TechTV Inc. All rights reserved. Use of Techtv.com is subject to certain terms and conditions. We respect your privacy. .
Recommended publications
  • Theescapist 103.Pdf
    originally a mass of badly dressed Call and its wide open world. Michael Escapist Forum: I very much respect characters became a group of Zenke speaks to a few radiomen at the the hard work Richard has done over the individuals, individuals selling stuff and forefront of the MMOG podcast movement. years, but I have a very hard time For me, it started way back in 1999. It talking about killing things bigger than And Dana Massey explains what Blizzard reconciling what he’s saying here with was February; I was 15. A friend of mine rats. A guy dressed like a wizard did right with World of Warcraft, but his new chosen medium. had me over to take a look at a new summoned a demon right next to me, worries none of the other players in the game he just got: Ultima Online. He then named it “a” and told it to follow field learned the correct lesson. MMOs are a poor vehicle for telling a showed me an ugly little isometric view him. Then a woman wearing nothing but story. While all MMOs HAVE a story, the of a town called Britain, though I a robe stole the sword I had in my Enjoy! players are usually so busy squabbling couldn’t figure out why - no fog or guys backpack. The whole place teemed with over mechanics or questing for loot that in furry hats. The area he referred to as possibility, and I was hooked. Yours, they couldn’t care less about WHY the bank was overrun with people, real they’re doing it.
    [Show full text]
  • The Joys of Ddos
    The Joys of DDoS Barrett Lyon Prolexic Technologies Jay Adelson Digg Network Terrorist Motivations • Extortionists: Many Based in Asia / Eastern Europe _ Most common motivation for DDoS attacks; ransom sites for thousands, and sometimes hundreds of thousands, of dollars _ Once operator agrees to pays, the attacker simply redirects the DDoS at another site (usually in the same industry sector) • Competitive Sabotage _ Rival businesses employ attackers to eliminate competition _ Harm to brand • Hackers Pride _ To gain notoriety, often target high-profile sites _ Censorship • Network Warfare _ Recent attacks to the National Security Agency in the United States show that the Internet can be used to attack government interests. 2 © Prolexic Technologies, 2006 Recap: Extortion • Anonymous EMAIL systems • Rude, use poor English • Attempt to establish communication with president/principals of the Company 3 © Prolexic Technologies, 2006 Recap: Extortion 4 © Prolexic Technologies, 2006 Competitive Sabotage •DVD Sales during Christmas •Rx Sales due to Ad-Words competition •Shutting down payment processing: HYIP / Stormpay.com 5 © Prolexic Technologies, 2006 The attack: Mixed GET/SYN Flood to port 80 6 © Prolexic Technologies, 2006 The attack: PPS rates 7 © Prolexic Technologies, 2006 Hackers Pride •Digg.com: Bad guy (Fred Ghosn of Canada) vs. Kevin Rose 8 © Prolexic Technologies, 2006 Digg and IRC <A> digg.com / revision3.com. <A> tonight. <A> :<. <B> we wull see. <A> fucking kevin rose. <A> i miss. <A> my old bots. <A> from like. <A> 2 years. <A> i had. <A> 1.8 million. <A> :<. <A> my biggest. <A> channel. <A> was. <A> 980k. 9 © Prolexic Technologies, 2006 Digg and IRC Why isn't his attack succeeding? He claims: <A> now i got shit.
    [Show full text]
  • Why No Wonder Woman?
    Why No Wonder Woman? A REPORT ON THE HISTORY OF WONDER WOMAN AND A CALL TO ACTION!! Created for Wonder Woman Fans Everywhere Introduction by Jacki Zehner with Report Written by Laura Moore April 15th, 2013 Wonder Woman - p. 2 April 15th, 2013 AN INTRODUCTION AND FRAMING “The destiny of the world is determined less by battles that are lost and won than by the stories it loves and believes in” – Harold Goddard. I believe in the story of Wonder Woman. I always have. Not the literal baby being made from clay story, but the metaphorical one. I believe in a story where a woman is the hero and not the victim. I believe in a story where a woman is strong and not weak. Where a woman can fall in love with a man, but she doesnʼt need a man. Where a woman can stand on her own two feet. And above all else, I believe in a story where a woman has superpowers that she uses to help others, and yes, I believe that a woman can help save the world. “Wonder Woman was created as a distinctly feminist role model whose mission was to bring the Amazon ideals of love, peace, and sexual equality to ʻa world torn by the hatred of men.ʼ”1 While the story of Wonder Woman began back in 1941, I did not discover her until much later, and my introduction didnʼt come at the hands of comic books. Instead, when I was a little girl I used to watch the television show starring Lynda Carter, and the animated television series, Super Friends.
