Celtics PG Rondo tore right ACL; surgery expected


BOSTON (AP) — Boston Celtics star point guard Rajon Rondo has torn his anterior cruciate ligament.


The injury usually takes up to a year for recovery, and he is expected to have surgery on his right knee.


The Celtics had lost six straight games heading into the Sunday afternoon meeting with the Miami Heat. Rondo reported to the arena for a pregame shootaround but was taken to a hospital after complaining of knee pain.


Rondo was voted by fans to be a starter in the Feb. 17 All-Star game in Houston.


He was averaging 13.7 points and 11.1 assists.


Read More..

Brain Aging Linked to Sleep-Related Memory Decline


For decades scientists have known that the ability to remember newly learned information declines with age, but it was not clear why. A new study may provide part of the answer.


The report, posted online on Sunday by the journal Nature Neuroscience, suggests that structural brain changes occurring naturally over time interfere with sleep quality, which in turn blunts the ability to store memories for the long term.


Previous research had found that the prefrontal cortex, the brain region behind the forehead, tends to lose volume with age, and that part of this region helps sustain quality sleep, which is critical to consolidating new memories. But the new experiment, led by scientists at the University of California, Berkeley, is the first to link structural changes directly with sleep-related memory problems.


The findings suggest that one way to slow memory decline in aging adults is to improve sleep, specifically the so-called slow-wave phase, which constitutes about a quarter of a normal night’s slumber.


Doctors cannot reverse structural changes that occur with age any more than they can turn back time. But at least two groups are experimenting with electrical stimulation as a way to improve deep sleep in older people. By placing electrodes on the scalp, scientists can run a low current across the prefrontal area, essentially mimicking the shape of clean, high-quality slow waves.


The result: improved memory, at least in some studies. “There are also a number of other ways you can improve sleep, including exercise,” said Ken Paller, a professor of psychology and director of the cognitive neuroscience program at Northwestern, who was not involved in the research.


Dr. Paller said that a whole array of changes occurred across the brain during aging and that sleep was only one factor affecting memory function.


But Dr. Paller said that the study told “a convincing story, I think: that atrophy is related to slow-wave sleep, which we know is related to memory performance. So it’s a contributing factor.”


In the study, a research team in California took brain images from 19 people of retirement age and 18 in their early 20s. It found that a brain area called the medial prefrontal cortex, roughly behind the middle of the forehead, was about a third smaller on average in the older group than in the younger one — a difference due to natural atrophy over time, previous research suggests.


Before bedtime, the team had the two groups study a long list of words paired with nonsense syllables, like “action-siblis” and “arm-reconver.” The team used such nonwords because one type of memory that declines with age is for new, previously unseen information.


After training on the pairs for half an hour or so, the participants took a test on some of them. The young group outscored the older group by about 25 percent.


Then everyone went to bed — and bigger differences emerged. For one, the older group got only about a quarter of the amount of high-quality slow-wave sleep that the younger group did, as measured by the shape and consistency of electrical waves on an electroencephalogram machine, or EEG. It is thought that the brain moves memories from temporary to longer-term storage during this deep sleep.


On a second test, given in the morning, the younger group outscored the older group by about 55 percent. The estimated amount of atrophy in each person roughly predicted the difference between his or her morning and evening scores, the study found. Even seniors who were very sharp at night showed declines after sleeping.


“The analysis showed that the differences were due not to changes in capacity for memories, but to differences in sleep quality,” said Bryce A. Mander, a postdoctoral fellow at Berkeley, and the lead author of the study. His co-authors included researchers from the California Pacific Medical Center in San Francisco; the University of California, San Diego; and the Lawrence Berkeley National Laboratory.


The findings do not imply that medial prefrontal atrophy is the only age-related change causing memory problems, said Matthew P. Walker, a professor of psychology and neuroscience at Berkeley, and a co-author of the study.


“But these things are interrelated,” Dr. Walker said. “Essentially, with time, the less and less tissue you have in this prefrontal area, the less and less quality deep wave sleep you get, the less and less you remember of content that you just learned.”


