Friday, September 28, 2012
My Name is Joe Biden and I’ll Be Your Server
Folks, when I was six years old my dad came to me one night. My dad was a car guy. Hard worker, decent guy. Hadn’t had an easy life. He climbed the stairs to my room one night and he sat on the edge of my bed and he said to me, he said, “Champ, your mom worked hard on that dinner tonight. She worked hard on it. She literally worked on it for hours. And when you and your brothers told her you didn’t like it, you know what, Joey? That hurt her. It hurt.” And I felt (lowers voice to a husky whisper) ashamed. Because lemme tell you something. He was right. My dad was right. My mom worked hard on that dinner, and it was delicious. Almost as delicious as our Chicken Fontina Quesadilla with Garlicky Guacamole. That’s our special appetizer tonight. It’s the special. It’s the special. (His voice rising) And the chef worked hard on it, just like my mom, God love her, and if you believe in the chef’s values of hard work and creative spicing you should order it, although if you don’t like chicken we can substitute shrimp for a small upcharge.
Thank you. Thank you. Now, hold on. There’s something else you need to know.
Our fish special is halibut with a mango-avocado salsa and Yukon Gold potatoes, and it’s market-priced at sixteen-ninety-five. Sounds like a lot of money, right? Sounds like “Hey, Joe, that’s a piece of fish and a little topping there, and some potatoes.” “Bidaydas,” my great-grandmother from County Louth would have called ’em. You know what I’m talking about. Just simple, basic, sitting-around-the-kitchen-table-on-a-Tuesday-night food. Nothin’ fancy, right? But, folks, that’s not the whole story. If you believe that, you’re not . . . getting . . . the whole . . . story. Because lemme tell you about these Yukon Gold potatoes. These Yukon Gold potatoes are brushed with extra-virgin olive oil and hand-sprinkled with pink Himalayan sea salt, and then José, our prep guy. . . . Well. Lemme tell you about José. (He pauses, looks down, clears his throat.)
I get . . . I get emotional talking about José. This is a guy who—José gets here at ten in the morning. Every morning, rain or shine. Takes the bus here. Has to transfer twice. Literally gets off one bus and onto another. Twice. Never complains. Rain, snow, it’s hailin’ out there. . . . The guy literally does not complain. Never. Never heard it. José walks in, hangs his coat on a hook, big smile on his face, says hello to everybody—Sal the dishwasher, Angie the sous-chef, Frank, Donna, Pat. . . . And then do you know what he does? Do you know what José does? I’ll tell you what he does, and folks, folks, this is the point I want to make. With his own hands, he sprinkles fresh house-grown rosemary on those potatoes (raises voice to a thundering crescendo), and they are golden brown on the outside and soft on the inside and they are delicious! They are delicious! They are delicious!
by Bill Barol, New Yorker | Read more:
Illustration: Miguel GallardoGlass Works
The office of Wendell Weeks, Corning’s CEO, is on the second floor, looking out onto the Chemung River. It was here that Steve Jobs gave the 53-year-old Weeks a seemingly impossible task: Make millions of square feet of ultrathin, ultrastrong glass that didn’t yet exist. Oh, and do it in six months. The story of their collaboration—including Jobs’ attempt to lecture Weeks on the principles of glass and his insistence that such a feat could be accomplished—is well known. How Corning actually pulled it off is not.
Weeks joined Corning in 1983; before assuming the top post in 2005, he oversaw both the company’s television and specialty glass businesses. Talk to him about glass and he describes it as something exotic and beautiful—a material whose potential is just starting to be unlocked by scientists. He’ll gush about its inherent touchability and authenticity, only to segue into a lecture about radio-frequency transparency. “There’s a sort of fundamental truth in the design value of glass,” Weeks says, holding up a clear pebble of the stuff. “It’s like a found object; it’s cool to the touch; it’s smooth but has surface to it. What you’d really want is for this to come alive. That’d be a perfect product.”
Weeks and Jobs shared an appreciation for design. Both men obsessed over details. And both gravitated toward big challenges and ideas. But while Jobs was dictatorial in his management style, Weeks (like many of his predecessors at Corning) tends to encourage a degree of insubordination. “The separation between myself and any of the bench scientists is nonexistent,” he says. “We can work in these small teams in a very relaxed way that’s still hyperintense.”