    [Show full text]
  • Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism
    Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 3 Conference: Expanding the Frontiers of Intelligence Education Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 1-9 Recommended Citation Adkins, Gary. "Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism." Journal of Strategic Security 6, no. 3 Suppl. (2013): 1-9. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 3 Adkins: Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins Introduction The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has become a great asset to both businesses and private citizens. However, there is a dark side to the age we live in as it allows terrorist groups to communicate, plan, fund, recruit, and spread their message to the world. Given the relative anonymity the Internet provides, many law enforcement and security agencies investigations are hindered in not only locating would be terrorists but also in disrupting their operations.
    [Show full text]
  • The Complete Guide to Social Media from the Social Media Guys
    The Complete Guide to Social Media From The Social Media Guys PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 08 Nov 2010 19:01:07 UTC Contents Articles Social media 1 Social web 6 Social media measurement 8 Social media marketing 9 Social media optimization 11 Social network service 12 Digg 24 Facebook 33 LinkedIn 48 MySpace 52 Newsvine 70 Reddit 74 StumbleUpon 80 Twitter 84 YouTube 98 XING 112 References Article Sources and Contributors 115 Image Sources, Licenses and Contributors 123 Article Licenses License 125 Social media 1 Social media Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media uses web-based technologies to turn communication into interactive dialogues. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content."[1] Businesses also refer to social media as consumer-generated media (CGM). Social media utilization is believed to be a driving force in defining the current time period as the Attention Age. A common thread running through all definitions of social media is a blending of technology and social interaction for the co-creation of value. Distinction from industrial media People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
    [Show full text]
  • 2004 February
    February 2004 Games and Entertainment Megan Morrone Today you can use the same machine to organize your finances, create a presentation for your boss, and defend the Earth from flesh-eating aliens. But let’s be honest: Even with the crazy advances in software, organizing your finances and creating a presentation for your boss are still not half as much fun as defending the Earth from flesh-eating aliens.That’s why we’ve devoted the entire month of February to the noble pursuit of games and entertainment for PCs, Macs, game consoles, and PDAs. I know what you’re thinking.You’re thinking that you can skip right over this chapter because you’re not a gamer. Gamers are all sweaty, pimpled, 16-year-old boys who lock themselves in their basements sustained only by complex carbohydrates and Mountain Dew for days on end, right? Wrong.Video games aren’t just for young boys anymore. Saying you don’t like video games is like saying you don’t like ice cream or cheese or television or fun.Are you trying to tell me that you don’t like fun? If you watch The Screen Savers,you know that each member of our little TV family has a uniquely different interest in games. Morgan loves a good frag fest, whereas Martin’s tastes tend toward the bizarre (think frogs in blenders or cow tossing.) Kevin knows how to throw a cutting-edge LAN party,while Joshua and Roger like to kick back with old-school retro game emulators. I like to download free and simple low-res games that you can play on even the dinkiest PC, whereas Patrick prefers to build and rebuild the perfect system for the ultimate gaming experience (see February 13).And leave it to Leo to discover the most unique new gaming experience for the consummate early adopter (see February 1).
    [Show full text]
  • Sam Harris Interview Part Four
    SAM HARRIS INTERVIEW PART FOUR NOTE: This transcript was generated by the service Rev.com, and though it’s quite good, it is imperfect. If you would like to quote anything from this episode you are welcome to! But please find the point in the audio where the quote originates, and verify that the transcript is accurate. If Rev’s transcript is inaccurate, we ask that you only post or publish a version of the quote that you deem correct (because your ears are awesome!). Hello again, Ars Technica listeners. This is the fourth and final installment of a four-part interview with neuroscientist, New York Times bestselling author, podcaster, and controversial public intellectual, Sam Harris. We’ll pick up with the uplifting theme we left off on yesterday. Which is to say, high tech weaponry that tomorrow’s nihilistic, suicidal mass murderers might just use to kill very large numbers of us. Before we get started though, a quick note of orientation. As those of you who listened to last week’s interview with UCSF neuroscientist Adam Gazzaley know, I originally thought this podcast series would be a limited set of just eight episodes connected to my latest science fiction novel, which is also called After On, and which came out last summer. But the podcast acquired a life of its own, and I’m about to publish episode #38 in the series of eight. As you’re about to find out, these first eight episodes have a distinctive format, in that each of them ends with a conversation between me at Tom Merritt - who you might may from CNET, from TechTV, then later from Leo Laporte’s network, and now from Tom’s own videocast, Daily Tech News Show.