Read More..

Unboxed: Literary History, Seen Through Big Data’s Lens





ANY list of the leading novelists of the 19th century, writing in English, would almost surely include Charles Dickens, Thomas Hardy, Herman Melville, Nathaniel Hawthorne and Mark Twain.




But they do not appear at the top of a list of the most influential writers of their time. Instead, a recent study has found, Jane Austen, author of “Pride and Prejudice, “ and Sir Walter Scott, the creator of “Ivanhoe,” had the greatest effect on other authors, in terms of writing style and themes.


These two were “the literary equivalent of Homo erectus, or, if you prefer, Adam and Eve,” Matthew L. Jockers wrote in research published last year. He based his conclusion on an analysis of 3,592 works published from 1780 to 1900. It was a lot of digging, and a computer did it.


The study, which involved statistical parsing and aggregation of thousands of novels, made other striking observations. For example, Austen’s works cluster tightly together in style and theme, while those of George Eliot (a k a Mary Ann Evans) range more broadly, and more closely resemble the patterns of male writers. Using similar criteria, Harriet Beecher Stowe was 20 years ahead of her time, said Mr. Jockers, whose research will soon be published in a book, “Macroanalysis: Digital Methods and Literary History” (University of Illinois Press).


These findings are hardly the last word. At this stage, this kind of digital analysis is mostly an intriguing sign that Big Data technology is steadily pushing beyond the Internet industry and scientific research into seemingly foreign fields like the social sciences and the humanities. The new tools of discovery provide a fresh look at culture, much as the microscope gave us a closer look at the subtleties of life and the telescope opened the way to faraway galaxies.


“Traditionally, literary history was done by studying a relative handful of texts,” says Mr. Jockers, an assistant professor of English and a researcher at the Center for Digital Research in the Humanities at the University of Nebraska. “What this technology does is let you see the big picture — the context in which a writer worked — on a scale we’ve never seen before.”


Mr. Jockers, 46, personifies the digital advance in the humanities. He received a Ph.D. in English literature from Southern Illinois University, but was also fascinated by computing and became a self-taught programmer. Before he moved to the University of Nebraska last year, he spent more than a decade at Stanford, where he was a founder of the Stanford Literary Lab, which is dedicated to the digital exploration of books.


Today, Mr. Jockers describes the tools of his trade in terms familiar to an Internet software engineer — algorithms that use machine learning and network analysis techniques. His mathematical models are tailored to identify word patterns and thematic elements in written text. The number and strength of links among novels determine influence, much the way Google ranks Web sites.


It is this ability to collect, measure and analyze data for meaningful insights that is the promise of Big Data technology. In the humanities and social sciences, the flood of new data comes from many sources including books scanned into digital form, Web sites, blog posts and social network communications.


Data-centric specialties are growing fast, giving rise to a new vocabulary. In political science, this quantitative analysis is called political methodology. In history, there is cliometrics, which applies econometrics to history. In literature, stylometry is the study of an author’s writing style, and these days it leans heavily on computing and statistical analysis. Culturomics is the umbrella term used to describe rigorous quantitative inquiries in the social sciences and humanities.


“Some call it computer science and some call it statistics, but the essence is that these algorithmic methods are increasingly part of every discipline now,” says Gary King, director of the Institute for Quantitative Social Science at Harvard.


Cultural data analysts often adapt biological analogies to describe their work. Mr. Jockers, for example, called his research presentation “Computing and Visualizing the 19th-Century Literary Genome.”


Such biological metaphors seem apt, because much of the research is a quantitative examination of words. Just as genes are the fundamental building blocks of biology, words are the raw material of ideas.


“What is critical and distinctive to human evolution is ideas, and how they evolve,” says Jean-Baptiste Michel, a postdoctoral fellow at Harvard.


Mr. Michel and another researcher, Erez Lieberman Aiden, led a project to mine the virtual book depository known as Google Books and to track the use of words over time, compare related words and even graph them.


