Mar 112013
 

 simcity4

We were confident Maxis was the studio to deliver a proper sequel, but the studio’s choice of an always online DRM solution has proven to be a complete disaster. Maximum PC online managing editor Jimmy Thang has criticized EA’s handling of the situation, and the company’s PR department has been pulling overtime trying to repair the games reputation.

Firstly EA has clarified that it is not banning customers for requesting a refund, but you probably won’t get one either. The company points disgruntled customers to its return policy, which states in no uncertain terms that digital customers are out of luck. Disputing the charges with your bank weren’t specifically mentioned, but we would guess this would be handled more severely.

Secondly EA is hoping to mend a few bridges by offering up a free game.

READ MORE:  EA Patches SimCity and Throws Free Games at Disgruntled Customers | Maximum PC.

 

 


 

Mar 112013
 

fbvpint

Linkedin and Pinterest are among the top 2 social networks that has seen considerable scale in revenue and users last year and in an interesting research ” shows why Ecommerce and online retailers are throwing their might with Pinterest instead to spending on Facebook A recent chart from Comscore showed that ” Pinterest user base” outspends Facebook users and its ” Spending Power” or consumption patterns are more lucrative to marketers compared to any other social media site

The nature of Pinterest social community is more transactional as compared to other social networks . This is because its not only the numbers but the kind of ” product mix” Pinterest users engage in .

Not many know that 80% of the top Pinterest categories are related to commerce, and its no wonder why more jewelry,Apparels,and Cosmetic, Fashion and beauty chains are heavily investing on it As a result, Pinterest users who shop at Sephora spend 15 times more on its products than the brand’s Facebook followers.

READ MORE:  Why Facebook is Loosing out to Pinterest:Pinterest Users Buy 15 times more – Online Marketing Trends.

 

 


 

Mar 062013
 

sxsw

Can’t make it to this year’s South by Southwest (aka SXSW) show in Austin? At least you don’t have to miss out on the music.

As part of its SXSW: Live from Austin series, NPR is offering The Austin 100 — a collection of 100 songs by 100 artists, all in MP3 format, all absolutely free.

And I mean really and truly free: There’s nothing to register for, no form to complete, and not a single Facebook or Twitter sharing requirement.

Just scroll down a bit until you see the Download the Music box on the left, then right-click the Zip file to download the entire batch of songs. You can also scroll down a bit further and download individual tracks if you prefer.

READ MORE:  Get 100 free MP3s from SXSW 2013 | The Cheapskate – CNET News.

 

 


 

Mar 062013
 

We asked designers to change the future by designing an app for Windows Phone that would help us create, connect or simply impress our future selves. You answered the call with hundreds of amazing and inspiring submissions from scrapbooks and font managers, trip trackers or convoy road managers, to diaries that don’t broadcast your every thought or will even seal them up for the future. After hours of review and deliberation by our fantastic jurors Chris Caldwell (GSkinner.com), Jennifer Bove (Kicker Studio), Corrina Black (Microsoft), Pratik Kothari (Techark Solutions), and Eric Ludlum (Core77), we are proud to announce our 50 finalists and five winners!

READ MORE:  App to the Future: Design Challenge Winners – Core77.

 

 


 

Mar 062013
 

 

3D printers are gaining in popularity, with uses spanning the spectrum from moon bases to firearms, but there’s another area where the ability to construct complex shapes is beginning to provide benefits: getting high.

Online magazine Motherboard has published the story about the slow but inevitable rise of 3D-printed bongs. MakerBot’s Thingiverse site returns almost two dozen template results when searching for “bong,” all of which are downloadable in STL format and printable on tons of different 3D printers.

Common resin-based 3D printers can’t create glass, so a water pipe produced from these templates wouldn’t be entirely print-n-toke, but most appear to be ready to go as soon as glass pipes are added. The descriptions for many of the pipes indicate that they should be printed with PLA, which the Ice Bong creator notes “is biodegradable and poses no health risk and also has no smell.”

READ MORE:  Download this bong: 3D printer templates for getting your buzz on | Ars Technica.

 

 


 

Mar 062013
 

Recently, we reported that videos uploaded via Facebook have a higher Engagement Rate than YouTube links. You asked us how these two methods of uploading videos affect their reach – here are the results!

For the purpose of this study, we have chosen videos that brands have shared across Facebook during the last three months. As you know, there are two options – to either upload the video natively from your computer or to share a link to your video from YouTube. Apparently, admins prefer the latter, with 4 731 YouTube links posted vs. 554 Facebook videos, from December 4th – March 3rd 2013.