    [Show full text]
  • Reply Comments to Comment 36
    Reply Comments to Comment 36. David B. Carroll 19 February 2003 1. Class of Work From Comment #361: Audiovisual works as follows: foreign-language audiovisual works not available for sale in the United States but available for purchase outside the US on DVDs that are regionally encoded to prevent playback on DVD players purchased in the United States. The exemption requested is to permit circumvention of the region coding mechanism. 2. Summary of Argument Additional factual information in support of Comment #36’s initial request for an exemption is submitted. The proposed class is compared against a similar class from Comment #352, which offers some advantages over this class. 3. Factual Support / Legal Arguments 3.1.Evidence of a need to circumvent DVD region coding for works in this class. The Library’s solicitation for comments makes it clear that a demonstration of actual or likely damage is a prerequisite for a successful exemption, rather than an argument based solely on hypothetical or legal grounds. I have collected additional examples of, and documentation for, real-world demand for DVD content unavailable in Region 1 (“R1”) format. 3.1.1. DVD features unavailable on VHS. In rejecting an exemption for circumvention of DVD access controls in 2000, the Library of Congress wrote3: 1 Carroll, David B. Comment #36. 18 Dec 2002. http://www.copyright.gov/1201/2003/comments/036.pdf. 2 Von Lohmann, Fred and Gwen Hinze, Electronic Frontier Foundation, and Gigi Sohn, Public Knowledge. Comment #35. Dec 2002. http://www.copyright.gov/1201/2003/comments/035.pdf. From the comments and testimony presented, it is clear that, at present, most works available in DVD format are also available in analog format (VHS tape) as well..
    [Show full text]
  • PANAHI-.Pdf (1.237Mb)
    © Copyright by Hesam Panahi, 2010 USER-GENERATED CONTENT AND REVOLUTIONS: TOWARDS A THEORIZATION OF WEB 2.0 A Dissertation Presented to The Faculty of the C.T. Bauer College of Business University of Houston In Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy By Hesam Panahi December, 2010 Introduction ............................................................................................................ 1 Dissertationʼs Research Objective ..................................................................... 2 Dissertationʼs Research Methodology ................................................................ 3 References ......................................................................................................... 5 Paper One: A Critical Study of Social Computing and Web 2.0: The Case of Digg ............................................................................................................................... 6 Introduction ........................................................................................................ 7 Theoretical Background ..................................................................................... 9 Critical Studies of IS ....................................................................................... 9 A Critical Framework for Studying Social Computing ................................... 10 Research Methods ........................................................................................... 15 Why an Interpretive Approach .....................................................................
    [Show full text]
  • Cisco Videoscape Voyager Vantage Client User Interface Guide
    User Guide Cisco Videoscape Voyager Vantage Client User Interface User Guide Table of Contents Introducing the Cisco Videoscape Voyager Vantage Client User Interface .................... 6 Welcome ....................................................................................................................6 About the AT8500 AllTouch IR Universal Remote Control .............................................. 7 Select TV and Viewing Preferences with the Menu ....................................................... 8 Confi gure System Preferences with the Settings Option ............................................... 9 Set the Video Appearance ......................................................................................... 9 Set the Audio Preferences ....................................................................................... 10 Set Favorite Channels ............................................................................................... 11 Hide Channels in the Channel List ............................................................................12 Hide Specifi c Channels .........................................................................................12 Show All/Hide All Options ..................................................................................... 12 Set Closed Captioning ................................................................................................. 13 Turn Closed Captioning On and Off ...................................................................... 13 Change
    [Show full text]
  • Welcome to Twit.Tv! If You've Stumbled Upon This Page and Are Wondering What It's All About, Read On
    Huh? Welcome to TWiT.tv! If you've stumbled upon this page and are wondering what it's all about, read on. The TWiT.tv Story It all started in 1998 with a small cable network called ZDTV, a channel dedicated to covering computers, the Internet, and personal technology. The people behind this site all worked on that network as hosts, reporters, or producers. In 2004, ZDTV, then called TechTV, was sold and dismantled. Former TechTV hosts, Leo Laporte, Patrick Norton, Kevin Rose, and John C. Dvorak, and producers Robert Heron, David Prager, and Roger Chang went on to other jobs, but we stayed in touch, with each other, and with fans of the late TechTV. Those fans told us again and again how important TechTV had been in their lives, and how much they missed the channel. We missed working with each other, too. On a rainy evening in January, 2005 a few of of us got together for dinner after spending the day covering MacWorld Expo in San Francisco. Leo, who was working as a radio host, happened to have a microphone and recorder. He turned it on and recorded 20 minutes of idle chatter about the Expo and the tech world in general. He posted that recording on his web site. Within a few days tens of thousands of people had downloaded the recording. TechTV fans began clamoring for more. A few months later,TWiT was born. We originally called the show The Revenge of The Screen Savers because that was the name of the defunct TV show many of us had worked on, but the cable channel that had bought TechTV complained, so we changed the name to this WEEK in TECH, or TWiT, for short.