Google cooperated and built the software for making graphs open to the public. The initial version of Google’s cultural exploration site began at the end of 2010, based on more than five million books, dating from 1500. By now, Google has scanned 20 million books, and the site is used 50 times a minute. For example, type in “women” in comparison to “men,” and you see that for centuries the number of references to men dwarfed those for women. The crossover came in 1985, with women ahead ever since.


In work published in Science magazine in 2011, Mr. Michel and the research team tapped the Google Books data to find how quickly the past fades from books. For instance, references to “1880,” which peaked in that year, fell to half by 1912, a lag of 32 years. By contrast, “1973” declined to half its peak by 1983, only 10 years later. “We are forgetting our past faster with each passing year,” the authors wrote.


JON KLEINBERG, a computer scientist at Cornell, and a group of researchers approached collective memory from a very different perspective.


This article has been revised to reflect the following correction:

Correction: January 27, 2013

An earlier version of this article misstated Matthew L. Jockers’s age. He is 46, not 48. 



Read More..

Riots Grip Egyptian City After Soccer Verdict


\n\n\n';
}
s += '\n\n\n';
}
document.write(s);
return;
}
google_ad_client = 'ca-nytimes_display_html';
google_ad_channel = 'test_22';
google_ad_output = 'js';
google_max_num_ads = '3';
google_ad_type = 'image,flash,html';
google_image_size = '336x280';
google_safe = 'high';
google_targeting = 'site_content';
if (window.nyt_google_contents) { google_contents = nyt_google_contents; }
else if (window.nyt_google_hints) { google_hints = nyt_google_hints; }
// -->

Read More..

Hackers claim attack on Justice Department website






WASHINGTON (Reuters) – Hackers sympathetic to the late computer prodigy Aaron Swartz claimed on Saturday to have infiltrated the website of the U.S. Justice Department’s Sentencing Commission, and said they planned to release government data.


The Sentencing Commission site, www.ussc.gov , was shut down early Saturday.






Identifying themselves as Anonymous, a loosely organized group of unknown provenance associated with a range of recent online actions, the hackers voiced outrage over Swartz’ suicide on January 11.


In a video posted online, the hackers criticized the government’s prosecution of Swartz, who had been facing trial on charges that he used the Massachusetts Institute of Technology‘s computer networks to steal more than 4 million articles from JSTOR, an online archive and journal distribution service.


Swartz had faced a maximum sentence of 31 years in prison and fines of up to $ 1 million.


The FBI is investigating the attack, according to Richard McFeely, of the bureau’s Criminal, Cyber, Response, and Services Branch.


“We were aware as soon as it happened and are handling it as a criminal investigation,” McFeely said in an emailed statement. “We are always concerned when someone illegally accesses another person’s or government agency’s network.”


(Reporting by Deborah Zabarenko; Editing by Vicki Allen)


Tech News Headlines – Yahoo! News





Title Post: Hackers claim attack on Justice Department website
Url Post: http://www.news.fluser.com/hackers-claim-attack-on-justice-department-website/
Link To Post : Hackers claim attack on Justice Department website
Rating:
100%

based on 99998 ratings.
5 user reviews.
Author: Fluser SeoLink
Thanks for visiting the blog, If any criticism and suggestions please leave a comment




Read More..

Stan Musial remembered during funeral Mass


ST. LOUIS (AP) — Stan Musial was remembered as a Hall of Famer on and off the field during a 2-hour funeral Mass.


Broadcaster Bob Costas, his voice cracking at times, pointed out during Saturday's lengthy tribute that in 92 years of life, Musial never let anyone down.


Among those in attendance were baseball Commissioner Bud Selig, former St. Louis standout Albert Pujols and Hall of Famers Bob Gibson, Lou Brock, Bruce Sutter and Red Schoendienst.


The 90-year-old Schoendienst once roomed with Musial.


Read More..

Religious Groups and Employers Battle Contraception Mandate


Shawn Thew/European Pressphoto Agency


President Obama, with his health secretary, Kathleen Sebelius, offering a compromise on the contraception mandate last year.







