Here’s a look at some of the biggest film budgets of the past three years and the differences in how they fared opening weekend:
As you can see, sometimes the risk pays off. “The Avengers” and “The Dark Knight Rises” grossed more than $2.5 billion combined.
So far this year, seven films are estimated to have larger-than-life budgets:
Most people are happy to give their neighbours a spare house key in case of emergencies, but you probably wouldn’t want to give them your digital passwords. Now security researchers have shown that you may not have a choice, at least when it comes to cloud computing.
Cloud servers let users run simulations of an ordinary computer, called virtual machines (VMs), on remote hardware. A VM performs exactly as an ordinary computer would, but because it is entirely software-based, many of them can run on a single hardware base. Yinqian Zhang of the University of North Carolina, Chapel Hill, and colleagues have discovered that it is possible for one VM to steal cryptographic keys – used to keep your data secure – from another running on the same physical hardware, potentially putting cloud-computing users at risk.
The attack exploits the fact that both VMs share the same hardware cache, a memory component that stores data for use by the computer’s processor. The attacking VM fills the cache in such a way that the target VM, which is processing a cryptographic key, is likely to overwrite some of the attacker’s data. By looking at which parts of the cache are changed, the attacking VM can learn something about the key in use.
Zhang and team did not test the attack in the cloud for real, but used hardware similar to that employed by Amazon’s cloud service to try stealing a decryption key. They were able to reconstruct a 4096-bit key in just a few hours, as reported in a paper presented at the Computer and Communications Security conference in Raleigh, North Carolina, last month.
This attack won’t apply in all situations, as an attacker would have to establish a VM on the same hardware as yours, which isn’t always possible. What’s more, an attack would not work on hardware running more than two VMs. Still, those looking to use cloud services for high-security applications may want to reconsider.
Image by David Malan/Getty
New Scientist reports, explores and interprets the results of human endeavour set in the context of society and culture, providing comprehensive coverage of science and technology news.
The FAA has approved American Airlines to be the first commercial airline to have its pilots use iPads in “all phases of flight,” rather than the 35lb paper reference manuals they’re used to.
Based on current fuel prices, The Next Web estimates that this will save the airline some $1.2M annually, across all of its aircraft. This month, AA’s 777 fleet will be the first to get the technological upgrade; by the end of this year, all fleet types are expected to have approval for the switch and the paper manuals will cease to be revised.
This is a huge environmentally friendly move for AA: not only will the ligher tablets save fuel, based on the weight carried by the planes, but they will also save paper, for ever manual printed and revised, company-wide.
This would also seem to confirm what we’ve all long suspected: there is really no real risk to having a tablet turned on during take-off. [TNW]
Images by Nickolay Lamm/Inventhelp
After decades of sustained growth in the PC market (with the exception of 2001), growth is slowing to a halt. Overall PC shipments grew 4 percent last year, down from 14 percent the year before, and the lowest growth rate since 2001.
There are a few reasons for this. The global economy has been choppy since the downturn of 2008, depressing both business and consumer spending. The business PC upgrade cycle has gotten longer — Microsoft says that about two-thirds of all businesses are still using Windows Vista (which is more than five years old) or Windows XP (almost 11 years old). The introduction of the iPad in spring 2010 sucked the air out of the market for cheap tiny laptops called “netbooks,” which had been driving a lot of PC growth for the previous few years.
The release of Windows 8 later this year may drive a new wave of consumer adoption, although there’s a real risk that many consumers will find the huge design changes confusing and stick with Windows 7 or switch to Apple products instead. After that, the end of life for Windows XP in April 2014 could spur a big business upgrade cycle.
But for now, the PC market looks flat and mature.
Global Payments, a major credit card processing company, has reportedly been hacked. That means each of the four major credit card companies, and according to reports, as many as 10 million customers are at risk.
The story has been developing throughout the morning. Right now, it goes like this: Hackers gained access to an administrative-privileged account at a New York City taxi company and, over the course of several months, stole 10 million credit card numbers. They’ve been sitting on them, waiting to spend all at once to maximize the time before they’re shut down.
The Wall Street Journal puts the number of compromised accounts around 50,000, which is a far cry from 10 million. The massive number had originally been sourced to a post from a Gartner analyst, and while it seems a little far fetched that a cab company would have millions of numbers, we’d still err to caution.
Visa and Mastercard have both issued statements explaining the breach, but stressed that their networks were not specifically breached. Though that doesn’t really matter if you’re affected by the hack of “third-party processor” Global Payments. No word yet from American Express or Discover, but both are accepted by official NYC cabs.