    [Show full text]
  • Redacted - for Public Inspection
    REDACTED - FOR PUBLIC INSPECTION Page 18 REDACTED - FOR PUBLIC INSPECTION ----- - ------ - - --- - - - }} Page 19 REDACTED - FOR PUBLIC INSPECTION Table 10: Comcast Channel Positions for Top DMAs N.New Phila- San Washington Jersev Chicaao delohia Francisco Boston DC Atlanta Detroit Houston Seattle Lenfest Mass Washington Placement Union ety W Burbs DC-MD Detroit relative to (60'% of (34% of (70%01 (47% of (45% of CNBC subs) subs) subs) subs) subs) -10 MSNBC VERSUS TNT BRAVO LIFE A&E CMATL21 ESPN GOLF TRAVEL -9 LIFETIME GOVACC ESPN AMC A&E HISTORY TVG ESPN2 TNT HISTORY -8 FOOD OPEN ESPN2 TLC TLC DI Health LOCAL FSN DET FSN TLC -7 HGTV OPEN SPEED ANIMAL DISC DISC LOCAL SPEED FNC FAMILY -6 NICK BIG TEN VERSUS ABC FAM TRUTV AMIMAL CSPAN FX TCM NICK -5 SYFY OPEN CSNPHL NICK FNC TLC OPEN TNT LIFE DISNEY -4 TCM NICK GOLF CARTOON CNN DISNEY TWC AMC DISNEY CARTOON -3 DISC DISNEY FNC DISNEY HLN ABC FAM TLC A&E ANIMAL ANIMAL -2 ABC FAM CARTOON CNN CNN CSPAN CARTOON CNN E NICK CNN -1 TNT CNN HLN HLN CSPAN2 NICK HLN MSNBC E HLN Ch47 Ch58 Ch43 Ch58 Ch46 Ch60 Ch36 Ch 38 Ch45 Ch 46 CNBC CNBC CNBC CNBC CNBC CNBC CNBC CNBC CNBC CNBC +1 USA MSNBC MSNBC FNC TWC MSNBC FNC CNN BET MSNBC +2 COMEDY FNC DISC MSNBC ABC FAM CNN A&E HLN HGTV FNC +3 STYLE HLN TLC TWC ESPN HLN TBS TWC SPIKE TRUTV +4 OPEN OPEN HISTORY HISTORY ESPN2 TRUTV DISC ANIMAL VERSUS OXYGEN +5 OPEN HGTV ANIMAL COMEDY NESN LIFE TNT TRAVEL GALA LIFETIME I +6 MTV A&E OPEN EDUC CSNNE HGTV USA DISNEY TBS A&E +7 ANIMAL HISTORY FOOD TRUTV MSNBc OPEN FX NICK FOOD FX +8 TLC OXYGEN HGTV HALL RAI BRAVO VERSUS CARTOON KAZH TNT +9 BET OPEN OPEN HGTV SPIKE COMEDY CSS FAMILY WGN TBS +10 HISTORY OPEN TWC OPEN OPEN TCM ESPN USA KTBU BET Open Channels +/- 10 Yes Yes Yes Yes Yes Yes Yes No No No BTV Channel 103 128 103 128 246 103 207 178 235 128 FBN Channel 106J 106 NA 130 284 106 106 106 234 130 Data regarding channels located +/- len channel positions of CNBC and market share data lor Northern New Jersey were provided by James Cofer, Head of US Distribution, Bloomberg TV.
    [Show full text]