In a flood of lawsuits, Roman Catholics, evangelicals and Mennonites are challenging a provision in the new health care law that requires employers to cover birth control in employee health plans — a high-stakes clash between religious freedom and health care access that appears headed to the Supreme Court.




In recent months, federal courts have seen dozens of lawsuits brought not only by religious institutions like Catholic dioceses but also by private employers ranging from a pizza mogul to produce transporters who say the government is forcing them to violate core tenets of their faith. Some have been turned away by judges convinced that access to contraception is a vital health need and a compelling state interest. Others have been told that their beliefs appear to outweigh any state interest and that they may hold off complying with the law until their cases have been judged. New suits are filed nearly weekly.


“This is highly likely to end up at the Supreme Court,” said Douglas Laycock, a law professor at the University of Virginia and one of the country’s top scholars on church-state conflicts. “There are so many cases, and we are already getting strong disagreements among the circuit courts.”


President Obama’s health care law, known as the Affordable Care Act, was the most fought-over piece of legislation in his first term and was the focus of a highly contentious Supreme Court decision last year that found it to be constitutional.


But a provision requiring the full coverage of contraception remains a matter of fierce controversy. The law says that companies must fully cover all “contraceptive methods and sterilization procedures” approved by the Food and Drug Administration, including “morning-after pills” and intrauterine devices whose effects some contend are akin to abortion.


As applied by the Health and Human Services Department, the law offers an exemption for “religious employers,” meaning those who meet a four-part test: that their purpose is to inculcate religious values, that they primarily employ and serve people who share their religious tenets, and that they are nonprofit groups under federal tax law.


But many institutions, including religious schools and colleges, do not meet those criteria because they employ and teach members of other religions and have a broader purpose than inculcating religious values.


“We represent a Catholic college founded by Benedictine monks,” said Kyle Duncan, general counsel of the Becket Fund for Religious Liberty, which has brought a number of the cases to court. “They don’t qualify as a house of worship and don’t turn away people in hiring or as students because they are not Catholic.”


In that case, involving Belmont Abbey College in North Carolina, a federal appeals court panel in Washington told the college last month that it could hold off on complying with the law while the federal government works on a promised exemption for religiously-affiliated institutions. The court told the government that it wanted an update by mid-February.


Defenders of the provision say employers may not be permitted to impose their views on employees, especially when something so central as health care is concerned.


“Ninety-nine percent of women use contraceptives at some time in their lives,” said Judy Waxman, a vice president of the National Women’s Law Center, which filed a brief supporting the government in one of the cases. “There is a strong and legitimate government interest because it affects the health of women and babies.”


She added, referring to the Centers for Disease Control and Prevention, “Contraception was declared by the C.D.C. to be one of the 10 greatest public health achievements of the 20th century.”


Officials at the Justice Department and the Health and Human Services Department declined to comment, saying the cases were pending.


A compromise for religious institutions may be worked out. The government hopes that by placing the burden on insurance companies rather than on the organizations, the objections will be overcome. Even more challenging cases involve private companies run by people who reject all or many forms of contraception.


The Alliance Defending Freedom — like Becket, a conservative group — has brought a case on behalf of Hercules Industries, a company in Denver that makes sheet metal products. It was granted an injunction by a judge in Colorado who said the religious values of the family owners were infringed by the law.


“Two-thirds of the cases have had injunctions against Obamacare, and most are headed to courts of appeals,” said Matt Bowman, senior legal counsel for the alliance. “It is clear that a substantial number of these cases will vindicate religious freedom over Obamacare. But it seems likely that the Supreme Court will ultimately resolve the dispute.”


The timing of these cases remains in flux. Half a dozen will probably be argued by this summer, perhaps in time for inclusion on the Supreme Court’s docket next term. So far, two- and three-judge panels on four federal appeals courts have weighed in, granting some injunctions while denying others.


