谷歌搜索今晨退出中国内地 国新办表态

2006年4月12日,Google公司首席执行官埃里克·施密特博士在展示自己完成的“谷歌”拼图。当日,Google公司在北京发布其全球中文名称“谷歌”。(资料图)

新华网北京3月23日电 国务院新闻办公室网络局负责人今天凌晨就谷歌公司宣布停止按照中国法律规定的对有害信息过滤,将搜索服务由中国内地转至香港发表谈话。

这位负责人指出,外国公司在中国经营必须遵守中国法律。谷歌公司违背进入中国市场时作出的书面承诺,停止对搜索服务进行过滤,并就黑客攻击影射和指责中国,这是完全错误的。我们坚决反对将商业问题政治化,对谷歌公司的无理指责和做法表示不满和愤慨。

这位负责人说,1月12日谷歌公司在未事先与我政府有关部门通气的情况下,公开发表声明,声称受到了中国政府支持的黑客攻击,不愿在中国运营“受到审查的互联网搜索引擎”,并“考虑退出中国市场”。在谷歌公司一再请求下,为当面听取其真实想法,体现中方诚意,今年1月29日、2月25日中国政府有关部门负责人先后两次与谷歌公司负责人接谈,就其提出的问题作了耐心细致的解释,强调外国公司在中国经营应当遵循中国法律,如谷歌公司愿遵守中国法律,我们依然欢迎谷歌公司在中国经营和发展;如谷歌公司执意将谷歌中国网站的搜索服务撤走,那是谷歌公司自己的事情,但必须按照中国法律和国际惯例,负责任地做好有关善后工作。

该负责人指出,中国政府鼓励互联网发展和普及,促进互联网对外开放。中国互联网上的交流和言论十分活跃,电子商务等发展迅速。事实证明,中国互联网的投资环境、发展环境是好的。中国将坚定不移地坚持对外开放的方针,欢迎外国企业参与中国互联网发展,并为外商到中国经营发展提供良好服务。中国互联网依然会保持快速发展的势头。

北京时间3月23日凌晨3时零3分,谷歌公司高级副总裁、首席法律官大卫·德拉蒙德公开发表声明,再次借黑客攻击问题指责中国,宣布停止对谷歌中国搜索服务的“过滤审查”,并将搜索服务由中国内地转至香港。

美联邦通讯委员会发布宽带网速实时检测工具

美国联邦通讯委员会周四发布了一项宽带测速服务,帮助消费者实时检测网络速度。
消费者可以登录网站www.broadband.gov进行测试, 然后将实际网速与网络服务供应商承诺的网速进行对比。在此之前,联邦通讯委员会的官员曾在去年9月召开的一次会议上提出,消费者的实际网速在网络流量高峰 时间估计会减慢50%。

联邦通讯委员会主席 Julius Genachowski在声明中表示:“联邦通讯委员会给宽带用户提供的这个新工具可以为他们提供宽带连接的实时信息,也可以为服务机构提供全国服务的有用资料。”

联邦通讯委员会还将收集关于宽带尚未普及地区的信息。消费者可通过电子邮箱fccinfo@FCC.gov或电话与联邦通讯委员会取得联系。

VPN Connections

The initials “VPN” in the computer industry stands for “Virtual Private Network” and this is actually a physical framework constructed using the actual PC and its connecting wires to effectively establish several nodes of computing machines within a network. This system uses several advanced security measures such as data encryption techniques to ensure that only those authorized users are able to access and view the associated data found on the established network. This type of network is basically what is meant when mention is made as to a virtual or a private connection.

VPN is one form of “WAN” or the “Wide Area Network” and it is capable of supplying a network of connectivity which can stretch for very wide physical distances such as through the use of the World Wide Web or by use of an intranet. Both of these are commonly employed network capabilities established by major companies and corporations for use by its staff and executives. Data file sharing, voice or video conference transfers as well as other network services similar in nature are made possible by way of the VPN.