Indeed, even though it’s a big company—29,000 employees and revenue of $7.9 billion in 2011—Corning still thinks and acts like a small one, something made easier by its relatively remote location, an annual attrition rate that hovers around 1 percent, and a vast institutional memory. (Stookey, now 97, and other legends still roam the halls and labs of Sullivan Park, Corning’s R&D facility.) “We’re all lifers here,” Weeks says, smiling. “We’ve known each other for a long time and succeeded and failed together a number of times.”
One of the first conversations between Weeks and Jobs actually had nothing to do with glass. Corning scientists were toying around with microprojection technologies—specifically, better ways of using synthetic green lasers. The thought was that people wouldn’t want to stare at tiny cell phone screens to watch movies and TV shows, and projection seemed like a natural solution. But when Weeks spoke to Jobs about it, Apple’s chief called the idea dumb. He did mention he was working on something better, though—a device whose entire surface was a display. It was called the iPhone.
by Brian Gardner, Wired | Read more:
Photo: Max Aguilera-HellwegMeet Mira, the Supercomputer That Makes Universes
The real challenge for cosmology is figuring out exactly what happened to those first nascent galaxies. Our telescopes don't let us watch them in time-lapse; we can't fast forward our images of the young universe. Instead, cosmologists must craft mathematical narratives that explain why some of those galaxies flew apart from one another, while others merged and fell into the enormous clusters and filaments that we see around us today. Even when cosmologists manage to cobble together a plausible such story, they find it difficult to check their work. If you can't see a galaxy at every stage of its evolution, how do you make sure your story about it matches up with reality? How do you follow a galaxy through nearly all of time? Thanks to the astonishing computational power of supercomputers, a solution to this problem is beginning to emerge: You build a new universe.
In October, the world's third fastest supercomputer, Mira, is scheduled to run the largest, most complex universe simulation ever attempted. The simulation will cram more than 12 billion years worth of cosmic evolution into just two weeks, tracking trillions of particles as they slowly coalesce into the web-like structure that defines our universe on a large scale. Cosmic simulations have been around for decades, but the technology needed to run a trillion-particle simulation only recently became available. Thanks to Moore's Law, that technology is getting better every year. If Moore's Law holds, the supercomputers of the late 2010s will be a thousand times more powerful than Mira and her peers. That means computational cosmologists will be able to run more simulations at faster speeds and higher resolutions. The virtual universes they create will become the testing ground for our most sophisticated ideas about the cosmos.
Salman Habib is a senior physicist at the Argonne National Laboratory and the leader of the research team working with Mira to create simulations of the universe. Last week, I talked to Habib about cosmology, supercomputing, and what Mira might tell us about the enormous cosmic web we find ourselves in.
Help me get a handle on how your project is going to work. As I understand it, you're going to create a computer simulation of the early universe just after the Big Bang, and in this simulation you will have trillions of virtual particles interacting with each other -- and with the laws of physics -- over a time period of more than 13 billion years. And once the simulation has run its course, you'll be looking to see if what comes out at the end resembles what we see with our telescopes. Is that right?
Habib: That's a good approximation of it. Our primary interest is large-scale structure formation throughout the universe and so we try to begin our simulations well after the Big Bang, and even well after the microwave background era. Let me explain why. We're not sure how to simulate the very beginning of the universe because the physics are very complicated and partially unknown, and even if we could, the early universe is structurally homogenous relative to the complexity that we see now, so you don't need a supercomputer to simulate it. Later on, at the time of the microwave background radiation, we have a much better idea about what's going on. WMAP andPlanck have given us a really clear picture of what the universe looked like at that time, but even then the universe is still very homogenous -- its density perturbations are something like one part in a hundred thousand. With that kind of homogeneity, you can still do the calculations and modeling without a supercomputer. But if you fast forward to the point where the universe is about a million times denser than it is now, that's when things get so complicated that you want to hand over the calculations to a supercomputer.
Now the trillions of particles we're talking about aren't supposed to be actual physical particles like protons or neutrons or whatever. Because these trillions of particles are meant to represent the entire universe, they are extremely massive, something in the range of a billion suns. We know the gravitational mechanics of how these particles interact, and so we evolve them forward to see what kind of densities and structure they produce, both as a result of gravity and the expansion of the universe. So, that's essentially what the simulation does: it takes an initial condition and moves it forward to the present to see if our ideas about structure formation in the universe are correct.
by Ross Andersen, The Atlantic | Read more:
Photo:Argonne National LaboratoryThursday, September 27, 2012
Yes, Texas is Different
At one point, the screens go black and we see projected in white letters:
TEXAS IS BIGGER THAN FRANCE AND ENGLAND
Black again. Then (you knew it was coming):
…COMBINED.