One of the biggest cases involves Hobby Lobby, which started as a picture framing shop in an Oklahoma City garage with $600 and is now one of the country’s largest arts and crafts retailers, with more than 500 stores in 41 states.


David Green, the company’s founder, is an evangelical Christian who says he runs his company on biblical principles, including closing on Sunday so employees can be with their families, paying nearly double the minimum wage and providing employees with comprehensive health insurance.


Mr. Green does not object to covering contraception but considers morning-after pills to be abortion-inducing and therefore wrong.


“Our family is now being forced to choose between following the laws of the land that we love or maintaining the religious beliefs that have made our business successful and have supported our family and thousands of our employees and their families,” Mr. Green said in a statement. “We simply cannot abandon our religious beliefs to comply with this mandate.”


The United States Court of Appeals for the 10th Circuit last month turned down his family’s request for a preliminary injunction, but the company has found a legal way to delay compliance for some months.


Read More..

Diner’s Journal Blog: PepsiCo Will Halt Use of Additive in Gatorade

PepsiCo announced on Friday that it would no longer use an ingredient in Gatorade after consumers complained.

The ingredient, brominated vegetable oil, which was used in citrus versions of the sports drink to prevent the flavorings from separating, was the object of a petition started on Change.org by Sarah Kavanagh, a 15-year-old from Hattiesburg, Miss., who became concerned about the ingredient after reading about it online. Studies have suggested there are possible side effects, including neurological disorders and altered thyroid hormones.

The petition attracted more than 200,000 signatures, and this week, Ms. Kavanagh was in New York City to tape a segment for “The Dr. Oz Show.” She visited The New York Times on Wednesday and while there said, “I just don’t understand why they can’t use something else instead of B.V.O.”

“I was in algebra class and one of my friends kicked me and said, ‘Have you seen this on Twitter?’ ” Ms. Kavanagh said in a phone interview on Friday evening. “I asked the teacher if I could slip out to the bathroom, and I called my mom and said, ‘Mom, we won.’ ”

Molly Carter, a spokeswoman for Gatorade, said the company had been testing alternatives to the chemical for roughly a year “due to customer feedback.” She said Gatorade initially was not going to make an announcement, “since we don’t find a health and safety risk with B.V.O.”

Because of the petition, though, Ms. Carter said the company had changed its mind, and an unidentified executive there gave Beverage Digest, a trade publication, the news for its Jan. 25 issue.

Previously, a spokesman for PepsiCo had said in an e-mail, “We appreciate Sarah as a fan of Gatorade, and her concern has been heard.”

Brominated vegetable oil will be replaced by sucrose acetate isobutyrate, an emulsifier that is “generally recognized as safe” as a food additive by the Food and Drug Administration. The new ingredient will be added to orange, citrus cooler and lemonade Gatorade, as well Gatorade X-Factor orange, Gatorade Xtremo citrus cooler and a powdered form of the drink called “glacier freeze.”

Ms. Carter said consumers would start seeing the new ingredient over the next few months as existing supplies of Gatorade sell out and are replaced.

Health advocates applauded the company’s move. “Kudos to PepsiCo for doing the responsible thing on its own and not waiting for the F.D.A. to force it to,” said Michael Jacobson, executive director of the Center for Science in the Public Interest.

Mr. Jacobson has championed the removal of brominated vegetable oil from foods and beverages for the last several decades, but the F.D.A. has left it in a sort of limbo, citing budgetary constraints that it says keep it from going through the process needed to formally ban the chemical or declare it safe once and for all.

Brominated vegetable oil is banned as a food ingredient in Japan and the European Union. About 10 percent of drinks sold in the United States contain it, including Mountain Dew, which is also made by PepsiCo; some flavors of Powerade and Fresca from Coca-Cola; and Squirt and Sunkist Peach Soda, made by the Dr Pepper Snapple Group.

PepsiCo said it had no plans to remove the ingredient from Mountain Dew and Diet Mountain Dew, both of which generate more than $1 billion in annual sales.