The VPN is able to work both in the private mode as well as in public networks such as the internet. This is accomplished though the use of a method referred to as “tunneling”. While “tunneling” still makes use of the same hardware infrastructure of the computer system such as the existing intranet or internet link up features it has its own unique manner of operation as well. As mentioned previously, it has the capacity to protect your private connection and thus your personal data through several effective security systems and safety mechanisms. Security for major corporations is of prime concern when establishing these data transfer systems. There is no acceptable excuse for weak or ineffective security when it concerns personal and business data thus only those proven methods and systems are acceptable.

VPN can be employed chiefly in three different types of communication modes. The first mode is merely for accessing the internet itself. The LAN to another LAN networking is the second communication means and lastly it is able to function within a controlled environment such as a privately set-up intranet structure. Just recently, many corporations and companies have begun to explore the possibility of increasing mobility among its key executives and important staff members. With this move towards a mobile structure the VPN has taken on a new and elevated position of importance. With the vast development in telecommunication the VPN function has proven to be very useful for people that desire to remain connected even when considering the huge differences involved in physical distance. As a result of these advanced planning initiatives productivity is not compromised by distance in the least.

YouTube自动字幕限英文 对所有用户开放

CNET科技资讯网3月9日国际报道 Google上周宣布,YouTube的自动字幕(auto-captioning)功能开始对所有使用者开放,希望能让视频更容易观赏并通过搜索引擎搜索。

  Google在记者会上表示,自动上字幕的功能不只是对听障者有帮助,也是外国人学习英语的好帮手。

  视频提供者如今可申请让自己的视频添加机器转译的字幕。即使视频原本未加上字幕,使用者也可自行要求上字幕,接下来YouTube会把视频加进等待上字幕的名单,可能费时一小时或一天不等,未来速度可望加快。

  用来作自动字幕的技术,与Google的Voice Search脱胎自同一个架构。不过,发言人表示,视频与语音的挑战截然不同,Voice Search通常自电话撷取声音,一般来说这些声音可能已去除了噪音,而且只有一个说话者;但视频里可能同时有多人说话,而且可能是南腔北调,还有背景杂音的问题。

  这正是Google还在继续设法克服的挑战,另外还有支持非英语口语的挑战。目前自动字幕只以英语视频为限,不过Google可用自家翻译服务把自幕转译成其他语言;目前Google翻译服务支持50种语言。

  先前字幕功能已对部分使用者开放,即日起应可进一步对所有使用者开放。

What is a Cookie?

The full cookie specification (RFC 2965) can be found at http://tools.ietf.org/html/rfc2965 if you are interested in studying the subject in detail. To simplify, cookies are small bits of information written to your hard disk by a site you visit. The site that writes the information is basically the only site that can retrieve it (some argue that it is possible to “fake” the request and collect information from cookies saved by other sites; they are possibly correct, but this seems to be rare if done at all).

The name “cookie” comes from the UNIX magic cookie which is a name given to packets of information passed between programs. That name is derived from the Chinese fortune cookie where you have information hidden inside a packet.

The purpose of a cookie is twofold:

Save information about you to make it easier for you to enter the site in the future.
Track your actions (for a variety of reasons that might benefit you or the site manager).
As one simple example, consider a newspaper site with a registration requirement (paid or free, it does not matter). Your logon information might be saved in a cookie so that when you return to the site it can query the cookie and save you the trouble of logging in. Further, if you have specific information requirements these can be coded into a cookie and the site can then automatically present you with stories on the specific topics of interest without bothering to ask you again to enter them on future visits.

How are Cookies Stored?