Facebook videos tend to have a higher Engagement Rate than YouTube links (0.22% on average compared to 0.10%). As already mentioned in the previous study, this could be due to the fact that you can play Facebook videos directly from the mobile news feed, which is increasingly becoming a preferred way of social update consumption. Interestingly enough, both YouTube links and Facebook videos generate nearly the same fan interaction, with about 77% of Likes, 16% of Shares, and 7% of Comments.

READ MORE:  Facebook Videos Have a 10x Higher Viral Reach than YouTube Links 

 

 


 

Mar 062013
 

These two multi-channel retailers found that mobile store locators get feet in stores and dollars in the cash register.

RadioShack launched its mobile site in 2011, streamlining it to make it easier for shoppers to quickly find products and services. It includes a mobile, touch-optimized store locator with click-to-call and GPS functionality. After its launch, the retailer found the average order value increased by 30 percent.

An analysis of four months’ worth of data completed by RadioShack with Mindshare, its agency, found that 36 percent of clicks were on its store locator page. Based on internal data, they estimated that 40 to 60 percent of clicks on its store locator resulted in visits to a physical store. Of those who did shop at a store, 85 percent made a purchase.

Before this study, RadioShack had only tracked conversion on its mobile site; it didn’t have great visibility into how mobile search affected in-store sales. “It wasn’t a good way to capture the whole conversion process and how users are interacting. The study was trying to follow the customer through the whole experience,” says Lisa Little, RadioShack search marketing manager.

READ MORE:  RadioShack and Adidas Find Store Locators Ring Up Sales | ClickZ.

 

 


 

Mar 052013
 

evernote

Security experts are criticizing online note-syncing service Evernote, saying the service needlessly put sensitive user data at risk because it employed substandard cryptographic protections when storing passwords on servers and Android handsets.

The scrutiny of Evernote’s security comes two days after Evernote officials disclosed a breach that exposed names, e-mail addresses, and password data for the service’s 50 million end users. Evernote blog posts published over the past few years show that the company protects passwords and sensitive user data with encryption algorithms and schemes that contain known weaknesses. That is prompting criticism that the company’s security team isn’t doing enough to protect its customers in the event that hackers are able to successfully compromise the servers or end-user phones.

The chief complaint involves Evernote’s use of the MD5 cryptographic algorithm to convert user passwords into one-way hashes before storing them in a database. Use of MD5 to store passwords has long been frowned on by security experts because the algorithm is an extremely fast and computationally inexpensive way to convert plaintext such as “password” into a unique string of characters such as “5f4dcc3b5aa765d61d8327deb882cf99.” MD5 makes an attacker’s job of cracking the hashes much easier by allowing billions of guesses per second, even on computers of relatively modest means.

By comparison, the use of slow algorithms such as bcrypt, which Twitter uses to protect its passwords, adds considerable time and computing requirements to the task of converting the hashes into the underlying plaintext passwords. Even when hashes are generated using cryptographic salt to add randomness—as Evernote says it does—MD5 is still considered a poor choice.

READ MORE:  Critics: Substandard crypto needlessly puts Evernote accounts at risk | Ars Technica.

 

 


 

Mar 052013
 

random-numbers

Some say we’re living in a “post-PC” world, but malware on PCs is still a major problem for home computer users and businesses.

The examples are everywhere: In November, we reported that malware was used to steal information about one of Japan’s newest rockets and upload it to computers controlled by hackers. Critical systems at two US power plants were recently found infected with malware spread by USB drives. Malware known as “Dexter” stole credit card data from point-of-sale terminals at businesses. And espionage-motivated computer threats are getting more sophisticated and versatile all the time.

In this second installment in the Ars Guide to Online Security, we’ll cover the basics for those who may not be familiar with the different types of malware that can affect computers. Malware comes in a variety of types, including viruses, worms, and Trojans.

Viruses are programs that can replicate themselves in order to spread from computer to computer, while targeting each PC by deleting data or stealing information. They can also change the computer’s behavior in some way.

“Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program,” Cisco notes. “When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.”

READ MORE:  Viruses, Trojans, and worms, oh my: The basics on malware | Ars Technica.

 

 


 

Mar 052013
 

tweetdeck

Twitter will shut down multiple TweetDeck apps to focus on the product’s web-based version, the microblogging service announced Monday.

In yet another sign of the battle between social media’s two biggest players, Facebook integration will be removed, too.

The announcement was met largely with a chorus of “nooooooooo,” “whyyyyyyy” and “gaaaaaaaah” on social media, reflecting TweetDeck’s widespread popularity with hardcore Twitter users.

TweetDeck AIR, TweetDeck for iPhone and TweetDeck for Android will be removed from their respective app stores in May, and stop working soon after, according to a TweetDeck blog post.

“To continue to offer a great product that addresses your unique needs, we’re going to focus our development efforts on our modern, web-based versions of TweetDeck,” the post says.

READ MORE:  Twitter Killing TweetDeck for iPhone and Android.