A bit later, another black screen/white letters sequence:
BEFORE TEXAS WAS A STATE…
(portentous pause)
TEXAS WAS A NATION
This, of course, is a reference to the Republic of Texas, as this spacious corner of the world styled itself from 1836 to 1846. In truth, the Republic of Texas was a transitional entity, the larval stage of the State of Texas. Nevertheless, “The Star of Destiny” has a point. Texas is different. It is big, for a start. Not as big as Alaska, which is bigger than France and England and Germany and Japan … combined, but big enough. And it was a nominally independent if ramshackle republic, with embassies and a Congress and everything. Vermont, Hawaii, and, arguably, California were once independent republics, too, but they don’t make a fetish of it. Texas does.
Texas is different. The qualities—the very existence—of the Bob Bullock Museum of Texas State History are evidence of that. Modesty is not the museum’s keynote. On the plaza out front is a huge sculpture of a five-pointed star. It must be twenty feet high. (“Mmm, subtle,” our ninth-grader murmured.) Inside, the exhibits are an uneasy combination of ethnic correctness and unrestrained boasting. One would think that Texas, besides being very, very great, has always been ruled by a kind of U.N. Security Council consisting of one white male, one white female, one black person, one American Indian, and one Mexican or Mexican-American, all of them exemplars of—the phrase is repeated ad nauseam—courage, determination, and hard work.
The stories the exhibits tell are mostly about the state’s economy, agricultural and industrial. Whether it’s oil extraction or cattle raising, rice farming or silicon chipmaking, quicksilver mining or sheepherding, the elements of each are usually the same. A few men become extraordinarily rich. These men are praised for their courage, determination, and hard work. The laborers whose labor produces their wealth are ruthlessly exploited. (The exhibits don’t put it this way, obviously, but the facts are there if you have eyes to see them.) These unfortunates may be poor white men; they may be Mexican immigrant women; they may be enslaved blacks or African-Americans held in sharecropper peonage. They, too, are praised for their courage, determination, and hard work. It all adds up to an unending progression of triumphs for the Texas spirit.
The boasting does not take long to taste a little sour. It begins to feel defensive and insecure. One begins to sense that the museum, on some level, knows that a lot of it is, well, bullockshit.
And yet, and yet. There are redeeming grace notes. The current temporary exhibit at the Bob Bullock Museum is one of them. It’s about Texas music: blues, rock, country, country rock, bluegrass, singer-songwriter, alt-whatever. In this exhibit, the boastfulness feels like simple accuracy and the nods to “diversity” are not a stretch. Respect is shown, properly, to Willie Nelson, Leadbelly, Stevie Ray Vaughan (whose battered Stratocaster occupies a place of honor), Janis Joplin, Big Mama Thornton, and many equally deserving others. And, as befits Austin, there’s live music. During our visit, a fine, fringed six-piece cowboy-country band played and sang a tribute to mid-century radio. All was forgiven.
Does the name Bob Bullock ring a bell? As lieutenant governor “under” George W. Bush (in Texas the post is independently elected and has powers that rival those of the governorship itself), Bob Bullock (1929-1999), a Democrat, was responsible for Dubya’s pre-Presidential reputation for bipartisanship and moderation. In his long career in state government, Bullock was, as far as I can tell, a net plus for Texas, even if his late-in-life Bush-enabling made him a net minus for the nation and the world. But you have to hand it to Texas. How many states would name their enormous marble-clad museum of state history not after a big donor but after a backroom career politician who, by the way, was also a five-times-married alcoholic?
by Hendrick Hertzberg, New Yorker | Read more:
Photo: Paul Morse
It's a Drone World
“A TV drone flies beside Canada’s Erick Guay during the second practice of the men’s Alpine skiing World Cup downhill race at the Lauberhorn in Wengen, January 12, 2012.” - Reuters (via)
[ed. I think when we look back on this decade the rise of drones (and robotics in general) will be viewed as one of the most significant developments affecting the future, on par with cloud computing and digital money as game changing technologies. Certainly the art of warfare has been altered forever. Eventually, everyone will have drones deployed for some purpose or another (countries, corporations, scientists, terrorist, etc. etc.). Want to spy on your ex-wife, pre-plan your next hiking trip, have your pizza delivered hot and fresh? There will be a drone business that can help you with that -- probably already is. In any case, near-surface airspace will soon get a lot more crowded (not to mention personal airspace, when hummingbird and insect drones are perfected.]
h/t New Inquiry
Are Hackers Heroes?