Third-party processors like Global Payments or PayPal simplify accepting credit cards for small or spread out merchants. So a cab using GP is about the same as an eBay seller using PayPal, and this hack affects users the same way a PayPal hack would. Which is to say, very seriously.
Everyone seems to be scrambling to figure out what’s going on here, including credit card companies. What we’re going on right now is that this is probably based out of New York, and probably confined to those who’ve paid for a cab with a credit card. If you fit that description, think about preemptively checking in with your card company to protect yourself. [Gartner, PhysOrg, CNN, WSJ]
Update: Bank of America and Chase have apparently been alerting their customers about this breach for weeks, but not providing specifics beyond their individual accounts. And in some cases, alerted customers received fraudulent charges even after a card had supposedly been shut down.
Thanks Lauren & iomegaman5
Hey Carriers. We need to talk. You know how you said you were going to start throttling high data usage users in hopes to preserve bandwidth? That’s bullshit, apparently. It’s only because you want to get us onto tiered data plans so you can charge us overages. With hate, everyone.
Seriously. Validas, an analytics firm, analyzed 50,000 cellphone bills from AT&T and Verizon to see if throttling was a necessary evil to conserve bandwidth. However, the numbers point to no. Instead, Validas guesstimates that it’s because carriers would rather have us on tiered data plans for the overage fees. According to Validas:
“When we look at the top 5% of data users, there is virtually no difference in data consumption between those on unlimited and those on tiered plans — and yet the unlimited consumers are the ones at risk of getting their service turned off. So it’s curious that anyone would think the throttling here represents a serious effort at alleviating network bandwidth issues. After all, Sprint does seemingly fine maintaining non-throttled unlimited data for its customers.”
The point being, throttling the Top 5% of unlimited data users seems to be unnecessary because the Top 5% are using the same amount of data on their tiered plans anyway. Go figure, carriers trying to squeeze a dime out of a nickel. [BGR]
I don’t live in a high risk area for deadly tremors, but after watching this earthquake-proof table easily survive having a 2,200 pound block dropped on it, I think I still want one for my office—just in case.
The table was designed by Ido Bruno and Arthur Brutter primarily for use in schools. Students are typically taught to hide under their desks in the event of an earthquake, but most desks aren’t designed to support the weight of all the debris were the building to collapse. Which is clearly demonstrated in this video when they drop just a 1,000 pound weight on a traditional desk and it’s immediately pancaked.
In addition to providing a safe haven for students, the desk’s supporting structure is designed in such a way that it also provides several escape routes depending on how debris has fallen. It’s also light enough to be lifted by just two students, and is built with durable but inexpensive materials so it’s actually affordable for a school to purchase en masse. Now it’s not available just yet, but based on these tests being conducted at the Structural Engineering department at Padua University in Italy, it shouldn’t have much trouble getting approved for sale. [designboom]
In a weird twist of events, the hole was actually found by Infoworld, a news site that covers the tech industry. Oracle even gave the publication a public credit for finding and reporting the hole — and waiting to publish the story until Oracle could issue a patch, which it did today.
The flaw had to do with time stamp technology that acts like an internal clock. This clock is the key to keeping data synchronized and safe. When multiple databases are linked together the clock could be manipulated to be inaccurate. This is one of those critical systems that was difficult to fix and affected a long list of Oracle’s products.
The critical patch sent out today fixes a whole bunch of other flaws, too. Some 78 holes will be patched across all of Oracle’s major product families.
Inforworld contends that Oracle executives knew about the time stamp problem and not only downplayed it, but issued a workaround fix that could have caused customers even more headaches and money. Oracle seems to have gotten its act together and really fixed the security flaw this time, Infoworld says.
- How Oracle Is Defending Itself Against SAP’s Attack
- The 10 Most Outrageous Stories About Larry Ellison
- There Are 42 Million Prostitutes In The World, And Here’s Where They Live
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- Coke vs Pepsi vs Dr Pepper
- Marketing Costs Normalized to CPM Basis for Comparison
- 3G calling, no registration, and totally free
- AOL's Plan To Steal TV Ad Dollars Is Totally Working
- The Top Endorsement Earners In Each Sport
- Groupon launches Breadcrumb iPad app, vows to not be a typical POS
- HP Mini 311 Nvidia ION Netbook Hackintosh'ed
- Flash Sale Sites Have A Social Media Problem
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- Digital + Traditional = Unified Marketing
- May 2013 (47)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (94)
- August 2012 (92)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (12)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)