Heather White, executive director at the Environmental Working Group, said of PepsiCo’s decision, “We can only hope that other companies will follow suit.” She added, “We need to overhaul how F.D.A. keeps up with the latest science on food additives to better protect public health.”

Ms. Kavanagh agreed. “I’ve been thinking about ways to take this to the next level, and I’m thinking about taking it to the F.D.A. and asking them why they aren’t doing something about it,” she said. “I’m not sure yet, but I think that’s where I’d like to go with this.”


This post has been revised to reflect the following correction:

Correction: January 26, 2013

An earlier version of this article misspelled the surname of the 15-year-old who started a petition on Change.org to end the use of brominated vegetable oil in Gatorade. She is Sarah Kavanagh, not Kavanaugh.

A version of this article appeared in print on 01/26/2013, on page B1 of the NewYork edition with the headline: PepsiCo Will Halt Additive Use In Gatorade.
Read More..

Chinese Officials Fired Over Chongqing Sex Scandal





BEIJING — The young women met the officials for illicit trysts with video cameras hidden in their purses. Every detail of the encounters was recorded. Then a group of men confronted the officials with the video recordings and made demands.




China’s state news media reported on Friday details of a sex extortion ring that brazenly operated “honey traps” in the southwest metropolis of Chongqing for several years. The widening scandal, which first emerged late last year, has led to the dismissals of at least 11 officials of the Communist Party, government or state-owned companies for having sex with women in the ring and then being blackmailed by the men who had set up the snares.


Xi Jinping, China’s new top leader, has vowed to root out official corruption and said this week that “flies,” or relatively low-level bureaucrats, as well as top officials he referred to as “tigers,” must be brought down.


The most famous victim of the sex ring scandal has been Lei Zhengfu, a middle-aged district party chief who was secretly filmed having sex in a hotel room in 2008 with a young woman. In late November, the leaked video of Mr. Lei began circulating on the Internet and he became the poster boy for a series of low-level or midlevel officials who have been brought down by scandals, often sexual in nature, across the nation. Mr. Lei was removed from his job and placed under investigation soon after the video appeared online. Now, according to Xinhua, the state news agency, 10 other officials have been removed as well for falling prey to the sex ring. Five of them were executives in state-owned companies.


The sex scandal might have come out earlier but Bo Xilai, the Chongqing party chief at the time, and Wang Lijun, his police chief, buried the results of an investigation into the ring. Mr. Bo and Mr. Wang were both felled last year by the fallout from the murder of a British business executive arranged by Mr. Bo’s wife; Mr. Bo is expected to be tried soon on a wide range of criminal charges. While the two scandals are unrelated, the airing of the blackmail ring at this time could reflect a decision by the Chinese leadership to highlight other problems in Chongqing under Mr. Bo’s rule.


The ring’s mastermind was a man named Xiao Ye, according to a report by Southern Metropolis Daily on Wednesday that was cited by Xinhua in its Friday article. Three women were used as bait. The state media reports did not say exactly what the officials gave the men in return for keeping their involvement secret, but one report said that a company run by Mr. Xiao was involved in a real estate development project in the district governed by Mr. Lei.


Mr. Xiao gave the women a list of Chongqing officials whom the women were to contact, Xinhua reported. The women sent text messages to the officials. They would tell the officials they worked for a local real estate company and had met the official at a banquet.


“Hope we can stay in touch a lot,” they wrote. If the officials said they had no memory of the meeting, the women would invoke the name of a chief executive and pretend to be angry that the official had forgotten the woman already. If the official bit, the woman would continue flirting by text or transmit seductive photos of themselves, Xinhua said.


A woman would then meet with the official in an upscale hotel to have tea, coffee or a snack. The official would hand her gifts, such as jewelry. Eventually, when the two were ready to have sex, the woman would make sure to show up at the hotel room with a hidden camera. The official would rarely stay the entire night, but the video caught all the action.