Cookies are stored in different ways with different browsers and operating systems. On a computer running Windows and a Netscape browser you will find them in a file named COOKIES.TXT in the browser directory. Firefox places an SQLite database of cookies into the browser’s profile folder. A Windows user running Internet Explorer will find them as separate files in the WINDOWSCOOKIES directory. In UNIX they are in a single file in your Netscape directory under the name cookies. Finally, on a Macintosh the file is named MagicCookie and is in the Netscape preferences folder. If you look at a cookie you will see a single line that looks something like:

.infoseek.com TRUE/FALSE 869315463 InfoseekUserId 9CC70E7E5772038797334985D8974560

.netscape.com TRUE/FALSE 946713599 NETSCAPE_ID c65ffb1e,c4750133

The start of the cookie generally has the domain name authorized to access that cookie. The second to last column is the name of the cookie and the last column is the cookie itself. The other information is control information that can define the length of time the cookie is valid and such things as if a secure server connection is necessary before the cookie will be sent.

The specification allows up to 300 total cookies with each being up to 4KB long. There can be up to 20 cookies per server or domain. When these limits are exceeded older cookies (particularly those that have expired) are erased. If there are no expired cookies, then older cookies (expired or not) may be erased.

Cookie Security

Three major concerns are typically raised:

“Someone” is writing to your hard drive without your knowing about it.
Cookies can be used to “steal” valuable information about you.
Cookies can be used to track you (and thus invade your privacy).
While each of these concerns has some validity (depending largely on how you view personal security and privacy) there is little real concern if you take what one might describe as standard precautions.

In the first instance, many programs write to your hard drive without your knowing about it. There are temporary files, cache files, and any number of related files routinely written to your hard disk during any computing session. If you are worried about it, modern browsers have a “notify” option relating to cookies. Check it and the browser will alert you whenever a cookie is supposed to be written to your hard disk. Because of privacy concerns raised by some people expect all future browsers to also have an option that tells them you never want a cookie recorded (or some alternative where you only accept cookies from defined sites or during a specific browser session). Of course, if you don’t record a cookie, if you revisit the site you will have to go through the registration process all over again. This may or may not be convenient for you.

The second instance is usually described in near-hysterical terms that describe how cookies are going to search your hard drive and send all sorts of vital information to some site or another. Bottom line: This is false. The only information a cookie can send to any site is information you have already provided, including any information you sent in a form or locations you have visited on the site in question (or locations you were directly referred to by links from that site). The cookie specification allows no access outside of the cookie file itself. And, if a site wanted to track your activity it could do so on that site; it would not require cookie technology. Cookies just reduce storage space on the server side since the site does not have to allocate storage space for every possible user; each user allocates a little space for the information on their system in the form of a cookie.

The third (track you) has minor potential for problems under some very unique circumstances. Here is a worst case scenario (that would be difficult to implement). Consider a site which stores advertising banners that many other sites draw from. This same site runs contests for other sites. If that site wants to it can:

Each time you hit a page with one of those banners on it the storage site checks for cookies it might have sent you in the past and places another. It also records the site you are on plus any info the browser might send (including your current IP address) into its database (at this point all the site knows is the ISP you are logging in from).
If you now enter one of that site’s contests all the information you provide as part of the contest rules is also stored in the database. The ad banner storage site now knows who you are, what sites you have visited, and what some of your interests are.
Now take your laptop on a trip. If you are using a national ISP your IP address will likely change because national ISPs generally assign the address dynamically when you log in and the address is based on location. So, when you now hit another advertising banner the ad site suspects you are traveling. (In the extreme, knowing personal information and that you are away from home could be used in many ways, but in practice such coordination would be hardly worth the effort. There are many easier ways of determining if you are home or not.)
Another example of cookie use can be seen on many shopping sites (e.g., Amazon.com for one). When you go to Amazon.com as a prior customer the chances are that Amazon.com will put up a page with your name on it. They remember you via cookies set on your prior visit(s).

As with any other information and technology, cookies have their positive and negative sides. If you are careful in what you provide to any site there seems to be minor danger in allowing cookies to be active on your computer. Cookies or not, however, you need to exercise caution with important information (e.g., credit card numbers). Consider carefully to whom you provide this information in any form. And, be aware that more information that you might care to have collected can be collected on you over time via cookies.