On the last day of June of this year, a tech website called Redmond Pie posted two articles in quick succession that, on their face, had nothing to do with each other. The first, with the headline “Root Nexus 7 on Android 4.1 Jelly Bean, Unlock Bootloader, And Flash ClockworkMod Recovery,” was a tutorial on how to modify the software—mainly in order to gain control of the operating system—in Google’s brand-new tablet computer, the Nexus 7, a device so fresh that it hadn’t yet shipped to consumers.
The second headline was slightly more decipherable to the casual reader: “NewOS X Tibet Malware Puts in an Appearance, Sends User’s Personal Information to a Remote Server.” That story, which referred to the discovery of a so-called “Trojan horse” computer virus on certain machines in Tibet, pointed out that Apple computers were no longer as impervious to malicious viruses and worms as they had been in the past and that this attack, which targeted Tibetan activists against the Chinese regime, was not random but political. When the Tibetan activists downloaded the infected file, it would secretly connect their computers to a server in China that could monitor their activities and capture the contents of their machines. (The Redmond Pie writer speculated that the reason Apple computers were targeted in this attack was that they were the preferred brand of the Dalai Lama.)
In fact, the Nexus 7 story and the Tibetan Trojan horse story were both about the same thing: hacking and hackers, although the hacking done by the Nexus 7 hackers—who contribute to an online website called Rootzwiki—was very different from that done by the crew homing in on the Tibetan activists. Hacking and hackers have become such inclusive, generic terms that their meaning, now, must almost always be derived from the context. Still, in the last few years, after the British phone-hacking scandal, after Anonymous and LulzSec, after Stuxnet, in which Americans and Israelis used a computer virus to break centrifuges and delay the Iranian nuclear project, after any number of identity thefts, that context has tended to accent the destructive side of hacking.
The second headline was slightly more decipherable to the casual reader: “NewOS X Tibet Malware Puts in an Appearance, Sends User’s Personal Information to a Remote Server.” That story, which referred to the discovery of a so-called “Trojan horse” computer virus on certain machines in Tibet, pointed out that Apple computers were no longer as impervious to malicious viruses and worms as they had been in the past and that this attack, which targeted Tibetan activists against the Chinese regime, was not random but political. When the Tibetan activists downloaded the infected file, it would secretly connect their computers to a server in China that could monitor their activities and capture the contents of their machines. (The Redmond Pie writer speculated that the reason Apple computers were targeted in this attack was that they were the preferred brand of the Dalai Lama.)
In fact, the Nexus 7 story and the Tibetan Trojan horse story were both about the same thing: hacking and hackers, although the hacking done by the Nexus 7 hackers—who contribute to an online website called Rootzwiki—was very different from that done by the crew homing in on the Tibetan activists. Hacking and hackers have become such inclusive, generic terms that their meaning, now, must almost always be derived from the context. Still, in the last few years, after the British phone-hacking scandal, after Anonymous and LulzSec, after Stuxnet, in which Americans and Israelis used a computer virus to break centrifuges and delay the Iranian nuclear project, after any number of identity thefts, that context has tended to accent the destructive side of hacking.