This happened over and over until the video was clear enough, Xinhua reported. Then at a later tryst, several men in the ring would show up while the official and the woman were in the middle of having sex. One of the men would pretend to be the woman’s boyfriend and throw a fit. Behind him would be another man pretending to be a private detective. A third man would then show up and say he was a member of a gang.


They would beat up the official and show him the video. Mr. Xiao entered the scene afterward to work out an agreement with the official and assure him that the video would remain buried, as long as the demands were met.


Of the victims, Mr. Lei was the one who tried to fight back most vigorously, one report said. He assumed the video would eventually come out, and so he went to senior Chongqing officials to explain his plight. Wang Lijun, who was then the police chief of Chongqing, took charge of the case. By 2009, the investigation was done and Mr. Wang and Mr. Bo had the results. But they decided to quash the case or ignored it, and the officials who were found to have been victims of the ring were eventually promoted.


The Xinhua article on Friday said people have been especially surprised that one district party chief in particular, Peng Zhiyong, who holds a doctorate, fell victim to the honey trap.


“He was spoken highly of by the people and enjoyed a reputation for being talented, smart, eloquent and outstanding in all ways,” Xinhua said. In addition, the report said, he “was widely regarded as having enormous political potential.”


Amy Qin contributed research.



Read More..

Everything You Need to Know About Kim Dotcom’s Mega






Click here to view the gallery: Hands On With Mega


Mega — the long-anticipated file sharing and cloud storage site from Kim Dotcom — is now open to the public.






[More from Mashable: Google Glasses Spotted and Two Other Stories You Need to Know]


Thanks to its association with the now-defunct Megaupload — and the legal issues facing its founder Kim Dotcom — the amount of press, user interest and hype surrounding Mega is greater than any file hosting/cloud storage launch in recent memory.


According to Dotcom, more than 1 million users signed up for Mega in the first 24 hours. On Twitter, the larger-than-life entrepreneur has continued to share usage stats and traffic graphs that compare Mega with perennial cloud favorite, Dropbox.


[More from Mashable: 9 Fresh YouTube Shows You’ll Love]


If you’re curious about the inner workings of Mega, how it works and how it handles security, we’ve got you covered.


The Phoenix of Megaupload


Mega is the spiritual successor to Kim Dotcom’s last business, the insanely popular file-hosting service Megaupload. Last year, the U.S. Department of Justice shut down Megaupload and pursued criminal charges against Dotcom. Dotcom, a New Zealand citizen, is actively fighting U.S. extradition orders.


Megaupload was targeted by the DoJ because of its role in illegally distributing copyright material — including digital copies of movies, TV shows, books, music and software.


Rather than try to start a new service eschewing the potential for copyright material to be uploaded and shared, Dotcom is positioning Mega as a service that cares about and protects its user’s privacy. In fact, Mega’s tagline is “the privacy company.”


How It Works


On the surface, Mega is a bare-bones cloud storage host. After signing up for accounts, users can upload files and folders of all types to the service. Those files can then be shared with others.


The free plan gives users 50GB of file storage. There are no hard limits on file size, meaning users can use Mega as a way to back up photos, documents and other data. Obviously, this means users can use Mega as a way to store media content — video files, music, DVD images — as well.


For now, Mega is optimized to work on desktop web browsers. Mega strongly encourages users to use Google Chrome. And while Mega has big plans for developers and client-side apps, for now, the only way to access files is via the web browser.


Files can be uploaded to the service using drag and drop or a file-upload menu. Users can create folders in the file manager.


Uploads and downloads take place in parallel. If you upload a large number of files at once, each file uploads one at a time. In the future, Mega says users will be able to change the upload order. If you need to upload or download multiple files at once, simply open a new Mega tab in your browser and select that file.


You can upgrade to a higher-tiered storage plan from within your account. Mega doesn’t sell these plans itself; instead it has resellers who sell vouchers for a service. A 500GB storage plan with 1TB of enhanced bandwidth is 9.99 euros a month or 99 euros a year (a little over $ 110 U.S. dollars). That’s cheaper than most of its competitors.