In February, when Facebook CEO Mark Zuckerberg observed in his letter to potential shareholders before taking the company public that Facebook embraced a philosophy called “The Hacker Way,” he was not being provocative but, rather, trying to tip the balance in the other direction. (He was also drawing on the words of the veteran technology reporter Steven Levy, whose 1984 book Hackers: Heroes of the Computer Revolution was the first serious attempt to understand the subculture that gave us Steve Jobs, Steve Wozniak, and Bill Gates.) According to Zuckerberg:
In reality, hacking just means building something quickly or testing the boundaries of what can be done. Like most things, it can be used for good or bad, but the vast majority of hackers I’ve met tend to be idealistic people who want to have a positive impact on the world…. Hackers believe that something can always be better, and that nothing is ever complete. They just have to go fix it—often in the face of people who say it’s impossible or are content with the status quo.Though it might seem neutral, the word “fix” turns out to be open to interpretation. Was the new Google Nexus 7 tablet broken before it was boxed up and shipped? Not to Google or to the vast majority of people who ordered it, but yes to those who saw its specifications and noticed, for instance, that it had a relatively small amount of built-in memory, and wanted to enable the machine to accept an external storage device that could greatly expand its memory. Similarly, there was nothing wrong with the original iPhone—it worked just fine. But for users hoping to load software that was not authored or vetted by Apple, and those who didn’t want to be restricted to a particular service provider (AT&T), and those who liked to tinker and considered it their right as owners to do so, the various “jailbreaks”—or ways of circumventing such restrictions—provided by hackers have addressed and, in Zuckerberg’s term, “fixed” these issues.1
Apple, on the other hand, did not see it this way and argued to the United States Copyright Office that modifying an iPhone’s operating system constituted copyright infringement and thus was illegal. In a ruling in 2010, the Copyright Office disagreed, stating that there was “no basis for copyright law to assist Apple in protecting its restrictive business model.” Copyright laws vary country to country, though, and already this year three people in Japan have been arrested under that country’s recently updated Unfair Competition Prevention Act for modifying—i.e., hacking—Nintendo game consoles. As for the Nexus 7 hackers, they need not worry: Google’s Android software is “open source,” meaning that it is released to the public, which is free to fiddle with it, to an extent.
The salient point of Mark Zuckerberg’s paean to hackers, and the reason he took the opportunity to inform potential shareholders, is that hacking can, and often does, improve products. It exposes vulnerabilities, supplies innovations, and demonstrates both what is possible and what consumers want. Still, as Zuckerberg also intimated, hacking has a dark side, one that has eclipsed its playful, sporty, creative side, especially in the popular imagination, and with good reason. Hacking has become the preferred tool for a certain kind of thief, one who lifts money from electronic bank accounts and sells personal information, particularly as it relates to credit cards and passwords, in a thriving international Internet underground. Hacking has also become a method used for extortion, public humiliation, business disruption, intellectual property theft, espionage, and, possibly, war.
by Sue Halpern, NY Review of Books | Read more:
Photo: Paul Grover/Rex Features/AP ImagesProportion Control
No other number attracts such a fevered following as the golden ratio. Approximately equal to 1.618 and denoted by the Greek letter phi, it’s been canonized as the “Divine Proportion.” Its devotees will tell you it’s ubiquitous in nature, art and architecture. And there are plastic surgeons and financial mavens who will tell you it’s the secret to pretty faces and handsome returns.

Not bad for the second-most famous irrational number. In your face, pi!
It even made a cameo appearance in “The Da Vinci Code.” While trying to decipher the clues left at the murder scene in the Louvre that opens the novel, the hero, Robert Langdon, “felt himself suddenly reeling back to Harvard, standing in front of his ‘Symbolism in Art’ class, writing his favorite number on the chalkboard. 1.618.”
Langdon tells his class that, among other astonishing things, da Vinci “was the first to show that the human body is literally made of building blocks whose proportional ratios always equal phi.”
The golden ratio originated in the ideal world of geometry. The Pythagoreans discovered it in their studies of regular pentagons, pentagrams and other geometric figures. A few hundred years later, Euclid gave the first written description of the golden ratio in connection with the problem of dividing a line segment into two unequal parts, such that the whole is to the long part as the long is to the short.

Not bad for the second-most famous irrational number. In your face, pi!
It even made a cameo appearance in “The Da Vinci Code.” While trying to decipher the clues left at the murder scene in the Louvre that opens the novel, the hero, Robert Langdon, “felt himself suddenly reeling back to Harvard, standing in front of his ‘Symbolism in Art’ class, writing his favorite number on the chalkboard. 1.618.”
Langdon tells his class that, among other astonishing things, da Vinci “was the first to show that the human body is literally made of building blocks whose proportional ratios always equal phi.”
“Don’t believe me?” Langdon challenged. “Next time you’re in the shower, take a tape measure.”
A couple of football players snickered.
“Not just you insecure jocks,” Langdon prompted. “All of you. Guys and girls. Try it. Measure the distance from the tip of your head to the floor. Then divide that by the distance from your belly button to the floor. Guess what number you get.”
“Not phi!” one of the jocks blurted out in disbelief.