The Importance of Passwords


It’s very important to remember the password you select when setting up your Mega account. The password is a big part of how Mega encrypts data on both ends.


During the sign-up process, Mega uses your password to create a 2,048-bit RSA key. This is the key that tells the system you are who you say you are. If you forget your password, you’re not going to be able to get into your account.


Right now, Mega doesn’t even have a password reset or recovery feature. In the future, Mega says it will have a reset mechanism but it will only allow users access to files or folders they have file keys for (more on file keys below). Users won’t be able to access other files until or unless they remember their password.


Because your Mega password is also your master encryption key, it’s important that users choose a secure password. We recommend using a password manager and printing a copy of the password to store in a safe place.


Understanding File Security


Mega is focused on end-to-end encryption. This means that files are encrypted both on upload and on download. With most traditional file hosts or cloud storage lockers, a public link to a file also includes a file path. With Dropbox, for example, the public or shared link includes the file name.


With Mega, things are a bit different. While users can share specific files to other Mega users or via email, the URL to a file doesn’t contain a file name; instead, a cryptographic key is appended to the URL. Without this key, you can’t access the file. Once decrypted by the server, a user has the option to download the linked file.


Mega’s promise, in other words, is that users control who has access to their files and accounts and no one else.


For important files or folders, users might want to make a note of the file key and keep it in a safe place — if they are worried about getting locked out of their account.


How Safe Are Your Files


Since Mega is touting itself as “the privacy company,” it’s important to look at how the company stores files and content.


The end-to-end encryption scheme is only part of how Mega secures data. Still, some are already criticizing the service, noting that it’s not as secure as it says it is. An article for Forbes cites two professionals who have problems with Mega’s security.


Matthew Green, a cryptography professor at John Hopkins University, is particularly critical of the way Mega uses JavaScript to verify its encryption method telling Forbes that “it makes no sense.”


Mega has responded to Green’s claims on its own blog, noting that its scheme “basically enables us to host the extremely integrity-sensitive static content on a large number of geographically diverse servers without worrying about security.”


Meanwhile, at Ars Technia Lee Hutchinson raises concerns about how Mega comes up with its crypto key at sign-up, as well as how the company handles deduplication, or how it eliminates duplicate copies of data.


Again, Mega has taken to its blog to attempt to clarify its policies and the way it handles data.


While Mega’s crypto system certainly doesn’t seem any less secure than any other file locker, we do agree with critics who note that the system might be more about giving Mega culpability against claims that it knows infringing content is on its servers, rather than about protecting that data itself.


The service is still in beta and much of its code is available via open source, so security purists might want to watch how Mega’s system evolves before trusting it with important, sensitive data.


Will Mega Stick Around?


While security experts can quibble and argue over the way Mega uses cryptography and how it stores data on its array of servers, the bigger issue, for us, is long-term survival.


While I would argue that most users who actively used Megaupload were not using it as a traditional cloud service, the fact remains that when the service was shut down, user files went with it.


Already anti-piracy groups are campaigning to shut down payment processors to Mega’s resellers. One of the reasons Mega isn’t taking payments itself and is instead using resellers is to prevent those groups from shutting down payment processors or trying to seize funds.


This is worrisome because in addition to outside capital, Mega needs professional accounts to keep its site working.


It’s too early to say if Mega will be around for the long haul or not, but our advice is not to use Mega as your only file storage solution. Keep backups of crucial files on disk or other cloud-based services.


What do you think of Mega? Let us know in the comments.


This story originally published on Mashable here.


Linux/Open Source News Headlines – Yahoo! News





Title Post: Everything You Need to Know About Kim Dotcom’s Mega
Url Post: http://www.news.fluser.com/everything-you-need-to-know-about-kim-dotcoms-mega/
Link To Post : Everything You Need to Know About Kim Dotcom’s Mega
Rating:
100%

based on 99998 ratings.
5 user reviews.
Author: Fluser SeoLink
Thanks for visiting the blog, If any criticism and suggestions please leave a comment




Read More..