“Yes, phi,” Langdon replied. “One-point-six-one-eight. [...] My friends, each of you is a walking tribute to the Divine Proportion.”I tried it. I’m 6-foot-1, and my belly button is 44 inches from the floor. So my ratio is 73 inches divided by 44 inches, which is about 1.66. That’s about 2.5 percent bigger than 1.618. But then again, nobody ever mistook me for Apollo.
The golden ratio originated in the ideal world of geometry. The Pythagoreans discovered it in their studies of regular pentagons, pentagrams and other geometric figures. A few hundred years later, Euclid gave the first written description of the golden ratio in connection with the problem of dividing a line segment into two unequal parts, such that the whole is to the long part as the long is to the short.
Wednesday, September 26, 2012
Apple’s Scorched-Earth IPhone Fight With Google
In the article “Easter Island’s End,” Jared Diamond described the steps that led to the deforestation of a subtropical, fertile paradise.
Over a few hundred years, inhabitants used the gigantic palm trees around them as rolling surfaces on which to haul stones; they then used more trees to lever the stones into place on platforms. Competing chieftains built larger statues on larger platforms. Eventually, the last tree was gone and the island was covered only in grasses and shrubs, leading to starvation and even cannibalism. Diamond explains that there was no signal crisis:
“Gradually trees became fewer, smaller, and less important. By the time the last fruit-bearing adult palm tree was cut, palms had long since ceased to be of economic significance. That left only smaller and smaller palm saplings to clear each year, along with other bushes and treelets. No one would have noticed the felling of the last small palm.”
The Easter Islanders’ incremental march toward disaster is an apt analogy for Apple Inc. (AAPL)’s decision to keep Google Maps off the newly released iPhone 5, the latest of a series of steps toward control by powerful actors over users’ online behavior. The question is whether the pattern is clear enough for regulatory authorities to take action. (...)
Users of the iPhone whose maps application was swapped out when they upgraded to Apple’s iOS 6 platform have had a glimpse of what the carriers’ power could entail: Just as Apple chose to remove its reliable maps app that used Google (GOOG)’s data when the two companies’ business relationship became complicated, the cable companies can make services such as Netflix subject to data caps while exempting their own online video offerings. Users may be irritated, of course, but there’s nothing they can do about it.
Anil Dash, the co-founder of the media and technology consulting firm Activate.com, said last week that the move against Google Maps was the first time Apple had put “boxing out competitors” ahead of serving the interests of iPhone users. Similarly, a vertically integrated, market-dominating carrier such as Comcast could now employ its usage caps (which wouldn’t necessarily apply to its own or affiliated services) to effectively squeeze out competitors providing information, entertainment or connections that Comcast didn’t want to support.
Over a few hundred years, inhabitants used the gigantic palm trees around them as rolling surfaces on which to haul stones; they then used more trees to lever the stones into place on platforms. Competing chieftains built larger statues on larger platforms. Eventually, the last tree was gone and the island was covered only in grasses and shrubs, leading to starvation and even cannibalism. Diamond explains that there was no signal crisis:
“Gradually trees became fewer, smaller, and less important. By the time the last fruit-bearing adult palm tree was cut, palms had long since ceased to be of economic significance. That left only smaller and smaller palm saplings to clear each year, along with other bushes and treelets. No one would have noticed the felling of the last small palm.”
The Easter Islanders’ incremental march toward disaster is an apt analogy for Apple Inc. (AAPL)’s decision to keep Google Maps off the newly released iPhone 5, the latest of a series of steps toward control by powerful actors over users’ online behavior. The question is whether the pattern is clear enough for regulatory authorities to take action. (...)
Users of the iPhone whose maps application was swapped out when they upgraded to Apple’s iOS 6 platform have had a glimpse of what the carriers’ power could entail: Just as Apple chose to remove its reliable maps app that used Google (GOOG)’s data when the two companies’ business relationship became complicated, the cable companies can make services such as Netflix subject to data caps while exempting their own online video offerings. Users may be irritated, of course, but there’s nothing they can do about it.
Anil Dash, the co-founder of the media and technology consulting firm Activate.com, said last week that the move against Google Maps was the first time Apple had put “boxing out competitors” ahead of serving the interests of iPhone users. Similarly, a vertically integrated, market-dominating carrier such as Comcast could now employ its usage caps (which wouldn’t necessarily apply to its own or affiliated services) to effectively squeeze out competitors providing information, entertainment or connections that Comcast didn’t want to support.
Subscribe to:
Comments (Atom)

















